World Library  
Flag as Inappropriate
Email this Article

Security risk

Article Id: WHEBN0010669772
Reproduction Date:

Title: Security risk  
Author: World Heritage Encyclopedia
Language: English
Subject: Risk assessment, Supply chain security, ISO 31000, ISO/PAS 28000
Collection:
Publisher: World Heritage Encyclopedia
Publication
Date:
 

Security risk

Security Risk describes employing the concept of risk to the security risk management paradigm to make a particular determination of security orientated events.

Security risk is the demarcation of risk, into the security silo, from the broader enterprise risk management framework for the purposes of isolating and analysing unique events, outcomes and consequences.[1]

Security risk is often, quantitatively, represented as any event that compromises the assets, operations and objectives of an organisation. 'Event', in the security paradigm, comprises those undertaken by actors intentionally for purposes that adversely affect the organisation.

The role of the 'actors' and the intentionality of the 'events', provides the differentiation of security risk from other risk management silos, particularly those of safety, environment, quality, operational and financial.

Common Approaches to Analysing Security Risk

Main article: It risk

Some security professionals define security according to one of the following formulas.

Risk = Threat × Harm

Risk = Consequence × Threat × Vulnerability

Risk = Consequence × Likelihood

Risk = Consequence × Likelihood × Vulnerability

However, Jeff Lowder has argued that the Risk = Consequence x Threat x Vulnerability is "nonsense."

Factor Analysis of Information Risk deeply analyze different risk factors and measure security risk.

There are a number of methodologies to analyse and manage security risk: see Category:Risk analysis methodologies

Usually after a cost benefit analysis a countermeasure is set to decrease the likelihood or the consequence of the threat. Security service is the name of countermeasure while transmitting the information.

Psychological Factors relating to Security Risk

Main article: Risk - Risk in Psychology

Given the strong influence affective states can play in the conducting of security risk assessment, many papers have considered the roles of affect heuristic[2] and biases in skewing findings of the process.[3]

See also

Computer Security portal
Business_and_economics portal

References

External links

  • Society of Information Risk Analysts
  • 800-30 NIST Risk Management Guide
  • 800-39 NIST DRAFT Managing Risk from Information Systems: An Organizational Perspective
  • FIPS Publication 199, Standards for Security Categorization of Federal Information and Information
  • FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
  • 800-37 NIST Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
  • FISMApedia is a collection of documents and discussions focused on USA Federal IT security
  • Internet2 Information Security Guide: Effective Practices and Solutions for Higher Education
  • The Institute of Risk Management (IRM) is risk management's leading international professional education and training body
  • [1] NGO Security Risk Assessment Recommended Guidance
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and USA.gov, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for USA.gov and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
 
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
 
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.
 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.