IT Examiner School, Seaside, CA
Identify Vulnerabilities
Weaknesses in a system or controls, which include: Software, hardware, physical, and administrative weaknesses ❖ Anything that can be exploited for gain!
Software Vulnerabilities • Programming errors Hardware Vulnerabilities
• Device failure • Power failure Physical Vulnerabilities • Unrestricted facility access
• Lack of fire/flood controls/HVAC • Location (crime, regional, weather) Administrative Vulnerabilities • Antivirus software not kept up-to-date
• Vendor patches not installed • Unnecessary services running • Configuration (user) error • Personnel policies
Risk Assessment Process
Identify and value
sensitivity of information
assets.
Identify potential internal/
external threats and/or
vulnerabilities.
Rank likelihood and impact
of threats and/or
vulnerabilities.
Assess sufficiency of risk
control policies,
procedures, information
systems, etc.
Made with FlippingBook - Online catalogs