2.0 Threats, Vulnerabilities & Mitigations

This section covers the landscape of cybersecurity threats, the actors behind them, various attack vectors, types of malware, system vulnerabilities, and the countermeasures used to protect against these risks.

Important

Understanding threats and vulnerabilities is fundamental to implementing effective security controls. This section represents approximately 22% of the Security+ exam.

What You'll Learn

Study Tip

Focus on understanding how different threats exploit specific vulnerabilities and which mitigations are most effective for each scenario.

2.1 Threat Actors

Threat actors are individuals or groups responsible for security incidents. Understanding their motivations, capabilities, and characteristics helps in developing appropriate defenses.

Types of Threat Actors

Type Motivation Resources Typical Targets
Nation-State Political, economic, military advantage Extensive (government funding) Critical infrastructure, government systems, intellectual property
Organized Crime Financial gain High (professional operations) Financial institutions, healthcare, retail
Hacktivists Political/social ideology Variable Government websites, corporations, political organizations
Insiders Revenge, financial gain, ideology Legitimate access Employer systems, sensitive data
Script Kiddies Curiosity, notoriety Low (pre-built tools) Low-hanging fruit, poorly secured systems

Advanced Persistent Threats (APTs)

Sophisticated, long-term campaigns typically associated with nation-states:

Insider Threats

One of the most dangerous threat types due to legitimate access:

Exam Tip

Be prepared to match threat actor types with their characteristics, motivations, and typical targets in scenario-based questions.

2.2 Attack Vectors

Attack vectors are the pathways or methods that threat actors use to gain unauthorized access to systems or networks.

Common Attack Vectors

Vector Description Example
Phishing Deceptive emails/messages to trick users Fake login page for credential theft
Malvertising Malicious code in online advertisements Compromised ad networks delivering malware
Watering Hole Compromising frequently visited websites Industry-specific site infected with exploit kit
Supply Chain Attacking through third-party vendors Compromised software updates
Zero-Day Exploiting unknown vulnerabilities Attack before vendor patch available

Social Engineering Attacks

Technical Attack Methods

💡 Defense Strategy

Defense in depth is crucial - no single control can protect against all attack vectors. Combine technical, administrative, and physical controls.

2.3 Malware Types

Malware (malicious software) encompasses various types of software designed to harm, exploit, or otherwise compromise computer systems.

Common Malware Categories

Type Characteristics Propagation Primary Purpose
Virus Attaches to legitimate programs, requires user action File sharing, email attachments Data corruption, system damage
Worm Self-replicating, spreads without user interaction Network vulnerabilities Rapid infection, backdoor creation
Trojan Horse Disguised as legitimate software User deception Backdoor access, data theft
Ransomware Encrypts files and demands payment Exploit kits, phishing Financial extortion
Spyware Secretly monitors user activity Software bundles, drive-by downloads Information theft, surveillance
Rootkit Hides deep in system, hard to detect Exploits, social engineering Persistent access, stealth
Botnet Network of compromised devices (zombies) Malware infection DDoS, spam, credential theft
Logic Bomb Dormant until triggered by specific conditions Insider placement Data destruction, system damage

Advanced Malware Techniques

Malware Delivery Methods

Detection & Prevention

Modern malware defense requires multiple layers: signature-based detection, behavioral analysis, sandboxing, and user education to prevent initial infection.

2.4 Vulnerabilities

Vulnerabilities are weaknesses in systems, processes, or human factors that can be exploited by threat actors.

Common Vulnerability Categories

Category Examples Impact
Software Vulnerabilities Buffer overflows, SQL injection, XSS Remote code execution, data theft
Configuration Weaknesses Default credentials, open ports, weak permissions Unauthorized access, privilege escalation
Network Vulnerabilities Unencrypted protocols, weak encryption Eavesdropping, man-in-the-middle
Human Factors Social engineering, weak passwords Credential theft, unauthorized access
Physical Security Unsecured devices, lack of access controls Theft, tampering, unauthorized access

Common Weaknesses Enumeration (CWE)

Community-developed list of common software security weaknesses:

Zero-Day Vulnerabilities

Vulnerabilities unknown to the vendor with no available patch:

Vulnerability Assessment

Systematic process of identifying and classifying vulnerabilities:

Exam Tip

Know the difference between vulnerability (weakness), threat (potential danger), and risk (likelihood × impact). Be familiar with common CVEs and their mitigations.

2.5 Mitigations

Mitigations are security controls and countermeasures designed to reduce risk by addressing threats and vulnerabilities.

Defense in Depth Strategy

Layered security approach using multiple controls:

Specific Mitigation Techniques

Threat/Vulnerability Primary Mitigations Additional Controls
Malware Antivirus, application whitelisting User education, email filtering
Social Engineering Security awareness training Multi-factor authentication, least privilege
Network Attacks Firewalls, IDS/IPS Network segmentation, VPNs
Web Application Attacks Input validation, WAF Secure coding practices, regular patching
Insider Threats Least privilege, separation of duties User behavior analytics, audit logs
Physical Threats Access controls, surveillance Asset tracking, environmental controls

Technical Security Controls

Administrative & Physical Controls

💡 Effective Mitigation Strategy

The most effective security programs combine technical controls with strong policies and ongoing user education. Regular testing and updates are essential as threats evolve.