From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Threat assessment

Threat assessment

From the course: CCSP Cert Prep: 5 Cloud Security Operations Audio Review

Start my 1-month free trial

Threat assessment

- [Instructor] The world is full of an overwhelming number of cybersecurity threats, so we need a structured way to approach them. In Chapter 7, I covered threat assessment techniques. We talked about the tools used to conduct threat assessments and how they can be either active or passive. Active tools engage directly with components of our technology environment, testing them for vulnerabilities and other issues. Passive tools simply observe what they can see on the network, watching for anomalies. One of these tools is a protocol analyzer. It's a passive tool that watches network traffic and allows us to inspect the contents of packets that traverse our networks. Honeypots are an active threat assessment tool. They're systems that are designed to look appealing to attackers and deliberately attract their attention. When someone attempts to attack a honeypot, the honeypot records their activity for analysis.…

Contents