Topic: Security+ Domain 2 — Vulnerabilities, Exploits, Network Attacks & Application Attacks


❓ Essential Question

How do attackers take advantage of system and application vulnerabilities, and what clues help defenders recognize these attacks?


⭐ Key Ideas


🔑 Vocabulary

Vulnerability — A weakness that can be exploited.

Exploit — Code or action that uses a vulnerability to attack a system.

Buffer Overflow — More data than memory can handle.

Injection Attack — Attacker inserts malicious code (SQL, command, script).

XSS (Cross-Site Scripting) — Malware inside the browser.

CSRF — Forcing a user to unknowingly perform an action.

Privilege Escalation — Gaining higher permissions than allowed.