O'Reilly logo

Managing Risk in Information Systems by Darril Gibson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Identifying and Analyzing Threats, Vulnerabilities, and Exploits

RISKS OCCUR when threats are able to exploit vulnerabilities. With this in mind, it becomes very important to be able to identify and analyze threats, vulnerabilities, and exploits. You can do so with threat assessments, vulnerability assessments, and exploit assessments.

A threat assessment attempts to identify as many threats as possible. It cannot identify all possible threats. Instead, it attempts to identify as many likely threats as possible. You can identify threats by reviewing historical data and using different threat modeling techniques.

A vulnerability assessment can help you identify weaknesses in your network. You can discover these weaknesses through several ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required