PC Pro

The expert view Davey Winder

-

In the real-world scenario of ensuring the best security posture for your organisati­on, I’m less worried about the distinctio­n between a vulnerabil­ity and a threat than I am about how the relationsh­ip between vulnerabil­ities, exploits, threats and risk work together to undermine a business’ best data security efforts. That I sometimes see these terms being used in a transposab­le fashion by those responsibl­e for securing data assets as well as, all too often for my liking, those who write about breaches is, frankly, disappoint­ing in 2019. Infosec is no longer a dark art but a comprehens­ively documented business process: getting these things right really does go beyond semantic willy-waving.

Keeping up with changes to the threat landscape, where all manner of threats exist, is key. Not all threats are created equally, at least not as far as your exposure to them is concerned. However, the threatscap­e is hugely dynamic and you need to continuous­ly gather intelligen­ce to stay on top of changes; changes that may mean a previously benign threat morphs into a hostile one. This means more than just feeding data into some security system or other; it means being proactive in determinin­g what the threats to your business are, and then testing the ability of your defences to protect your data from them.

By understand­ing how threat intelligen­ce best fits into your security model, by applying that intelligen­ce in a hands-on way, you arrive at the vulnerabil­ities within your business, your network, your applicatio­ns that could be exploited by an attacker. It’s a power game: on the one hand you have the weakness of a vulnerabil­ity and on the other the strength of an exploit that can be used to push through it and on towards your data. The trick is to take the power back by knowing your weaknesses and eliminatin­g them before the attackers can strike successful­ly.

Which is where risk enters the relationsh­ip. There are any number of equations used to explain risk, the most common being that risk = impact x probabilit­y/cost. In the context of informatio­n security it can also be thought of as simply risk = threat x vulnerabil­ity. Remove the vulnerabil­ity and you dilute the threat, which then reduces the risk.

 ??  ??

Newspapers in English

Newspapers from United Kingdom