2023 IT Examiner School
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Risk Monitoring & Reporting
• A risk response is designed and implemented based on a risk assessment that was conducted at a single point in time. • Because of the changing nature of risk and associated controls, ongoing monitoring is an essential step of the risk
management life cycle. • Controls can be less effective • The operational environment may have changed, and new threats have emerged.
48
Made with FlippingBook - Share PDF online