S3SS10N Wednesday – NIST SP 800-30 Part 2

Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – NIST SP 800-30 Part 2

Published: September 21, 2016 | By: Dean Pompilio | Views: 4255
This post has been saved to your profile

This Weeks S3SS10N Wednesday

This lesson continues where the last one left off and covers NIST SP 800-30 and continues discussing different adversarial threat, considered malicious events such as malware, exploring and compromising, exploitation and physical access (to name only a few). Also discussed are non-adversarial threat events such as spills, fires, disc and other equipment errors. These are not considered malicious as they are accidents that can happen due to factors beyond our control such as natural disasters and random issues with equipment. This session also covers:

  • Vulnerabilities/weaknesses along with pre-disposing conditions
  • Likelihood of threat occurrence (adversarial and non-adversarial)
  • Risk determination

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

Dean Pompilio
Dean Pompilio has been in the IT field since 1989 and has both US and international experience working in the banking and credit card industries. After spending most of this life in Chicago, he came to the Washington, DC area in 2005 and has worked with the Department of Justice as well as the State Department in senior analyst roles as well as The World Bank.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
1 Comment
  1. Thank you for the document walkthrough. Great presentation.

Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?