From the course: CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Vulnerability impact

Vulnerability impact

- [Instructor] Vulnerabilities in our infrastructure, systems, and applications expose our organizations to the risk of a security breach. Before we explore vulnerabilities in detail, let's spend some time reviewing the goals of cybersecurity and the types of risks that can occur in an organization. When we think of the goals of information security we often use a model known as the CIA triad shown here. The CIA triad highlights the three most important functions that information security performs in an enterprise: confidentiality, integrity, and availability. Confidentiality ensures that only authorized individuals have access to information and resources. This is what most people think of when they think about cyber security, keeping secrets away from prying eyes. And confidentiality is in fact how security professionals spend the majority of their time. Malicious individuals seeking to undermine confidentiality are said to…

Contents