33 hours 23 minutes

Video Transcription

Hello and welcome back to cyber is 2019 comp t A Security plus certification preparation course.
This in fact, a continuation Motor one, which is titled Domain One. Threats, Attacks and Vulnerabilities.
We have a brand new objective, which encompasses this particular domain, which is 1.6 playing the impact associated with the types of vulnerabilities. And if you learned earlier, ah, vulnerability is a witness. Before we begin, the prices actually highlight Miss Discussion topic of discussion. Further discussing it.
Let's turn out to toward a pre assessment quiz.
And the question is as follows.
A race, condition or raise habit is the behavior of an electronic software or other systems. With a system, substantial behavior is dependent on the secrets or timing of other uncontrollable events has become. It could become a but when one arm or possibly behavior is undesirable,
is this true or false?
If you said chill, you're absolutely correct.
Here again are the topic discussion, which encompasses this particular objective, ranging from race condition all way down. The volume is due to end of life systems, embedded systems or lack of vendor support.
Some additional topic discussion was encompassed this objective. We have improper input, handling and popular error handling or missed configuration on week configuration
default configuration resource exhausted all way down a week. Cyprus sweets as well. It's implementation
and some additional top of discussion was, encompasses objectives, vulnerably business processes, as was weak Cyprus sweets and implementation.
So the first I'd imagine is defining exactly what is a race condition. Now, when you think about a race, condition or race has it is the behavior of an electronic software. Other system with a system substantial behavior is dependent on the sequence of timing off other uncontrollable events.
In this case, it could become a book. When one of more than possibly behavior
is undesirable,
then we come to vulnerable is when think about IVANOVICH. Remember, at vulnerability is a weakness. Vulnerability is a cybersecurity term that refers to a flaw in the system can leave it open to attack.
A vulnerable may also refer to any type of weakness in the computer system itself in a set of procedures or anything that leaves that temple security exposed to a threat. Now, a couple of different
terms we need to highlight within this is end of life systems in this case is used respect to a product supply to customers,
indicating that the product is in the end of its useful life.
From have been, obviously, miss case from the vendor perspective, and the vendor stops marketing, selling all we work sustaining. The other words sustain that particular type of situation or software
when you have embedded system is a dedicated computer system designed for one arm or specific function.
This system is in bed as part of a complete device system that includes the heart works such as electrical as words were chemical components. Then we have a lack of vendor support. It's a level of vendor support that has become almost as important as the system functional features.
Improper input handling is used to describe a funding such validations, salinization, filtering, encoding or decoding off input data.
Improper handling is a leading cause of critical vulnerabilities that exists in today's systems as well as various applications.
Improper air handling. It can introduce of a right of security problems, particularly when you look at a website. The most common problems wounded when a detail interior error auto internal era MRS such as a stack trace database dump an era coast are displayed to the user. In other words, the hacker
Miss Configuration Office is a big issue, and offer time arises when your security settings are defined, implement and maintain as defaults.
Defoe configuration, particularly in computer sound, referred to a pre existent value off a user confortable settings. That is the sign. Other words, in this case of signing a software application, computer program and or device
the turn resource exhausted is a simple denial of service, a condition that happens when a resource acquire to execute and action are entirely expended, preventing that action from occurring.
One of the big issue we have nowadays untrained users. One of the physical bottomless is an untrained use. It only takes one person to cause a breach, and although it may be expensive to get everybody there in person and in a single room for half a day is much less expensive than a security breach that might happen. Letters are the words.
We have to exercise that ability be very proactive
before an event happens.
Improperly configured account is another big issue, like the focal figures and counts that have weak passwords, arm or or more person needed are vulnerable
and what happens? We have a clear example. Be elevated privileges.
They would have vulnerable, vulnerable business processes. It can affect a collection related structure. Activities, attacks by people equipment, which in specific sequence produce a service, a product for particular customer or other words. Customers.
You also have a week. Cyprus Sweet implementation is the fine as encryption or decryption algorithm that uses a key, often insufficiently.
When you go by the presser, using an insufficiently keep for an encryption or decryption, it opens up the possibility under words the probability that encryption scheme could be broken. Other words. It can be cracked
now in our upcoming topics. Working Tian discussion the main one, which is titled Threats, Attacks and Vulnerabilities and we continue our discussion off 1.6 explained the impact. So they associate it with the types of bone abilities.
I look forward to seeing a very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor