- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 311字
- 2021-06-24 19:12:45
Risk analysis
The main role of an information security professional is to evaluate risks against enterprise assets (resources that need protection) and implement security controls to defend against those risks. Analyzing risks is a very important skill because good judgment will make us select the best security controls and protection mechanisms, including the amount of financial resources needed for the deployment of these safeguards. In other words, a bad decision will cost the enterprise a huge amount of money and even worse, the loss of customers' data. We can't calculate the risk in a quantitative way without knowing the threats and vulnerabilities. A threat is a potential danger to our assets that could harm the systems. A vulnerability is a weakness that allows the threat to take negative actions. These two terms and the connection between them is described by the formula Risk = Threat*Vulnerability.
To evaluate the threat and the vulnerability, you need to assign a number in a range of one to five, for example. Using another range is possible. Sometimes, we can add another factor named impact, which describes the impact of the damage caused. In other cases, it is expressed as an amount of money to describe the cost of that impact, so the formula could be expressed as Risk = Threat*Vulnerability*Impact.
The information security professional needs to classify risks based on two metrics: the frequency of occurrence and the severity of accident. The results of this classification will dictate the next action plan. Thus, if the risks are high, they must notify senior management. The next step is to create a roadmap to downgrade every risk to low, as much as possible, as shown here:

- Social Media Mining with R
- Linux系統文件安全實戰全攻略
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Learn Helm
- 巧學活用Windows 7
- Mastering Reactive JavaScript
- 一學就會:Windows Vista應用完全自學手冊
- 操作系統分析
- Django Project Blueprints
- Python UNIX和Linux系統管理指南
- 分布式系統設計實踐
- Multi-Cloud for Architects
- Microsoft Hyper-V Cluster Design
- SAP后勤模塊實施攻略:SAP在生產、采購、銷售、物流中的應用
- PrimeFaces Beginner's Guide