Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and…
Chapter 8: Identifying and Analyzing Threats, Vulnerabilities, and Exploits
What threat assessments are: A threat assessment identifies and evaluates potential threats. The goal is to identify as many potential threats as possible and then evaluate the threats.
-
-
-
-
What vulnerability assessments are: Performed to identify vulnerabilities within an organization. Vulnerabilities are any weaknesses in an IT infrastructure.
External Assessments - Outside consultants are hired to assess the security by exploiting the system to see what they can learn. Good at quickly identifying weaknesses.
-
Internal Vulnerability Assessments - Security professionals try to exploit the internal system to see what they can learn about vulnerabilities. Some large companies have dedicated staff who regularly perform assessments. Smaller companies assign internal assessments as an extra task for an IT admin.
-