O'Reilly logo

Advanced Persistent Security by Araceli Treu Gomes, Ira Winkler

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 20

Know Your Adversaries

Abstract

To determine the structure of your security program, you need to determine the likely threats that you will face. By understanding your threats, you can determine the attack methods that might be used against you. Even if the threat is not malicious, you must acknowledge that there will be vulnerabilities exploited. Thus you can determine the vulnerabilities that should be prioritized for mitigation.

Keywords

Methods and operations; Rating scale; Threat; Threat intelligence; Vulnerabilities

“If you know yourself, but not the enemy, for every victory gained, you will also suffer a defeat.”

Sun Tzu

As potential adversaries have been discussed in Section 1, we will not go into detail about who the adversaries might ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required