Enterprise Risk Management: A Comprehensive Introduction to Managing Cyber Security and Information Security Risks by Bettwy Gwen
Author:Bettwy, Gwen
Language: eng
Format: epub
Publisher: Tactical Security Inc.
Published: 2024-06-02T00:00:00+00:00
Identify Vulnerabilities and Predisposing Conditions
Vulnerabilities and predisposing conditions can influence the extent of the likelihood that a threat event can result in negative impacts. The primary purpose of these assessments is for the team to get a feeling for the extent to which the organization (Level 1), mission or business process (Level 2), and information systems (Level 3) may be vulnerable to the relevant threat sources and events.
Predisposing conditions that exist within organizations, like existing business processes, information systems, and the specific operational environment, can contribute to the likelihood of threat events, underpinned by threat sources, having some form of negative impact on the organization, its mission, and systems. Matching the predisposing conditions to threat events will reduce the extent of potential risks to be assessed.
Sub-activities include:
â Identify vulnerability and predisposing condition inputs.
â Identify vulnerabilities using organization-defined information sources.
â Assess the severity of identified vulnerabilities.
â Identify predisposing conditions.
â Assess the pervasiveness of predisposing conditions.
The NIST SP 800-30 again provides a handy citation in this regard:
â some examples of inputs into the task of identifying vulnerability and predisposing conditions.
â an assessment scale for assessing the severity of identified vulnerabilities.
â a taxonomy for identification and characterization of predisposing conditions.
â an assessment scale for assessing the pervasiveness of predisposing conditions.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26286)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18814)
Shot Through the Heart by Mercy Celeste(18695)
The Fifty Shades Trilogy & Grey by E L James(18599)
The Subtle Art of Not Giving a F*ck by Mark Manson(13914)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13858)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(12817)
Scorched Earth by Nick Kyme(12516)
Drei Generationen auf dem Jakobsweg by Stein Pia(10747)
Suna by Ziefle Pia(10677)
Scythe by Neal Shusterman(10036)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9289)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9106)
This is Going to Hurt by Adam Kay(8739)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(7362)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(6765)
He Loves Me...KNOT by RC Boldt(6652)
Unleashing the Power of UX Analytics: Proven techniques and strategies for uncovering user insights [Team-IRA] [True PDF] by Jeff Hendrickson(6378)
Interdimensional Brothel by F4U(6095)
