Threat and Risk Identification

This chapter has introduced you to the various elements of security, including vulnerabilities, threats, exploits, and risks that could potentially affect an unprepared or underprepared SOHO installation. But how do you know what you should protect your system against? You could attempt to protect your system from each and every type of malware and cyberattacks, but that could be expensive and drastically alter how you use your system. The only truly “safe” computer is locked in a closet with the lock on the inside and no electrical power source.

Threat Maps

Fortunately, several websites work to provide you with as-current-as-possible information on the most active threats from malware and attacks. These sites maintain lists, analyze the most common threats, or present maps that track attacks, some in real-time. Figure 2-8 shows a screen capture of the Microsoft Global threat activity map, but there are several others from other security companies:

A screenshot is titled Top 10 Web Application Security Risks.

FIGURE 2-8 Microsoft Global is just one of several companies that publish real-time threat maps.

Used with permission from Microsoft.

Description

A threat map, even those that claim to be real-time, depends on data it receives from a variety of sources and is only as accurate as the data it receives. A threat map is not something you can use in designing a security plan for your system, but it can tell you a bit about the threats currently active and perhaps should be considered when protecting your system.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset