From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Software security assessment

Software security assessment

From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review

Start my 1-month free trial

Software security assessment

- [Instructor] In Chapter Four of the video course, I discussed software security assessment. Let's review some of the key concepts. (intensifying swoosh) There are three ways that an organization can use a structured approach to threat identification. First, the organization can use an asset-focused approach. In this approach, analysts use the organization's asset inventory as the basis for their analysis, and walk through asset by asset, identifying the potential threats to that asset. Second, an organization can use a threat-focused approach. Using this method, the organization thinks of all the possible threats out there, and then thinks through how those threats might affect different organizational information systems. Finally, an organization can use a service-focused approach. This is most commonly used by service providers who offer services over the internet to other organizations. (intensifying swoosh) As…

Contents