paint-brush
The Ultimate Strategy To Identify Threats In A Network And Perform Risk Exposure Matrix by@gtmars
202 reads

The Ultimate Strategy To Identify Threats In A Network And Perform Risk Exposure Matrix

by Vic3mOctober 7th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A threat could be a potential danger that may exploit a vulnerability to breach security and so cause harm to the organization. A threat will be “intentional” or “unconditional”, man made actions, or occurred through any internal events. The next step is to identify the corresponding weaknesses (vulnerabilities) in your organizational network, Internal/external systems, resources, and organizational policies the external/internal threats could exploit that. I recommend following up on the latest ISO27005 standard listing of threats and vulnerabilities.
featured image - The Ultimate Strategy To Identify Threats In A Network And Perform Risk Exposure Matrix
 Vic HackerNoon profile picture
 Vic

Vic

@gtmars

Sharing knowledge in the digital world about Cybersecurity.

About @gtmars
LEARN MORE ABOUT @GTMARS'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

 Vic HackerNoon profile picture
Vic@gtmars
Sharing knowledge in the digital world about Cybersecurity.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Autarkic