Module 3 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

13 hours 9 minutes
Video Transcription
Hello and congratulations. You've made it to the threat modeling summary for the penetration testing, execution standard.
what did we learn so far?
we looked at a general modeling process with respect, the threat modeling. We gave you a high level process and kind of did an overview of that. We used an example to demonstrate how that process could be worked and how you could go about modeling threats and looking at critical and secondary systems or primary and secondary systems.
And we looked at some tools such a CVS s scores and other methodologies
forthright modeling.
We looked at business asset analysis of what it was and the different data types within that, such as organizational data and pulley data, customer data and human assets. And how those can overall impact and organizations well, being with respect to them being compromised or having issues.
We looked at business process analysis that we discussed what it is. We looked at technical infrastructure, information assets, human assets and third party integrations with respect to how they support the overall business processes and how if they were impacted, they could cause issues, downtime, loss of reputation,
things of that nature. When we're looking at threat modeling,
we looked at threat agent and community analysis. We discussed what that was. We discussed employees and management and, overall, how to lay out the potential threats to an organization. We then went on to discuss threat capability analysis, discussing some tools that could be used by different parties and the likelihood they could use these tools,
relevant exploits and payloads that may be available to certain parties.
Communication mechanisms that could be used by those parties and accessibility overall to the internal systems and data sets that the threats could pose a risk to.
We looked at motivation modeling where we just discussed what that was and some of the different things that would motivate someone. Profit hacktivism, direct Reg is fun reputation, further access to a partner connected system. The sky's the limit as faras motivations, and I'm sure there are people out there that will just make things up to motivate them to do things.
And then we discussed relevant news and how to go about looking at relevant news for an organization again focusing on the last 12 months if Abel and stained with in a vertical that way We have some stories and some particular events that hit close to home and would be applicable to the client organization that you're working with.
So with that in mind, I want to thank you for your time today,
and I look forward to seeing you again soon.
Up Next