1.

What Is Vulnerability Identification?

Answer»

We now face the challenge of reviewing each information asset for each threat it faces and creating a list of the vulnerabilities that remain VIABLE risks to the organization.

Vulnerabilities are specific avenues that threat agents can exploit to ATTACK an information asset.

Examine how each of the threats that are possible or likely COULD be perpetrated and list the organization's assets and their vulnerabilities.

The process works best when groups of PEOPLE with diverse backgrounds within the organization work iteratively in a series of BRAINSTORMING sessions.

We now face the challenge of reviewing each information asset for each threat it faces and creating a list of the vulnerabilities that remain viable risks to the organization.

Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset.

Examine how each of the threats that are possible or likely could be perpetrated and list the organization's assets and their vulnerabilities.

The process works best when groups of people with diverse backgrounds within the organization work iteratively in a series of brainstorming sessions.



Discussion

No Comment Found