The Ultimate Strategy To Identify Threats In A Network And Perform Risk Exposure Matrix

Written by gtmars | Published 2020/10/07
Tech Story Tags: risk-management | risk-assessment | risk-rating | vulnerability-management | cve | software-development | technology | security | web-monetization

TLDR A threat could be a potential danger that may exploit a vulnerability to breach security and so cause harm to the organization. A threat will be “intentional” or “unconditional”, man made actions, or occurred through any internal events. The next step is to identify the corresponding weaknesses (vulnerabilities) in your organizational network, Internal/external systems, resources, and organizational policies the external/internal threats could exploit that. I recommend following up on the latest ISO27005 standard listing of threats and vulnerabilities.via the TL;DR App

no story

Written by gtmars | Sharing knowledge in the digital world about Cybersecurity.
Published by HackerNoon on 2020/10/07