1. 0Introduction 1



Download 25.74 Kb.
Page8/11
Date15.05.2021
Size25.74 Kb.
#56632
1   2   3   4   5   6   7   8   9   10   11
cyber hygiene
Risk Assessment
Cyber security risk assessments are used to identify, estimate, and prioritize risk to organizational operations, organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems.
The primary purpose of a cyber-risk assessment is to help inform decision-makers and support proper risk responses. They also provide an executive summary to help executives and directors make informed decisions about security. The information security risk assessment process is concerned with answering the following questions:


  • What are our organization's most important information technology assets?

  • What data breach would have a major impact on our business whether from malware, cyber-attack or human error? Think customer information.

  • What are the relevant threats and the threat sources to our organization?

  • What are the internal and external vulnerabilities?

  • What is the impact if those vulnerabilities are exploited?

  • What is the likelihood of exploitation?

  • What cyber-attacks, cyber threats, or security incidents could impact affect the ability of the business to function?

  • What is the level of risk my organization is comfortable taking?

Identify and prioritize assets


A cyber threat is any vulnerability that could be exploited to breach security to cause harm or steal data from your organization. While hackers, malware, and other IT security risks leap to mind, there are many other threats:

1   2   3   4   5   6   7   8   9   10   11




The database is protected by copyright ©ininet.org 2024
send message

    Main page