CHAPTER 7

Mitigating Controls for Attacks and Software Vulnerabilities

In this chapter you will learn:

•   How common attacks may threaten your organization

•   Best practices for securing environments from commonly used attacks

•   Common classes of vulnerabilities

•   Mitigating controls for common vulnerabilities

The attacker only needs to be right once, but defenders must be right all the time.

—Unknown

The threat of a cyberattack is a fact of life in our connected world. As new vulnerabilities are discovered, attackers will often look to take advantage of them using custom and/or commodity tools. Given the scale of these threats, operating in a strictly response capacity, or not at all, is not a prudent option. Protecting your organization’s ...

Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.