- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 311字
- 2021-06-24 19:12:45
Risk analysis
The main role of an information security professional is to evaluate risks against enterprise assets (resources that need protection) and implement security controls to defend against those risks. Analyzing risks is a very important skill because good judgment will make us select the best security controls and protection mechanisms, including the amount of financial resources needed for the deployment of these safeguards. In other words, a bad decision will cost the enterprise a huge amount of money and even worse, the loss of customers' data. We can't calculate the risk in a quantitative way without knowing the threats and vulnerabilities. A threat is a potential danger to our assets that could harm the systems. A vulnerability is a weakness that allows the threat to take negative actions. These two terms and the connection between them is described by the formula Risk = Threat*Vulnerability.
To evaluate the threat and the vulnerability, you need to assign a number in a range of one to five, for example. Using another range is possible. Sometimes, we can add another factor named impact, which describes the impact of the damage caused. In other cases, it is expressed as an amount of money to describe the cost of that impact, so the formula could be expressed as Risk = Threat*Vulnerability*Impact.
The information security professional needs to classify risks based on two metrics: the frequency of occurrence and the severity of accident. The results of this classification will dictate the next action plan. Thus, if the risks are high, they must notify senior management. The next step is to create a roadmap to downgrade every risk to low, as much as possible, as shown here:

- Linux Mint Essentials
- Instant Handlebars.js
- Ubuntu Linux操作系統(tǒng)
- 新手學(xué)電腦從入門到精通(Windows 10+Office 2016版)
- 嵌入式實(shí)時(shí)操作系統(tǒng):RT-Thread設(shè)計(jì)與實(shí)現(xiàn)
- Mobile First Design with HTML5 and CSS3
- 細(xì)說Linux基礎(chǔ)知識
- Linux網(wǎng)絡(luò)配置與安全管理
- Microsoft Hyper-V Cluster Design
- 辦公自動化教程(Windows7+Office2010)
- 鴻蒙HarmonyOS應(yīng)用開發(fā)入門
- 再也不踩坑的kubernetes實(shí)戰(zhàn)指南
- 電腦辦公(Windows 7 + Office 2013)入門與提高
- Linux指令從初學(xué)到精通
- iOS Programming Cookbook