Summary
In this chapter, we reviewed and explored vulnerability assessments and threat modeling. We discussed different types of vulnerability assessments and what an assessment life cycle looks like and wrapped up with some of the tools used to facilitate those assessments. We also discussed threat modeling in this chapter, discussing how assessment can be used to model an attack. We also discussed the kill chain and the steps in that process. Lastly, we discussed threat modeling frameworks and tools used to complete the process. This chapter draws a close to the high-level concepts and theories of ethical hacking and security. With these concepts in mind, you can now begin to see risks and threats from a new perspective where you can not only acknowledge a threat exists but also address its relevance in the form of risk to an organization. This is invaluable in IT and security departments for budgets and resource allocation.
In the next chapter, we will be going deeper, looking...