From the course: Cybersecurity Risk Management Fundamentals by Pearson
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Conducting a risk assessment
From the course: Cybersecurity Risk Management Fundamentals by Pearson
Conducting a risk assessment
So in conducting a risk assessment, you need to understand the scope and objectives. What do we want to achieve? What are we looking to achieve by conducting a risk assessment? Identify your assets, very important, remember I talked about it. And when you're looking at your assets, Pay attention to the assets that are critical to the organization. What are the assets that are of value to us as an organization? And make sure these assets are well defined. Identify the traits that could affect the assets. Document this trait for each assets. Don't group, don't identify just one asset for the entire organization and one trait. For each asset, ensure that you document the threats. Identify vulnerabilities. Ensure that you identify the vulnerabilities that could affect the assets. Remember we said vulnerabilities are weaknesses. Document these vulnerabilities. Assess your impacts and likelihood. After you have identified your assets, threats, and vulnerabilities, assess your impacts and…
Contents
-
-
-
-
(Locked)
Learning objectives39s
-
(Locked)
Common cyber threats and vulnerabilities5m 27s
-
(Locked)
Principles of risk assessment: Impact, likelihood, and vulnerabilities7m 38s
-
(Locked)
Methods of identifying and evaluating cyber risk5m 29s
-
(Locked)
Qualitative vs. quantitative risk assessment7m 6s
-
(Locked)
Conducting a risk assessment3m 14s
-
(Locked)
Real-world risk identification examples7m 43s
-
(Locked)
-
-
-
-
-