A Threat
A threat is something that could damage, disrupt or compromise any of your
assets, tangible or intangible, data being an obvious target. If the threat is realised, it will cause a level of harm.
Threats come in 3 main categories:
Accidental, Deliberate and Natural (Further broken down into external and internal
Accidental, Internal threat: User
spilling tea on laptop
Deliberate, Internal threat: Disgruntled
employee turning off power
Natural - External threat: Flood,
Earthquake, Natural disaster
Deliberate, External threat: Hacker
gaining unauthorised access to IT
System from the Internet
Threat Management
Challenges and Threats of the Internet of Things (IoT)
The potential risks of social media use in the workplace
Vulnerabilities
Asset Management
Impact
Likelihood and Probability
Risk Assessment and Business Impact Analysis
Risk Management Processes
Risk Management Terminology
The context of risk assessment is driven by the business’s view on risk.
Key business risk terminologies include: Risk Capacity, Risk Appetite, Risk Acceptance, Risk Tolerance
Risk Capacity
Risk capacity refers to the maximum amount of risk a business can sustain without being adversely impacted in its viability.
Risk Appetite
Risk appetite refers to the amount of risk that a business is willing to take in order to achieve its goals and objectives. This level of risk is typically lower than the business’s risk capacity, as it represents the maximum level of risk the business is able to tolerate without compromising its viability.
Risk Acceptance
Risk Acceptance: the minimum level of risk that a business is willing to tolerate on a daily basis after implementing risk treatments. Controls are applied to reduce risk to an economically feasible level, and the business accepts what remains.
Risk Tolerance
Risk tolerance is the acceptable variation in risk that a business can tolerate to achieve a specific objective. It is the level between the risk acceptance and risk appetite where the business may temporarily exceed the risk appetite to allow for flexibility.
Risk Identification and Categories
Risk Analysis
Risk Evaluation
What are the four ways risk can be treated?
Risk can be treated in four different ways:
Avoid the risk
Accept the risk
Reduce the risk (mitigation)
Transfer the risk
Which of the following options describes a method of treating risk in risk management?
a) Risk Avoidance
b) Risk Identification
c) Risk Assessment
d) Risk Analysis
A) Risk Avoidance. Risk avoidance is a method of treating risk where the organization takes actions to completely eliminate or avoid the risk by not engaging in the activity or process that presents the risk.
Risk Controls
We treat risk through the use of security controls of which there are three types:
Physical controls – guards, doors, fences, locks
Procedural controls – processes, policies, procedures, sometimes called
administrative controls
Technical controls – firewalls, access lists, IDS, IPS
Risk Controls Categories
The three types of controls are implemented through control categories:
Preventative – a firewall would be a technical preventative control.
Directive – a policy or procedure
Detective – could be physical security guard or technical CCTV
Corrective – antivirus could be a technical corrective control
Deterrent – something that would deter an attacker, a guard dog.
Recovery – restore service, backups or disaster recovery
Compensating – supplement the primary control, CCTV as well as security
guard
Which of the following categories of controls focuses on preventing incidents or threats from occurring in the first place?
a) Detective controls
b) Corrective controls
c) Preventative controls
d) Directive controls
C) Preventative controls. Preventative controls are designed to proactively reduce or eliminate the likelihood of incidents or threats occurring. They aim to prevent or minimize risks by implementing measures such as firewalls, access controls, security training, and secure coding practices.