Chapter 5
Vulnerabilities and Threats
CERTIFICATION OBJECTIVES
5.01 Identifying Malware Types
5.02 Network and Device Hardening
5.03 IoT Security
5.04 Securing Industrial Control Systems
5.05 Managing Embedded Systems Security
QUESTIONS
IT security threats can apply to software or hardware. Software threats include the exploitation of vulnerabilities and the wide array of malware such as worms and spyware. Hardware threats apply when a malicious entity gains physical access, for example, to a handheld device or a server hard disk.
IoT and specialized embedded devices are widely used and can transmit sensitive data over the Internet, where industrial control systems are normally not connected to external networks. Identifying ...
Get CompTIA Security+ Certification Practice Exams, Fourth Edition (Exam SY0-601), 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.