© Sai Chan/Shutterstock

Identifying and Analyzing Threats, Vulnerabilities, and Exploits

CHAPTER
8

RISKS OCCUR when threats are able to exploit vulnerabilities. With this in mind, identifying and analyzing threats, vulnerabilities, and exploits is important. These processes can be done with threat assessments, vulnerability assessments, and exploit assessments.

A threat assessment attempts to identify threats, but it cannot identify all possible threats. Instead, it attempts to identify as many likely threats as possible. By reviewing historical data and using different threat-modeling techniques, threats can be identified.

Weaknesses in a network can be identified by doing a vulnerability assessment. Several means are available for discovering these weaknesses. Some are manual, such as reviewing documentation, performing audits, or interviewing personnel, and others are automated by using vulnerability scanners.

An exploit assessment attempts to identify vulnerabilities that can actually be exploited.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.174.95