Risk management methods
In this section of the book, we will be building a methodology for risk management. This methodology is not the only way that a RMF can be used but it is one of the methods that are out there.
Threat identification
In this section, we will consider the fundamentals of threat identification and how that is accomplished by the blue team.
In order to identify what threats we have to deal with, we must first identify what risk model is used in an organization.
- A threat is any situation or event with the capability to destructively affect organizational processes and assets, individuals, and other organizations, through an Information Technology (IT) system via unauthorized entry, destruction, disclosure, alteration of information, and/or denial of service. Threat events are caused by threat sources. A threat source is categorized as follows:
- The purpose and technique targeted at the abuse of a vulnerability
- A circumstance and method that...