Identifying risks
The process of security and risk management begins with the identification and assessment of risks. This is also considered to be a Business Impact Assessment. This involves conducting a thorough analysis of the organization’s assets, identifying potential threats and vulnerabilities, and evaluating the likelihood and impact of those risks. Risks can come from various sources, such as cyberattacks, natural disasters, human error, or even internal misconduct. An excerpt of a risk register with example risks can be seen in Table 4.1:
ID |
Risk |
Impact |
Likelihood |
Score |
Treatment/Remediation |
1 |
Malware |
Moderate |
High |
50 |
|