CHAPTER 5

Threats and Vulnerabilities Associated with Specialized Technology

In this chapter you will learn:

•   How to identify vulnerabilities associated with unique systems

•   Most common threat vectors for specialized technologies

•   Vulnerability assessment tools for specialized technologies

•   Best practices for protecting cyber-physical systems

To kill an error is as good a service as, and sometimes even better than, the establishing of a new truth or fact.

—Charles Darwin

Most threat actors don’t want to work any harder than they absolutely have to. Unless they are specifically targeting your organization, cutting off the usual means of exploitation is often sufficient to encourage them to move on to lower hanging fruit elsewhere. ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.