CHAPTER 5
Threats and Vulnerabilities Associated with Specialized Technology
This chapter includes questions on the following topics:
• How to identify vulnerabilities associated with unique systems
• Most common threat vectors for specialized technologies
• Vulnerability assessment tools for specialized technologies
• Best practices for protecting cyber-physical systems
Most IoT devices that lack security by design simply pass the security responsibility to the consumer, thus, treating the customers as techno-crash test dummies.
–James Scott
As a cybersecurity analyst, if you pay attention to any chapter of the CySA+ material, pay attention to this one as mobile technology, Internet of Things (IoT), and so forth are currently exploding ...
Get CompTIA CySA+ Cybersecurity Analyst Certification Practice Exams (Exam CS0-002), 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.