7 Technical Data Gathering

7.1 Technical Threats and Safeguards

The concepts of threats, threat agents, and threat actions were covered earlier in Chapter 4. Technical threats specifically are covered here as an approach to introducing technical data gathering. This section, on threats and safeguards, is intended as a primer or introduction to security threats in the technical area.1

  • Technical Threats and Threat Actions—A member of a security risk assessment team cannot be effective without a basic understanding of the threats and safeguards within the technical security area. There are numerous technical security threats; some of the more frequent technical threats and safeguards are listed in Figure 7.1. The list of specific threat actions ...

Get The Security Risk Assessment Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.