2023 IT Examiner School

Risk Assessment Process

Identify and value information assets

Identify potential internal/external threats and/or vulnerabilities

Assess likelihood & impact of threats/vulnerabilities

Risk Response (Accept, Transfer, Reduce, Ignore)

Assess sufficiency of risk control policies, procedures, information systems, etc.

Identifying Assets Electronic (Network maps, hardware/software, systems, databases, computers, media) Paper-Based (Policies, reports, contracts, financial records) Outsourcing arrangements

Cloud computing Intangibles Assets

Made with FlippingBook - Share PDF online