IT Examiner School

Countermeasure/Risk Relationship

Risk

Threat

Vulnerability

Leads To

Exploits

Damages

Affects

Exposure

Asset

Mitigated by

Countermeasure

Causing

57

Risk Analysis/Assessment The risk assessment must effectively Gather/Identify: • Data regarding the information and technology assets of the organization • Threats to those assets • Vulnerabilities • Existing security controls & processes • Current security standards and requirements

58

Made with FlippingBook Digital Publishing Software