# Negative threats, Risks, and vournerabilities

# Threats, risks, and vulnerabilities

<div class="cds-1 css-arowdh cds-3 cds-grid-item cds-48 cds-73" id="bkmrk-as-an-entry-level-se"><div class="rc-TranscriptHighlighter css-79elbk"><div class="rc-Transcript css-9li235" data-track="true" data-track-action="click" data-track-app="open_course_home" data-track-component="interactive_transcript" data-track-page="item_layout" role="presentation"><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item"><div class="phrases"><div aria-label="toggle video from As an entry-level security analyst, one of your many roles will be to handle" class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" role="button"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">As an entry-level security analyst, one of your many roles will be to handle </span></div><div aria-label="toggle video from current lecture segment: an organization's digital and physical assets." class="rc-Phrase active css-ugczj4" data-cue="2" data-cue-index="1" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">an organization's digital and physical assets. </span></div><div aria-label="toggle video from As a reminder," class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">As a reminder, </span></div><div aria-label="toggle video from an asset is an item perceived as having value to an organization." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">an asset is an item perceived as having value to an organization. </span></div><div aria-label="toggle video from During their lifespan, organizations acquire all types of assets, including" class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">During their lifespan, organizations acquire all types of assets, including </span></div><div aria-label="toggle video from physical office spaces, computers, customers' PII, intellectual property," class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">physical office spaces, computers, customers' PII, intellectual property, </span></div><div aria-label="toggle video from such as patents or copyrighted data, and so much more." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">such as patents or copyrighted data, and so much more. </span></div><div aria-label="toggle video from Unfortunately, organizations operate in an environment that presents" class="rc-Phrase css-ugczj4" data-cue="8" data-cue-index="7" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Unfortunately, organizations operate in an environment that presents </span></div><div aria-label="toggle video from multiple security threats, risks, and vulnerabilities to their assets." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">multiple security threats, risks, and vulnerabilities to their assets. </span></div><div aria-label="toggle video from Let's review what threats, risks, and vulnerabilities are and" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Let's review what threats, risks, and vulnerabilities are and </span></div><div aria-label="toggle video from discuss some common examples of each." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">discuss some common examples of each.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from A threat is any circumstance or event that can negatively impact assets." class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A threat is any circumstance or event that can negatively impact assets. </span></div><div aria-label="toggle video from One example of a threat is a social engineering attack." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">One example of a threat is a social engineering attack. </span></div><div aria-label="toggle video from Social engineering is a manipulation technique that exploits human error" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Social engineering is a manipulation technique that exploits human error </span></div><div aria-label="toggle video from to gain private information, access, or valuables." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to gain private information, access, or valuables. </span></div><div aria-label="toggle video from Malicious links in email messages that look like they're from legitimate companies" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Malicious links in email messages that look like they're from legitimate companies </span></div><div aria-label="toggle video from or people is one method of social engineering known as phishing." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">or people is one method of social engineering known as phishing. </span></div><div aria-label="toggle video from As a reminder, phishing is a technique that is used to acquire sensitive data," class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">As a reminder, phishing is a technique that is used to acquire sensitive data, </span></div><div aria-label="toggle video from such as user names, passwords, or banking information." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">such as user names, passwords, or banking information.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from Risks are different from threats." class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Risks are different from threats. </span></div><div aria-label="toggle video from A risk is anything that can impact the confidentiality, integrity," class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A risk is anything that can impact the confidentiality, integrity, </span></div><div aria-label="toggle video from or availability of an asset." class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">or availability of an asset. </span></div><div aria-label="toggle video from Think of a risk as the likelihood of a threat occurring." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Think of a risk as the likelihood of a threat occurring. </span></div><div aria-label="toggle video from An example of a risk to an organization might be the lack of backup protocols for" class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">An example of a risk to an organization might be the lack of backup protocols for </span></div><div aria-label="toggle video from making sure its stored information can be recovered in the event of an accident or" class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">making sure its stored information can be recovered in the event of an accident or </span></div><div aria-label="toggle video from security incident." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">security incident. </span></div><div aria-label="toggle video from Organizations tend to rate risks at different levels: low, medium," class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Organizations tend to rate risks at different levels: low, medium, </span></div><div aria-label="toggle video from and high, depending on possible threats and the value of an asset." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">and high, depending on possible threats and the value of an asset.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from A low-risk asset is information that would not harm the organization's reputation or" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A low-risk asset is information that would not harm the organization's reputation or </span></div><div aria-label="toggle video from ongoing operations, and would not cause financial damage if compromised." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">ongoing operations, and would not cause financial damage if compromised. </span></div><div aria-label="toggle video from This includes public information such as website content, or" class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This includes public information such as website content, or </span></div><div aria-label="toggle video from published research data." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">published research data.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from A medium-risk asset might include information that's not available" class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A medium-risk asset might include information that's not available </span></div><div aria-label="toggle video from to the public and may cause some damage to the organization's finances," class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">to the public and may cause some damage to the organization's finances, </span></div><div aria-label="toggle video from reputation, or ongoing operations." class="rc-Phrase css-ugczj4" data-cue="35" data-cue-index="34" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">reputation, or ongoing operations. </span></div><div aria-label="toggle video from For example, the early release of a company's quarterly earnings could impact" class="rc-Phrase css-ugczj4" data-cue="36" data-cue-index="35" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">For example, the early release of a company's quarterly earnings could impact </span></div><div aria-label="toggle video from the value of their stock." class="rc-Phrase css-ugczj4" data-cue="37" data-cue-index="36" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">the value of their stock.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from A high-risk asset is any information protected by regulations or laws," class="rc-Phrase css-ugczj4" data-cue="38" data-cue-index="37" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A high-risk asset is any information protected by regulations or laws, </span></div><div aria-label="toggle video from which if compromised, would have a severe negative impact on" class="rc-Phrase css-ugczj4" data-cue="39" data-cue-index="38" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">which if compromised, would have a severe negative impact on </span></div><div aria-label="toggle video from an organization's finances, ongoing operations, or reputation." class="rc-Phrase css-ugczj4" data-cue="40" data-cue-index="39" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">an organization's finances, ongoing operations, or reputation. </span></div><div aria-label="toggle video from This could include leaked assets with SPII, PII," class="rc-Phrase css-ugczj4" data-cue="41" data-cue-index="40" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">This could include leaked assets with SPII, PII, </span></div><div aria-label="toggle video from or intellectual property." class="rc-Phrase css-ugczj4" data-cue="42" data-cue-index="41" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">or intellectual property.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from Now, let's discuss vulnerabilities." class="rc-Phrase css-ugczj4" data-cue="43" data-cue-index="42" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Now, let's discuss vulnerabilities. </span></div><div aria-label="toggle video from A vulnerability is a weakness that can be exploited by a threat." class="rc-Phrase css-ugczj4" data-cue="44" data-cue-index="43" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A vulnerability is a weakness that can be exploited by a threat. </span></div><div aria-label="toggle video from And it's worth noting that both a vulnerability and" class="rc-Phrase css-ugczj4" data-cue="45" data-cue-index="44" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And it's worth noting that both a vulnerability and </span></div><div aria-label="toggle video from threat must be present for there to be a risk." class="rc-Phrase css-ugczj4" data-cue="46" data-cue-index="45" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">threat must be present for there to be a risk. </span></div><div aria-label="toggle video from Examples of vulnerabilities include: an outdated firewall, software, or" class="rc-Phrase css-ugczj4" data-cue="47" data-cue-index="46" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Examples of vulnerabilities include: an outdated firewall, software, or </span></div><div aria-label="toggle video from application; weak passwords; or unprotected confidential data." class="rc-Phrase css-ugczj4" data-cue="48" data-cue-index="47" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">application; weak passwords; or unprotected confidential data. </span></div><div aria-label="toggle video from People can also be considered a vulnerability." class="rc-Phrase css-ugczj4" data-cue="49" data-cue-index="48" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">People can also be considered a vulnerability. </span></div><div aria-label="toggle video from People's actions can significantly affect an organization's internal network." class="rc-Phrase css-ugczj4" data-cue="50" data-cue-index="49" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">People's actions can significantly affect an organization's internal network. </span></div><div aria-label="toggle video from Whether it's a client, external vendor, or employee," class="rc-Phrase css-ugczj4" data-cue="51" data-cue-index="50" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Whether it's a client, external vendor, or employee, </span></div><div aria-label="toggle video from maintaining security must be a united effort." class="rc-Phrase css-ugczj4" data-cue="52" data-cue-index="51" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">maintaining security must be a united effort.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from So entry-level analysts need to educate and" class="rc-Phrase css-ugczj4" data-cue="53" data-cue-index="52" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">So entry-level analysts need to educate and </span></div><div aria-label="toggle video from empower people to be more security conscious." class="rc-Phrase css-ugczj4" data-cue="54" data-cue-index="53" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">empower people to be more security conscious. </span></div><div aria-label="toggle video from For example, educating people on how to identify a phishing email is a great starting point." class="rc-Phrase css-ugczj4" data-cue="55" data-cue-index="54" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">For example, educating people on how to identify a phishing email is a great starting point. </span></div><div aria-label="toggle video from Using access cards to grant employee access to physical spaces while" class="rc-Phrase css-ugczj4" data-cue="56" data-cue-index="55" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Using access cards to grant employee access to physical spaces while </span></div><div aria-label="toggle video from restricting outside visitors is another good security measure." class="rc-Phrase css-ugczj4" data-cue="57" data-cue-index="56" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">restricting outside visitors is another good security measure. </span></div><div aria-label="toggle video from Organizations must continually improve their efforts when it comes to" class="rc-Phrase css-ugczj4" data-cue="58" data-cue-index="57" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Organizations must continually improve their efforts when it comes to </span></div><div aria-label="toggle video from identifying and mitigating vulnerabilities to minimize threats and risks." class="rc-Phrase css-ugczj4" data-cue="59" data-cue-index="58" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">identifying and mitigating vulnerabilities to minimize threats and risks. </span></div><div aria-label="toggle video from Entry-level analysts can support this goal by encouraging employees to" class="rc-Phrase css-ugczj4" data-cue="60" data-cue-index="59" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Entry-level analysts can support this goal by encouraging employees to </span></div><div aria-label="toggle video from report suspicious activity and actively monitoring and" class="rc-Phrase css-ugczj4" data-cue="61" data-cue-index="60" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">report suspicious activity and actively monitoring and </span></div><div aria-label="toggle video from documenting employees' access to critical assets." class="rc-Phrase css-ugczj4" data-cue="62" data-cue-index="61" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">documenting employees' access to critical assets.</span></div></div></div></div><div class="cds-1 css-xl5mb3 cds-2"><div class="cds-1 rc-Paragraph css-ch7t2i cds-3 cds-grid-item">  
<div class="phrases"><div aria-label="toggle video from Now that you're familiar with some of the threats, risks, and" class="rc-Phrase css-ugczj4" data-cue="63" data-cue-index="62" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Now that you're familiar with some of the threats, risks, and </span></div><div aria-label="toggle video from vulnerabilities analysts frequently encounter," class="rc-Phrase css-ugczj4" data-cue="64" data-cue-index="63" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">vulnerabilities analysts frequently encounter, </span></div><div aria-label="toggle video from coming up, we'll discuss how they impact business operations." class="rc-Phrase css-ugczj4" data-cue="65" data-cue-index="64" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">coming up, we'll discuss how they impact business operations.</span></div></div></div></div></div></div></div><div class="cds-1 css-hcqebr cds-3 cds-grid-item cds-48 cds-66" id="bkmrk-"><div class="cds-508 cds-formControl-root css-1834zxd cds-511"><div class="cds-546 cds-531 cds-input-root cds-input-onLight cds-select-field-root css-14fuxgf cds-547"><div aria-haspopup="listbox" aria-labelledby="cds-react-aria-124-label cds-react-aria-124-value" class="cds-520 cds-521 cds-select-select cds-524 cds-557 cds-541 cds-input-input" id="bkmrk--1" role="button" tabindex="0"></div></div></div></div>

# Herbert: Manage threats, risks, and vulnerabilities

<div aria-label="toggle video from My name is Herbert and I am a Security Engineer at Google." class="rc-Phrase css-ugczj4" data-cue="1" data-cue-index="0" id="bkmrk-my-name-is-herbert-a" role="button"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">My name is Herbert and I am a Security Engineer at Google. </span></div><div aria-label="toggle video from I think I've always been interested in security," class="rc-Phrase css-ugczj4" data-cue="2" data-cue-index="1" id="bkmrk-i-think-i%27ve-always-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I think I've always been interested in security, </span></div><div aria-label="toggle video from in high school our school gave us these huge Dell laptops." class="rc-Phrase css-ugczj4" data-cue="3" data-cue-index="2" id="bkmrk-in-high-school-our-s" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">in high school our school gave us these huge Dell laptops. </span></div><div aria-label="toggle video from There wasn't a whole lot of security within those computers." class="rc-Phrase css-ugczj4" data-cue="4" data-cue-index="3" id="bkmrk-there-wasn%27t-a-whole" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">There wasn't a whole lot of security within those computers. </span></div><div aria-label="toggle video from So, many of my friends would have cracked versions of like video games like Halo," class="rc-Phrase css-ugczj4" data-cue="5" data-cue-index="4" id="bkmrk-so%2C-many-of-my-frien" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">So, many of my friends would have cracked versions of like video games like Halo, </span></div><div aria-label="toggle video from that's really where I learned how to start manipulating computers to kind of do what" class="rc-Phrase css-ugczj4" data-cue="6" data-cue-index="5" id="bkmrk-that%27s-really-where-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">that's really where I learned how to start manipulating computers to kind of do what </span></div><div aria-label="toggle video from I want." class="rc-Phrase css-ugczj4" data-cue="7" data-cue-index="6" id="bkmrk-i-want.%C2%A0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I want. </span></div><div aria-label="toggle video from current lecture segment: I guess [LAUGH] my day to day consists of analyzing security risks and" class="rc-Phrase active css-ugczj4" data-cue="8" data-cue-index="7" id="bkmrk-i-guess-%5Blaugh%5D-my-d" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I guess \[LAUGH\] my day to day consists of analyzing security risks and </span></div><div aria-label="toggle video from providing solutions to those risks." class="rc-Phrase css-ugczj4" data-cue="9" data-cue-index="8" id="bkmrk-providing-solutions-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">providing solutions to those risks. </span></div><div aria-label="toggle video from A typical task for" class="rc-Phrase css-ugczj4" data-cue="10" data-cue-index="9" id="bkmrk-a-typical-task-for%C2%A0" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">A typical task for </span></div><div aria-label="toggle video from cybersecurity analysts would usually be something like exceptions requests." class="rc-Phrase css-ugczj4" data-cue="11" data-cue-index="10" id="bkmrk-cybersecurity-analys" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">cybersecurity analysts would usually be something like exceptions requests. </span></div><div aria-label="toggle video from Analyzing if someone needs to have special access to a device or document" class="rc-Phrase css-ugczj4" data-cue="12" data-cue-index="11" id="bkmrk-analyzing-if-someone" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Analyzing if someone needs to have special access to a device or document </span></div><div aria-label="toggle video from based on the role that the person has or the project that they're working on." class="rc-Phrase css-ugczj4" data-cue="13" data-cue-index="12" id="bkmrk-based-on-the-role-th" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">based on the role that the person has or the project that they're working on. </span></div><div aria-label="toggle video from One of the more common threats that we come across is misconfigurations or" class="rc-Phrase css-ugczj4" data-cue="14" data-cue-index="13" id="bkmrk-one-of-the-more-comm" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">One of the more common threats that we come across is misconfigurations or </span></div><div aria-label="toggle video from requesting access for something that you don't really need." class="rc-Phrase css-ugczj4" data-cue="15" data-cue-index="14" id="bkmrk-requesting-access-fo" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">requesting access for something that you don't really need. </span></div><div aria-label="toggle video from For example, I recently had a case where a vendor we" class="rc-Phrase css-ugczj4" data-cue="16" data-cue-index="15" id="bkmrk-for-example%2C-i-recen" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">For example, I recently had a case where a vendor we </span></div><div aria-label="toggle video from were working with had changed their OAuth scope requests." class="rc-Phrase css-ugczj4" data-cue="17" data-cue-index="16" id="bkmrk-were-working-with-ha" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">were working with had changed their OAuth scope requests. </span></div><div aria-label="toggle video from And basically that means that they were requesting more permissions to use Google" class="rc-Phrase css-ugczj4" data-cue="18" data-cue-index="17" id="bkmrk-and-basically-that-m" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">And basically that means that they were requesting more permissions to use Google </span></div><div aria-label="toggle video from services than they had before in the past." class="rc-Phrase css-ugczj4" data-cue="19" data-cue-index="18" id="bkmrk-services-than-they-h" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">services than they had before in the past. </span></div><div aria-label="toggle video from We weren't sure really how to go about that because that wasn't" class="rc-Phrase css-ugczj4" data-cue="20" data-cue-index="19" id="bkmrk-we-weren%27t-sure-real" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">We weren't sure really how to go about that because that wasn't </span></div><div aria-label="toggle video from a situation we've come across before." class="rc-Phrase css-ugczj4" data-cue="21" data-cue-index="20" id="bkmrk-a-situation-we%27ve-co" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">a situation we've come across before. </span></div><div aria-label="toggle video from So it's still ongoing, but" class="rc-Phrase css-ugczj4" data-cue="22" data-cue-index="21" id="bkmrk-so-it%27s-still-ongoin" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">So it's still ongoing, but </span></div><div aria-label="toggle video from we're working with partner teams to kind of develop a solution for that." class="rc-Phrase css-ugczj4" data-cue="23" data-cue-index="22" id="bkmrk-we%27re-working-with-p" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">we're working with partner teams to kind of develop a solution for that. </span></div><div aria-label="toggle video from I think another thing that we've seen is outdated systems," class="rc-Phrase css-ugczj4" data-cue="24" data-cue-index="23" id="bkmrk-i-think-another-thin" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I think another thing that we've seen is outdated systems, </span></div><div aria-label="toggle video from machines that need to be patched." class="rc-Phrase css-ugczj4" data-cue="25" data-cue-index="24" id="bkmrk-machines-that-need-t" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">machines that need to be patched. </span></div><div aria-label="toggle video from That sounds like an IT issue, but it's also definitely a cybersecurity issue." class="rc-Phrase css-ugczj4" data-cue="26" data-cue-index="25" id="bkmrk-that-sounds-like-an-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">That sounds like an IT issue, but it's also definitely a cybersecurity issue. </span></div><div aria-label="toggle video from Having outdated machines, not having proper device management policies," class="rc-Phrase css-ugczj4" data-cue="27" data-cue-index="26" id="bkmrk-having-outdated-mach" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Having outdated machines, not having proper device management policies, </span></div><div aria-label="toggle video from working with a team or many teams is a huge part of the job." class="rc-Phrase css-ugczj4" data-cue="28" data-cue-index="27" id="bkmrk-working-with-a-team-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">working with a team or many teams is a huge part of the job. </span></div><div aria-label="toggle video from In order to get really anything done, you need to communicate with not just the team" class="rc-Phrase css-ugczj4" data-cue="29" data-cue-index="28" id="bkmrk-in-order-to-get-real" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">In order to get really anything done, you need to communicate with not just the team </span></div><div aria-label="toggle video from that you're a part of, but with other teams." class="rc-Phrase css-ugczj4" data-cue="30" data-cue-index="29" id="bkmrk-that-you%27re-a-part-o" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">that you're a part of, but with other teams. </span></div><div aria-label="toggle video from Ten years ago I was working at a pizza joint and ten years later," class="rc-Phrase css-ugczj4" data-cue="31" data-cue-index="30" id="bkmrk-ten-years-ago-i-was-" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">Ten years ago I was working at a pizza joint and ten years later, </span></div><div aria-label="toggle video from here I am, at Google as a Security Engineer." class="rc-Phrase css-ugczj4" data-cue="32" data-cue-index="31" id="bkmrk-here-i-am%2C-at-google" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">here I am, at Google as a Security Engineer. </span></div><div aria-label="toggle video from If I told my 16 year old self that I would be here," class="rc-Phrase css-ugczj4" data-cue="33" data-cue-index="32" id="bkmrk-if-i-told-my-16-year" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">If I told my 16 year old self that I would be here, </span></div><div aria-label="toggle video from I wouldn't have believed myself, but it is possible." class="rc-Phrase css-ugczj4" data-cue="34" data-cue-index="33" id="bkmrk-i-wouldn%27t-have-beli" role="button" tabindex="0"><span aria-hidden="true" class="cds-137 css-1j071wf cds-139">I wouldn't have believed myself, but it is possible.</span></div>

# NIST’s Risk Management Framework

As you might remember from earlier in the program, the National Institute of Standards and Technology, NIST, provides many frameworks that are used by security professionals to manage risks, threats, and vulnerabilities.  
  
In this video, we're going to focus on NIST's Risk Management Framework or RMF. As an entry-level analyst, you may not engage in all of these steps, but it's important to be familiar with this framework. Having a solid foundational understanding of how to mitigate and manage risks can set yourself apart from other candidates as you begin your job search in the field of security.  
  
There are seven steps in the RMF: prepare, categorize, select, implement, assess, authorize, and monitor.  
  
Let's start with Step one, prepare. Prepare refers to activities that are necessary to manage security and privacy risks before a breach occurs. As an entry-level analyst, you'll likely use this step to monitor for risks and identify controls that can be used to reduce those risks.  
  
Step two is categorize, which is used to develop risk management processes and tasks. Security professionals then use those processes and develop tasks by thinking about how the confidentiality, integrity, and availability of systems and information can be impacted by risk. As an entry-level analyst, you'll need to be able to understand how to follow the processes established by your organization to reduce risks to critical assets, such as private customer information.  
  
Step three is select. Select means to choose, customize, and capture documentation of the controls that protect an organization. An example of the select step would be keeping a playbook up-to-date or helping to manage other documentation that allows you and your team to address issues more efficiently.  
  
Step four is to implement security and privacy plans for the organization. Having good plans in place is essential for minimizing the impact of ongoing security risks. For example, if you notice a pattern of employees constantly needing password resets, implementing a change to password requirements may help solve this issue.  
  
Step five is assess. Assess means to determine if established controls are implemented correctly. An organization always wants to operate as efficiently as possible. So it's essential to take the time to analyze whether the implemented protocols, procedures, and controls that are in place are meeting organizational needs. During this step, analysts identify potential weaknesses and determine whether the organization's tools, procedures, controls, and protocols should be changed to better manage potential risks.  
  
Step six is authorize. Authorize means being accountable for the security and privacy risks that may exist in an organization. As an analyst, the authorization step could involve generating reports, developing plans of action, and establishing project milestones that are aligned to your organization's security goals.  
  
Step seven is monitor. Monitor means to be aware of how systems are operating. Assessing and maintaining technical operations are tasks that analysts complete daily. Part of maintaining a low level of risk for an organization is knowing how the current systems support the organization's security goals. If the systems in place don't meet those goals, changes may be needed.  
  
Although it may not be your job to establish these procedures, you will need to make sure they're working as intended so that risks to the organization itself, and the people it serves, are minimized.

# Manage common threats, risks, and vulnerabilities

Previously, you learned that security involves protecting organizations and people from threats, risks, and vulnerabilities. Understanding the current threat landscapes gives organizations the ability to create policies and processes designed to help prevent and mitigate these types of security issues. In this reading, you will further explore how to manage risk and some common threat actor tactics and techniques, so you are better prepared to protect organizations and the people they serve when you enter the cybersecurity field.

## Risk management

A primary goal of organizations is to protect assets. An **asset** is an item perceived as having value to an organization. Assets can be digital or physical. Examples of digital assets include the personal information of employees, clients, or vendors, such as:

- Social Security Numbers (SSNs), or unique national identification numbers assigned to individuals
- Dates of birth
- Bank account numbers
- Mailing addresses

Examples of physical assets include:

- Payment kiosks
- Servers
- Desktop computers
- Office spaces

Some common strategies used to manage risks include:

- **Acceptance**: Accepting a risk to avoid disrupting business continuity
- **Avoidance**: Creating a plan to avoid the risk altogether
- **Transference**: Transferring risk to a third party to manage
- **Mitigation**: Lessening the impact of a known risk

Additionally, organizations implement risk management processes based on widely accepted frameworks to help protect digital and physical assets from various threats, risks, and vulnerabilities. Examples of frameworks commonly used in the cybersecurity industry include the National Institute of Standards and Technology Risk Management Framework ([NIST RMF<svg aria-labelledby="cds-react-aria-423-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk-" role="img" viewbox="0 0 16 16" width="16"></svg>](https://csrc.nist.gov/projects/risk-management/about-rmf)) and Health Information Trust Alliance ([HITRUST<svg aria-labelledby="cds-react-aria-424-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--1" role="img" viewbox="0 0 16 16" width="16"></svg>](https://hitrustalliance.net/product-tool/hitrust-csf/?utm_term=&utm_campaign=HITRUST_i1_PaidSearch&utm_source=adwords&utm_medium=ppc&hsa_acc=2724012343&hsa_cam=16641331914&hsa_grp=136906352837&hsa_ad=598980848547&hsa_src=g&hsa_tgt=dsa-1659695676388&hsa_kw=&hsa_mt=&hsa_net=adwords&hsa_ver=3&gclid=Cj0KCQiAorKfBhC0ARIsAHDzsluRN5tSpCQal-rYnZLo2wUNppQdUHUba82LMX3JMGOoRPEJ6wG6-LgaAryYEALw_wcB)).

Following are some common types of threats, risks, and vulnerabilities you’ll help organizations manage as a security professional.

## Today’s most common threats, risks, and vulnerabilities

### **Threats**

A **threat** is any circumstance or event that can negatively impact assets. As an entry-level security analyst, your job is to help defend the organization’s assets from inside and outside threats. Therefore, understanding common types of threats is important to an analyst’s daily work. As a reminder, common threats include:

- **Insider threats:** Staff members or vendors abuse their authorized access to obtain data that may harm an organization.
- **Advanced persistent threats (APTs):** A threat actor maintains unauthorized access to a system for an extended period of time.

### **Risks**

A **risk** is anything that can impact the confidentiality, integrity, or availability of an asset. A basic formula for determining the level of risk is that risk equals the likelihood of a threat. One way to think about this is that a risk is being late to work and threats are traffic, an accident, a flat tire, etc.

There are different factors that can affect the likelihood of a risk to an organization’s assets, including:

- **External risk:** Anything outside the organization that has the potential to harm organizational assets, such as threat actors attempting to gain access to private information
- **Internal risk:** A current or former employee, vendor, or trusted partner who poses a security risk
- **Legacy systems:** Old systems that might not be accounted for or updated, but can still impact assets, such as workstations or old mainframe systems. For example, an organization might have an old vending machine that takes credit card payments or a workstation that is still connected to the legacy accounting system.
- **Multiparty risk:** Outsourcing work to third-party vendors can give them access to intellectual property, such as trade secrets, software designs, and inventions.
- **Software compliance/licensing:** Software that is not updated or in compliance, or patches that are not installed in a timely manner

There are many resources, such as the NIST, that provide lists of [cybersecurity risks<svg aria-labelledby="cds-react-aria-425-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--2" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.nist.gov/itl/smallbusinesscyber/cybersecurity-basics/cybersecurity-risks). Additionally, the Open Web Application Security Project (OWASP) publishes a standard awareness document about the [top 10 most critical security risks<svg aria-labelledby="cds-react-aria-426-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--3" role="img" viewbox="0 0 16 16" width="16"></svg>](https://owasp.org/www-project-top-ten/) to web applications, which is updated regularly.

**Note:** The OWASP’s common attack types list contains three new risks for the years 2017 to 2021: insecure design, software and data integrity failures, and server-side request forgery. This update emphasizes the fact that security is a constantly evolving field. It also demonstrates the importance of staying up to date on current threat actor tactics and techniques, so you can be better prepared to manage these types of risks.

<div id="bkmrk--4"><figure contenteditable="false" role="figure">![Lists that compare the top 10 most common attack types between 2017 and 2021](https://d3c33hcgiwev3.cloudfront.net/imageAssetProxy.v1/szc-NuF5QlGxA_zoi9LvEg_f089df6d2f2b4fd0bf7ebd806ed63cf1_S33G012.png?expiry=1686009600000&hmac=7gtUOlIaK5r5E9LJEsbFEFUXT55Pi29AkRP7HBlh4z8)</figure></div>### **Vulnerabilities**

A **vulnerability** is a weakness that can be exploited by a threat. Therefore, organizations need to regularly inspect for vulnerabilities within their systems. Some vulnerabilities include:

- **ProxyLogon:** A pre-authenticated vulnerability that affects the Microsoft Exchange server. This means a threat actor can complete a user authentication process to deploy malicious code from a remote location.
- **ZeroLogon:** A vulnerability in Microsoft’s Netlogon authentication protocol. An authentication protocol is a way to verify a person's identity. Netlogon is a service that ensures a user’s identity before allowing access to a website's location.
- **Log4Shell:** Allows attackers to run Java code on someone else’s computer or leak sensitive information. It does this by enabling a remote attacker to take control of devices connected to the internet and run malicious code.
- **PetitPotam:** Affects Windows New Technology Local Area Network (LAN) Manager (NTLM). It is a theft technique that allows a LAN-based attacker to initiate an authentication request.
- **Security logging and monitoring failures:** Insufficient logging and monitoring capabilities that result in attackers exploiting vulnerabilities without the organization knowing it
- **Server-side request forgery:** Allows attackers to manipulate a server-side application into accessing and updating backend resources. It can also allow threat actors to steal data.

As an entry-level security analyst, you might work in vulnerability management, which is monitoring a system to identify and mitigate vulnerabilities. Although patches and updates may exist, if they are not applied, intrusions can still occur. For this reason, constant monitoring is important. The sooner an organization identifies a vulnerability and addresses it by patching it or updating their systems, the sooner it can be mitigated, reducing the organization’s exposure to the vulnerability.

To learn more about the vulnerabilities explained in this section of the reading, as well as other vulnerabilities, explore the [NIST National Vulnerability Database<svg aria-labelledby="cds-react-aria-427-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--5" role="img" viewbox="0 0 16 16" width="16"></svg>](https://nvd.nist.gov/vuln) and [CISA Known Exploited Vulnerabilities Catalog<svg aria-labelledby="cds-react-aria-428-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--6" role="img" viewbox="0 0 16 16" width="16"></svg>](https://www.cisa.gov/known-exploited-vulnerabilities-catalog).

## Key takeaways

In this reading, you learned about some risk management strategies and frameworks that can be used to develop organization-wide policies and processes to mitigate threats, risks, and vulnerabilities. You also learned about some of today’s most common threats, risks, and vulnerabilities to business operations. Understanding these concepts can better prepare you to not only protect against, but also mitigate, the types of security-related issues that can harm organizations and people alike.

## Resources for more information

To learn more, click the linked terms in this reading. Also, consider exploring the following sites:

- [OWASP Top Ten<svg aria-labelledby="cds-react-aria-429-title" class="css-6zc608" fill="none" focusable="false" height="16" id="bkmrk--7" role="img" viewbox="0 0 16 16" width="16"></svg>](https://owasp.org/www-project-top-ten/)
- [NIST RMF](https://csrc.nist.gov/projects/risk-management/about-rmf)

# Wrap-up

You've now completed the first section of this course! Let's review what we've discussed so far.  
  
We started out by exploring the focus of CISSP's eight security domains. Then, we discussed threats, risks, and vulnerabilities, and how they can impact organizations. This included a close examination of ransomware and an introduction to the three layers of the web.  
  
Finally, we focused on seven steps of the NIST Risk Management Framework, also called the RMF.  
  
You did a fantastic job adding new knowledge to your security analyst toolkit. In upcoming videos, we'll go into more detail about some common tools used by entry-level security analysts. Then, you'll have an opportunity to analyze data generated by those tools to identify risks, threats, or vulnerabilities. You'll also have a chance to use a playbook to respond to incidents. That's all for now. Keep up the great work!