课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Identifying threats

Identifying threats

- [Instructor] Organizations face many different kinds of threat, and it's often difficult to keep track of all these threats and identify those that pose the greatest risk. Security professionals use threat modeling techniques to identify and prioritize threats and assist in the implementation of security controls. When identifying potential threats to an organization, security professionals should use a structured approach. Don't just sit down and start thinking of all of the things that could go wrong; it's too easy to leave things out with this type of haphazard approach to threat identification. Instead, conduct a structured walkthrough of the potential threats to information and systems. Let's look at three ways that an organization can use a structured approach to threat identification. First, an organization can use an asset-focused approach. In this approach, analysts use the organization's asset inventory as the basis for their analysis and walk through asset by asset…

内容