CYBER.ORG: AP Cybersecurity – Lesson 2.3.1 – Application Vulnerabilities

Objective:

  • Students will analyze potential indicators associated with application attacks.

Standards:

CompTIA Security+ SYO-701 Objective:
2.3 – Explain various types of vulnerabilities

  • Application
    • Memory injection
    • Buffer overflow
    • Race conditions
      • Time-of-check (TOC)
      • Time-of-use (TOU)
    • Malicious Update

Guiding Question:

What are 3 application attacks that can occur by taking advantage of system memory?

Resources:

  • Lesson 2.3.1 – Application Vulnerabilities.pptx Presentation available on Google Classroom

Assignment:

  1. Read the Lesson 2.3.1 – Application Vulnerabilities.pptx presentation in today’s class.
  2. Complete the Case Study – iPhone Integer Overflow.pdf Activity in class using the materials provided in Google Classroom.

Assigned: November 18th, 2025
Teacher Pacing Due Date: November 19th, 2025