Community QuestionSeen on 9 CBTs
Analysis of threats (Step 2)
Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
Answer
Deals with identification the adversaries, their intent, and their capability to use the information against an organization. Once we identify the threats, we can study their Techniques, Tactics, and Procedures (TTPs) and start prioritizing how we can monitor for those specific activities.