From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Identifying threats

Identifying threats

From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering

Start my 1-month free trial

Identifying threats

- [Instructor] Organizations face many different kinds of threat, and it's often difficult to keep track of all these threats and identify those that pose the greatest risk. Security professionals use threat modeling techniques to identify and prioritize threats, and assist in the implementation of security controls. When identifying potential threats to an organization, security professionals should use a structured approach. Don't just sit down and start thinking of all of the things that could go wrong. It's too easy to leave things out with this type of haphazard approach to threat identification. Instead, conduct a structured walkthrough of the potential threats to information and systems. Let's look at three ways that an organization can use a structured approach to threat identification. First, an organization can use an asset-focused approach. In this approach, analysts use the organization's asset inventory as…

Contents