Risk Management
Risk Assessment is the process of identifying, analyzing, and evaluating potential threats and vulnerabilities that could negatively impact an organization’s assets, systems, or operations. It is a core component within an information security program.
Objectives of Risk Assessment
Step in Risk Assessment
|
Asset |
Threat |
Vulnerability |
Impact |
Likelihood |
Risk Level |
|
Customer Data |
Phishing Attack |
Lack of user training |
High |
High |
High |
|
Web Server |
DDoS Attack |
No traffic monitoring |
High |
Medium |
Medium |

Identifying Threats
A threat is anything that can compromise the confidentiality, integrity or availability of an information system.
A cyberthreat is a threat that exploits a digital vulnerability. For example, a denial of service (DoS) attack is a cyberthreat in which cybercriminals overwhelm part of a company's information system with traffic, causing it to crash.
Threats can also be physical. Natural disasters, physical or armed assaults and even systemic hardware failures are considered threats to a company's information system.
Identifying vulnerabilities
A vulnerability is any weakness in the information technology (IT) infrastructure that adversaries might exploit to gain unauthorized access to data. For example, hackers can take advantage of bugs in a computer program to introduce malware or malicious code into an otherwise legitimate app or service.
Human users can also constitute vulnerabilities in an information system. For example, cybercriminals might manipulate users into sharing sensitive information through social engineering attacks such as phishing.
Incident response planning
An incident response plan (IRP) typically guides an organization's efforts in responding to incidents.
Computer security incident response teams (CSIRT) often create and execute IRPs with the participation of stakeholders from across the organization. Members of the CSIRT might include the chief information security officer (CISO), chief AI officer (CAIO), security operations center (SOC), IT staff and representatives from legal, risk management and other nontechnical disciplines.

IRPs detail the mitigation steps that an organization takes when a significant threat is detected. While IRPs vary based on the organizations that craft them and the threats they target, common steps include:
Statlearner
Statlearner