Analyze threats and vulnerabilities in information systems.
Analysis should include concepts such as
- threat – a circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely affect organizational operations, organizational assets, individuals, other organizations, or society
- vulnerability – a characteristic or specific weakness that renders an organization or asset open to exploitation by a given threat or susceptible to a given hazard
- asset (as it relates to a secure environment) – persons, structures, facilities, information and records, information technology systems and resources, materials, processes, relationships, or reputation that has value
- exploit – a technique to breach the security of a network or information system
- attack vector – a path or route used by the adversary to gain access to the target (i.e., asset)
- threat agents – an individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- safeguards – a practice, procedure, or mechanism that reduces risk.
Process/Skill Questions:
Thinking
- What is an asset in a secure environment?
- What is an attack vector?
Communication
- What information should be communicated to stakeholders when a cyber threat has been identified?
- What are communication consequences if individuals do not understand cybersecurity threat and vulnerability issues?
Leadership
- How can leaders guide others to identify and analyze threat actors?
- How can leaders support others in learning more about threat actors?
Management
- What consequences may result if a person is not alert to the presence of cyber threats?
Teacher Resources: