Describing common threats
This section is going to cover some of the common threats that you should maintain an awareness of within your technology infrastructure. Before we discuss those common threats, it's important to understand how to identify a threat.
What is a threat?
As we discussed in the previous chapter, there are many stages of a cyberattack, and we protect against them by incorporating a defense in depth security posture. The reason that we do this is to decrease vulnerabilities within our infrastructure. A threat is created when an attacker takes advantage of a vulnerability. As security professionals, it is our responsibility to identify and respond to threats within our company infrastructure.
Threats can be internal or external. They are also not always intentional or malicious, nor necessarily meant to cause harm to the organization. We will discuss this in more detail as we identify some of these threats in the next sections. The threats listed are...