Chapter 20

Know Your Adversaries

Abstract

To determine the structure of your security program, you need to determine the likely threats that you will face. By understanding your threats, you can determine the attack methods that might be used against you. Even if the threat is not malicious, you must acknowledge that there will be vulnerabilities exploited. Thus you can determine the vulnerabilities that should be prioritized for mitigation.

Keywords

Methods and operations; Rating scale; Threat; Threat intelligence; Vulnerabilities

“If you know yourself, but not the enemy, for every victory gained, you will also suffer a defeat.”

Sun Tzu

As potential adversaries have been discussed in Section 1, we will not go into detail about who the adversaries might ...

Get Advanced Persistent Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.