Module 5 Discussion

docx

School

Saint Leo University *

*We aren’t endorsed by this school

Course

510

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

1

Uploaded by ColonelKomodoDragonPerson999

Report
Discuss how threat identification should be performed within your organization or university. Should every threat be planned for? Why or why not? Ward IT Security gives a great beginning step to identify threats in an organization. They are very basic steps, however building off of them would be quite easy for an organization to do. The four steps they present are… Analyzing and understanding the particular threat portfolio specific to your organization and its operation. Effectively prioritizing the evaluation of your system vulnerabilities. Determining how those vulnerabilities may be exploited by a specific threat actor or actions. Providing a report of findings with detailed information that allows your organization to implement preemptive risk management actions. I don’t think you can plan for every threat, because not every threat exists right now, and like Ward mentions, threats can be specific to the type of organization you are. A grocery store chain may not have the same vulnerabilities as a bank; and vice versa. The tools may be the same in how we detect, prevent, and mitigate but not necessarily the same philosophy. Threat identification . WARD IT SECURITY. (2019, April 3). https://warditsecurity.com/threat- identification/
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help