Chapter 8. Identifying and Analyzing Threats, Vulnerabilities, and Exploits
RISKS OCCUR when threats are able to exploit vulnerabilities. With this in mind, it becomes very important to be able to identify and analyze threats, vulnerabilities, and exploits. You can do so with threat assessments, vulnerability assessments, and exploit assessments.
A threat assessment attempts to identify as many threats as possible. It cannot identify all possible threats. Instead, it attempts to identify as many likely threats as possible. You can identify threats by reviewing historical data and using different threat modeling techniques.
A vulnerability assessment can help you identify weaknesses in your network. You can discover these weaknesses through several ...
Get Managing Risk in Information Systems now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.