OPSEC step 2 – analysis of threats

This deals with identifying the adversaries (internal or external), their intent, and their capability to use the information against an organization. Once we identify the threats, we then can study their Techniques, Tactics, and Procedures (TTPs) and start prioritizing how we can monitor for these specific activities.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.197.251