IT Examiner School eBook
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Risk Mitigation: Controls
• Risk response is achieved using Controls. • Administrative, Technical, Physical • Safeguard: Deterrents or Preventives • Countermeasures: Detective or Correctives
• Controls must have specific objectives associated with them.
• Controls must be measurable.
50
Made with FlippingBook - Online magazine maker