Filter posts by category

Risk Assessment

A risk assessment, a tool for risk management, identifies vulnerabilities and threats and assesses the possible impacts to determine where to implement security controls. After parts of a risk assessment are carried out, the results are analyzed. Risk analysis is a detailed examination of the components of risk used to ensure that security is cost-effective,

Risk Assessment Read More »

Basic, Tutorial

Risk Analysis -Part 1

Asset Asset identification is a crucial phase of the risk analysis process. Organizations would do well to first focus on asset identification for critical information systems.An Asset is Anything that has value to an organization, including, but not limited to, another organization, person, computing device, information technology (IT) system, IT network, IT circuit, software (both

Risk Analysis -Part 1 Read More »

Basic

Cybersecurity controls

Cybersecurity controls include safeguards or countermeasures implemented to protect an organization from an incident. Cybersecurity controls are used to prevent, detect, and mitigate cyber threats and attacks. There are six types of controls: Preventive Deterrent Detective Recovery Corrective Compensating Preventive Controls: It is always more cost-effective to prevent an event from happening than suffering an

Cybersecurity controls Read More »

Basic