0% found this document useful (0 votes)
40 views7 pages

Types of Threat Assessments

Threat hunting involves actively searching networks and systems for past or present attacks based on suspicious activity and formulating hypotheses to verify against global event logs. Threat modelling identifies and addresses potential threats during application design to find vulnerabilities and security implications. Threat intelligence refers to collecting, analyzing tactics and techniques of cybercriminals from various sources to extract useful insights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views7 pages

Types of Threat Assessments

Threat hunting involves actively searching networks and systems for past or present attacks based on suspicious activity and formulating hypotheses to verify against global event logs. Threat modelling identifies and addresses potential threats during application design to find vulnerabilities and security implications. Threat intelligence refers to collecting, analyzing tactics and techniques of cybercriminals from various sources to extract useful insights.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

THREAT 01

HUNTING ASSESSMENT
VS VS

MODELLING INTELLIGENCE
PREFACE 01

We always get confused with various threat activities and


relate them to threat detection alone.

Threat Detection involves monitoring and analyzing various


sources of information, such as network traffic, system
logs, user behavior, and physical security measures, to
uncover signs of suspicious or anomalous activities.

It sets rules and conditions. Once a condition is met, an


alert is triggered.
THREAT HUNTING
01

Threat hunting is a proactive approach aimed at actively


searching for attacks (past and present) within an
organization's networks, systems, or applications.

Based on suspicious activity, it formulates a hypothesis.


These hypotheses are formulated by security experts using
a creative and flexible methodology, then verified against a
global log of events from endpoints around the world.
THREAT MODELLING
01

Threat modeling is defined as the process of proactively


identifying and addressing potential threats to an
organization’s systems .

Typically, organizations conduct threat modeling during the


design stage (but it can occur at other stages) of a new
application to help developers find vulnerabilities and
become aware of the security implications of their design,
code, and configuration decisions.
THREAT INTELLIGENCE
01

Threat intelligence refers to the collection, analysis, of


information about the threat landscape, including the
tactics, techniques, and procedures (TTPs) employed by
cybercriminals and threat actors.

It involves gathering data from various sources, such as


security vendors, open-source intelligence, dark web
monitoring, and internal logs, and then processing and
analyzing that data to extract actionable insights.
THREAT ASSESSMENT
01

Threat assessment refers to the process of identifying,


evaluating, and analyzing potential threats or risks to
individuals, organizations, or systems and enhance security

It involves gathering information, conducting assessments,


and making informed judgments about the severity and
likelihood of specific threats.
DID YOU LIKE OUR PLAYBOOK
AND IF YOU NEED MORE FREE

TRAININGS | CHECKLISTS
WHITEPAPERS | TEMPLATES

FOLLOW US ON

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy