CompTIA Security+ Study Guide (SY0-501) Chapter 7: Host, Data, and

12 Slides181.70 KB

CompTIA Security Study Guide (SY0-501) Chapter 7: Host, Data, and Application Security

Chapter 7: Host, Data, and Application Security Explain threat actor types and attributes Explain the impact associated with types of vulnerabilities Explain the security implications of embedded systems Summarize secure application development and deployment concepts

Threat Actors and Attributes Script kiddies Hacktivist Organized crime Nation-states/APT Insiders Competitors

Use of Open Source Intelligence ThreatCrowd OpenPhish OSINT framework Shodan

Types of Vulnerabilities Configuration issues User issues Zero-day exploits Other issues

Embedded Systems Security IoT: Internet of Things

Application Vulnerabilities Input vulnerabilities Memory vulnerabilities

Secure Programming Prototyping

Specific Types of Software Testing Unit testing Integration testing System testing User acceptance testing Regression testing

Patch Management Hotfix Patch Service pack

Database Tier Models One-tier model Two-tier model Three-tier model

NoSQL vs. SQL

Back to top button