Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain One

Subdomain 1.6

Explain the security concerns associated with various types of vulnerabilities.

Terms: 24

Cloud-based vs. on-premises vulnerabilities

Zero-day

Weak configurations

Concerns referring to issues that arise from improperly configured systems, applications, or networks, which can lead to security vulnerabilities. Can potentially be exploited by malicious actors to gain unauthorized access, steal data, disrupt services, or carry out other malicious activities.

Open permissions
Unsecure root accounts
Errors
Weak encryption
Unsecure protocols
Default settings
Open ports and services

Third-party risks

Potential threats presented to an organization from outside parties. These risks can come from third-party vendors, business partners, or other external entities that have access to an organization’s systems or data. Examples include vendor management, system integration, lack of vendor support, supply chain, and more.

Vendor management
System integration
Lack of vendor support
Supply chain
Outsourced code development
Data storage

Improper or weak patch management

Can lead to vulnerabilities in third-party software that is used by an organization. If the third-party software has a vulnerability that is not patched, it can be exploited by attackers to gain access to the organizations systems.

Firmware
Operating systems (OS)
Applications

Legacy platforms

Impacts

Reasons why we patch vulnerabilities. Far reaching affects, malicious cyber activity cost the U.S. economy between $57 billion and $109 bullion in 2019.

Data loss
Data breaches
Data exfiltration
Identity theft
Financial
Reputation
Availability loss

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.