Security analysis involves evaluating the security posture of an organization, system, or application to identify vulnerabilities, threats, and risks.
Risk Assessment
-
assets (hardware, software, data). -
Identify threats (malware, phishing, insider threats, etc.). -
Evaluate vulnerabilities (unpatched software, misconfigurations). -
Determine impact and likelihood of threats exploiting vulnerabilities.
Threat Modeling
-
Map potential attack vectors. -
Use frameworks like STRIDE or DREAD. -
Model attacker behavior (internal/external).
Vulnerability Assessment
-
Use tools like: -
Nessus, OpenVAS – for network scans. -
Nikto, Burp Suite – for web application vulnerabilities. -
Review CVEs and security advisories. -
Patch management review.
Penetration Testing
-
Simulate real attacks to find exploitable vulnerabilities. -
Often categorized as: -
Black box (no internal info) -
White box (full info) -
Gray box (partial info)
Log Analysis & Monitoring>
-
Review logs (from firewalls, IDS/IPS, servers). -
Use SIEM tools like Splunk, ELK Stack, QRadar. -
Detect anomalies or patterns of attack.

