IT Security/Objectives/Threats, Vulnerabilities, and Mitigations
2.1 Compare and contrast common threat actors and motivations.
edit
|
|
2.2 Explain common threat vectors and attack surfaces.
edit
|
|
2.3 Explain various types of vulnerabilities.
edit
|
|
2.4 Given a scenario, analyze indicators of malicious activity.
edit
|
|
2.5 Explain the purpose of mitigation techniques used to secure the enterprise.
edit
|
|