Identifying threats and vulnerabilities
Why threat identification is important
Identifying the threat can be part of response
Threat knwoledge is often needed to properly respond
There are many kinds of threats to an organization's information
Insider threats
Not as big of a threat as in the past but still common
Some insider threats are unintentional
Still often overlooked
This should include contractors, suppliers and even customers!
Outside threats
APTs and other threat actors
Malware
Viruses
Script kiddies
Competitors
Natural disasters
Often cannot be quantitated
Could result in loss of life (most serious loss)
Uneducated end users
End-user attacks are the most common reasons for breach
Phishing attacks, other social engineering, etc
Training programs should include some knowledge of IR
Also often the first indicators of attack
Unqualified IT/security staff
Perhaps the biggest gap
Fixable with appropriate training and resources
Can be the best source of defense
Can also be the biggest vulnerability
Ransomware
Becoming more prevalent
Becoming harder to stop
They are getting smarter and expanding their scope
Last updated