CHAPTER 5

Threats and Vulnerabilities Associated with Specialized Technology

This chapter includes questions on the following topics:

•  How to identify vulnerabilities associated with unique systems

•  Most common threat vectors for specialized technologies

•  Vulnerability assessment tools for specialized technologies

•  Best practices for protecting cyber-physical systems

Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.

–James Scott

As a cybersecurity analyst, if you pay attention to any chapter of the CySA+ material, pay attention to this one as mobile technology, Internet of Things (IoT), and so forth are currently exploding ...

Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.