Asset
Assessment:
A cybersecurity assessment analyzes your organization's cybersecurity
controls and their ability to remediate vulnerabilities. These risk assessments
should be conducted within the context of your organization's business
objectives, rather than in the form of a checklist as you would for a
cybersecurity audit.
Vulnerability
Assessment:
A vulnerability
assessment is a systematic review of security weaknesses in an information system. It evaluates if
the system is susceptible to any known vulnerabilities, assigns severity levels to those vulnerabilities, and recommends remediation or mitigation, if and whenever
needed.
Threat
Assessment:
Cyber
threat analysis is the process of assessing the cyber activities and capabilities of unknown intelligence
entities or criminals. ... Threats posed by cyber-attacks include denial of service attacks (DoS), computer
viruses, malware, phishing emails, and others. The attacks target anyone with
an online presence.
Legal
Assessment:
A cybersecurity assessment analyzes your organization's cybersecurity controls and their ability to remediate
vulnerabilities. These risk assessments should be conducted within the context of
your organization's business objectives, rather than in the form of a checklist
as you would for a cybersecurity audit.