Chapter 2: Managing Threats, Vulnerabilities, and Risks
"You can never eliminate all risks – focus on identifying highest risks and mitigate or remove".
– Dianne Johansen - Security IT Director | IBM
As a cybersecurity professional, you will have to deal with a plurality of vulnerabilities, threats, and risks. These three terms are normally used synonymously; however, they are very different, and it is very important that you understand how to approach and manage them.
Now, you need to understand that there are no risk-free systems and your infrastructure and systems could (and will) fail at any time. Therefore, you must be prepared to ensure that your business continues (or resumes) operations if there is a disaster.
In this second chapter, we will cover the following main topics:
- What a vulnerability assessment is and how to create one
- The most common types of vulnerabilities
- An overview of USB HID vulnerabilities and devices ...