Page 163 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 163

organization’s infrastructure through the circumvention of security
               controls and is able to directly imperil assets.

               The elements asset, threat, vulnerability, exposure, risk, and safeguard

               are related, as shown in Figure 2.4. Threats exploit vulnerabilities,
               which results in exposure. Exposure is risk, and risk is mitigated by
               safeguards. Safeguards protect assets that are endangered by threats.





































               FIGURE 2.4 The elements of risk


               Identify Threats and Vulnerabilities


               An essential part of risk management is identifying and examining
               threats. This involves creating an exhaustive list of all possible threats
               for the organization’s identified assets. The list should include threat
               agents as well as threat events. It is important to keep in mind that

               threats can come from anywhere. Threats to IT are not limited to IT
               sources. When compiling a list of threats, be sure to consider the
               following:

                    Viruses

                    Cascade errors (a series of escalating errors) and dependency faults
   158   159   160   161   162   163   164   165   166   167   168