ABSTRACT

This chapter describes the second component of an effective information security/IA program — performing vulnerability and threat analyses. Outputs from the previous component, defining the system boundaries, are used during the vulnerability and threat analyses. To conduct vulnerability and threat analyses, the following activities are performed:

IA analysis techniques are selected and used.