From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Modeling threats

Modeling threats

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

Modeling threats

- [Instructor] Threat modeling identifies possible vulnerabilities, along with ways cyber criminals can use the information across different entry points, such as software, hardware, networks, and the users. Threat modeling is becoming more important, as today, there are multiple security threats. Threats that include ransomware, which is holding data hostage. Supply chain attacks, where cyber criminals penetrate your system through a third party vendor. Formjacking, which is stealing information using banking and e-commerce sites that collect information using a form. And cryptojacking, which is using someone else's system to mine cryptocurrency. When evaluating threats, the security analyst performs several exercises to reduce overall risk. A vulnerability analysis is analyzing potential weaknesses for access vectors. A threat assessment is determining the best approach to securing a system against a particular…

Contents