CompTIA Security+ Certification

Threats Vulnerabilities and Mitigations

Other Threat Vectors

Attackers continually evolve their strategies to exploit vulnerabilities beyond traditional social engineering and human-targeted hacking. They increasingly take advantage of weaknesses in network infrastructures and supply chains.

Attack methods generally fall into two categories:

  • Local Attacks: Directly target systems through physical access.
  • Remote Attacks: Exploit vulnerabilities via network access, often bypassing conventional security measures.

A secure network adheres to the foundational principles of the CIA triad:

  • Confidentiality: Ensuring that sensitive information is not disclosed to unauthorized individuals.
  • Integrity: Maintaining the accuracy and consistency of stored data.
  • Availability: Guaranteeing reliable and timely access to data and resources.

Failure to secure these aspects exposes the network to various risks and potential breaches.

Potential network threat vectors include:

  • Wired Connections: Direct physical access can lead to hacking and data interception.
  • Wireless Connections: Susceptible to eavesdropping and unauthorized access due to their broadcast nature.
  • Bluetooth: Introduces additional risks through proximity-based exploits.

The image shows a diagram titled "Network Vectors," illustrating three types of vectors: Wired, Wireless, and Bluetooth, each with corresponding icons.

Note

Regular network security audits and prompt infrastructure updates are vital to mitigate these threat vectors and maintain robust security measures.

Watch Video

Watch video content

Previous
Social Engineering