Section 18.166 Vulnerabilities and Attacks Flashcards
Objectives 2.2 Explain common threat vectors and attack strategies. Objectives 2.3 Explain various types of vulnerabilities Objectives 2.4 Given a scenario, you must be able to analyse indicators of malicious activity. Objectives 2.5 Explain the purpose of mitigation techniques used to secure the enterprise. Objectives 2.6 Given a scenario, you must be able to apply common security techniques to computing resources
1
Q
Vulnerabilities
A
Weaknesses or flaws in hardware, software, configurations, or processes within a computer system, network or application
Consequences:
● Unauthorised Access
● Data Breaches
● System Disruptions
2
Q
Attacks
A
Deliberate actions by threat actors to exploit vulnerabilities
Lots of different forms like..
● Unauthorised Access
● Data Theft
● Malware Infections
● DoS Attacks
● Social Engineering