Making Sense of Cybersecurity cover
welcome to this free extract from
an online version of the Manning book.
to read more
or

8 Understanding risk

 

This chapter covers

  • Demonstrating the differences between issues, vulnerabilities, threats, and risks
  • Enriching our existing model of the three factors of cybersecurity
  • Exploring CVE and CVSS scores, learning how to measure the severity of a vulnerability, and learning for yourself how to calculate CVE and CVSS values
  • Learning how to apply context to a risk model
  • Combining this knowledge to build easy-to-read reports showing the level of risk

As we kick off part 2 of the book, we start looking at things from a purely defensive point of view and dive in at a deeper level to see how to protect ourselves and our organizations from attackers. Although it would be useful for you to have read the first half of the book, this chapter can be treated as a standalone reference that can be read in isolation. You might find it helpful to read chapter 2, where we talk about building a cybersecurity strategy.

8.1 Issues vs. vulnerabilities vs. threats vs. risks

One of the biggest areas of confusion in cybersecurity, and one of the biggest barriers to effectively communicating cybersecurity concerns, is the confusion around definitions and key terms. Vendors will often (sometimes deliberately) conflate these terms, using them interchangeably, so let’s lay down some definitions:

8.2 How likely is a hack?

8.3 How bad will it be?

8.3.1 Common Vulnerability Scoring System

8.3.2 CVE Vector

8.3.3 Making things personal

8.4 A simple model to measure risk

8.5 How do I measure and communicate this?

8.5.1 Page 1: Our security matrix

8.5.2 Page 2: Our vulnerabilities

8.5.3 Page 3: Our security roadmap

8.5.4 Page 4: Information and actions

Summary

sitemap