IT Security/Objectives/Threats, Vulnerabilities, and Mitigations
Appearance
2.1 Compare and contrast common threat actors and motivations.
[edit | edit source]
|
|
2.2 Explain common threat vectors and attack surfaces.
[edit | edit source]
|
|
2.3 Explain various types of vulnerabilities.
[edit | edit source]
|
|
2.4 Given a scenario, analyze indicators of malicious activity.
[edit | edit source]
|
|
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
[edit | edit source]
|
|