Page 1034 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1034

the definition has changed.

                  To avoid confusion within this book, we typically use the term
                  attacker for malicious intruders. An attack is any attempt to

                  exploit the vulnerability of a system and compromise
                  confidentiality, integrity, and/or availability.




               Risk Elements

               Chapter 2, “Personnel Security and Risk Management Concepts,”
               covers risk and risk management in more depth, but it’s worth
               reiterating some terms in the context of access control attacks. A risk

               is the possibility or likelihood that a threat will exploit a vulnerability
               resulting in a loss such as harm to an asset. A threat is a potential
               occurrence that can result in an undesirable outcome. This includes
               potential attacks by criminals or other attackers. It also includes
               natural occurrences such as floods or earthquakes, and accidental acts
               by employees. A vulnerability is any type of weakness. The weakness

               can be due to a flaw or limitation in hardware or software, or the
               absence of a security control such as the absence of antivirus software
               on a computer.

               Risk management attempts to reduce or eliminate vulnerabilities, or
               reduce the impact of potential threats by implementing controls or
               countermeasures. It is not possible, or desirable, to eliminate risk.
               Instead, an organization focuses on reducing the risks that can cause

               the most harm to their organization. The key tasks that security
               professionals complete early in a risk management process are as
               follows:

                    Identifying assets

                    Identifying threats

                    Identifying vulnerabilities


               Identifying Assets


               Asset valuation refers to identifying the actual value of assets with the
               goal of prioritizing them. Risk management focuses on assets with the
   1029   1030   1031   1032   1033   1034   1035   1036   1037   1038   1039