From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Vulnerability impact

Vulnerability impact

- [Instructor] Vulnerabilities in our infrastructure, systems and applications expose our organizations to the risk of a security breach. Before we explore vulnerabilities in detail, let's spend some time reviewing the goals of cybersecurity and the types of risk that can occur in an organization. When we think of the goals of information security, we often use a model known as the CIA triad, shown here. The CIA triad highlights the three most important functions that information security performs in an enterprise: confidentiality, integrity, and availability. Confidentiality ensures that only authorized individuals have access to information and resources. This is what most people think of when they think about cybersecurity, keeping secrets away from prying eyes. And confidentiality is, in fact, how security professionals spend the majority of their time. Malicious individuals seeking to undermine confidentiality are said to engage in disclosure, making sensitive information…

Contents