CHAPTER 7
Mitigating Controls for Attacks and Software Vulnerabilities
In this chapter you will learn:
• How common attacks may threaten your organization
• Best practices for securing environments from commonly used attacks
• Common classes of vulnerabilities
• Mitigating controls for common vulnerabilities
The attacker only needs to be right once, but defenders must be right all the time.
—Unknown
The threat of a cyberattack is a fact of life in our connected world. As new vulnerabilities are discovered, attackers will often look to take advantage of them using custom and/or commodity tools. Given the scale of these threats, operating in a strictly response capacity, or not at all, is not a prudent option. Protecting your organization’s ...
Get CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.