IT Examiner School eBook May 2025

Risk Appetite: The level of risk an organization is willing to accept in pursuit of its objectives, balancing potential benefits with possible losses.

IT Risk Assessment Overview Risk Assessment Lifecycle

Risk Identification: The process of finding, recognizing, and documenting risks that could impact the organization’s objectives or operations.

Risk Assessment: The evaluation of identified risks to understand their potential impact and likelihood, prioritizing them for action. Risk Response: The development and implementation of strategies to address identified risks, including mitigation, transfer, acceptance, or avoidance. Risk Monitoring: The ongoing process of tracking identified risks, assessing new risks, and evaluating the effectiveness of risk mitigation strategies.

Risk Terms Level Set

• Asset : Anything of value to the organization • Vulnerability : A weakness, abscess of a safeguard (control). • Threat : Something that could pose loss to all or part of an asset. • Threat Agent : What carries out the attack. • Exploit : An instance of compromise • Risk : The probability of a threat materializing.

• Controls : Physical, Administrative, and Technical protections. • Safeguard – Deterrents or Preventives. • Countermeasures- Detective or Correctives. • Inherent Risk : The risk before any control is implemented. • Residual Risk : Leftover risk after applying a control. • Secondary Risk : When one risk response triggers another risk event.

23

Made with FlippingBook - Online magazine maker