Career and Technical Education (2022) Grade(s): 10-12 - Information Technology
CTE22.IT.C3.21
Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.
Identify network vulnerabilities that threat actors use to exploit an organization’s security and implement control measures to avoid such attacks.
COS Examples
Examples: malware, unpatched security vulnerabilities, hidden backdoor programs, superuser or Admin Account privileges