The Concept of Threat (and stuff)

Threats, Risk and Vulnerabilities

<aside> πŸ‘‰ Threats

</aside>

Threats are the things which want to cause harm to the organisation

<aside> πŸ‘‰ Vulnerabilities

</aside>

<aside> πŸ‘‰ What is risk?

</aside>

$$ Risk = Threats * Vulnerabilities $$

Threat mapping

The continuous process of tracking and understanding critical threats to our entity.

<aside> πŸ‘‰ How to do threat mapping?

</aside>

Column 1

Our critical assets and the business processes that support them

Column 2

Who would want to cause harm to our organisation?

Column 3 (The Security Roadmap)

The vulnerabilities that would help these threats manifest

Threat agents

<aside> πŸ‘‰ Cyber Criminals

</aside>

Criminals who profit off from computer based illegal activities, have a low risk tolerance in general and try to earn maximum money from minimal effort

<aside> πŸ‘‰ Hacktivists

</aside>

Don't cover their tracks, and voluntarily disclose about public wrongdoings and other illegal things

<aside> πŸ‘‰ Advanced Persistent Threats (Cyber Espionage)

</aside>

Dealing With Insider Threats

What if we have someone on the inside wanting to hurt the organisation, stealing and ex-filtrating data, that someone can be referred to an as Insider Threat and it can be anyone starting from an employee to a business partner.

<aside> πŸ‘‰ Identification of Insider Activity

</aside>

All this must be done only after consulting with the HR department and getting their approval

<aside> πŸ‘‰ Insider Threat Assessment Checklist

</aside>

Dealing with Intellectual Property Cases

<aside> πŸ‘‰ Preparation: Surveying our Intellectual Property

</aside>

<aside> πŸ‘‰ Containment: Criminal or Civil Case?

</aside>

<aside> πŸ‘‰ Identification

</aside>

Looking for leaks and theft

Cyber Laws