Filter posts by category

Basic

Risk Analysis – Part 3

Qualitative risk analysis focuses on not producing detailed numbers directly related to actual monetary figures. Qualitative analysis is not as focused on precise money calculations, making it considerably easier to calculate. However, many businesses prefer the quantitative analysis’s focus on money, as it is far easier to plug those numbers into budgets and projections. A […]

Risk Analysis – Part 3 Read More »

Basic

Risk Analysis – Part 2

Risk is calculated for threat/vulnerability pairs. It appears simplistic and straightforward. However, calculating values can be challenging. There are important factors that inform the definition that is omitted in this simplistic definition, as we will see. Likelihood Likelihood can be an additional input into the Risk equation outside of threat and vulnerability. Likelihood assessments attempt to

Risk Analysis – Part 2 Read More »

Basic

Risk Assessment

A risk assessment, a tool for risk management, identifies vulnerabilities and threats and assesses the possible impacts to determine where to implement security controls. After parts of a risk assessment are carried out, the results are analyzed. Risk analysis is a detailed examination of the components of risk used to ensure that security is cost-effective,

Risk Assessment Read More »

Basic, Tutorial

Risk Analysis -Part 1

Asset Asset identification is a crucial phase of the risk analysis process. Organizations would do well to first focus on asset identification for critical information systems.An Asset is Anything that has value to an organization, including, but not limited to, another organization, person, computing device, information technology (IT) system, IT network, IT circuit, software (both

Risk Analysis -Part 1 Read More »

Basic

Cybersecurity controls

Cybersecurity controls include safeguards or countermeasures implemented to protect an organization from an incident. Cybersecurity controls are used to prevent, detect, and mitigate cyber threats and attacks. There are six types of controls: Preventive Deterrent Detective Recovery Corrective Compensating Preventive Controls: It is always more cost-effective to prevent an event from happening than suffering an

Cybersecurity controls Read More »

Basic