Security risk

From Wikipedia, the free encyclopedia - View original article

 
Jump to: navigation, search

Security Risk describes employing the concept of risk to the security risk management paradigm to make a particular determination of security orientated events.

Security risk is the demarcation of risk, into the security silo, from the broader enterprise risk management framework for the purposes of isolating and analysing unique events, outcomes and consequences.[1]

Security risk is often, quantitatively, represented as any event that compromises the assets, operations and objectives of an organisation. 'Event', in the security paradigm, comprises those undertaken by actors intentionally for purposes that adversely affect the organisation.

The role of the 'actors' and the intentionality of the 'events', provides the differentiation of security risk from other risk management silos, particularly those of safety, environment, quality, operational and financial.

Common Approaches to Analysing Security Risk[edit]

Main article: IT risk

Some security professionals describe the relationship between security terms according to one of the following formulas.

Risk = Threat × Harm

Risk = Consequence × Threat × Vulnerability

Risk = Consequence × Likelihood

Risk = Consequence × Likelihood × Vulnerability

These formulas should be considered as intuitive relations rather than scientific models. Jeff Lowder has in an Internet blog argued that Risk = Consequence x Threat x Vulnerability are mathematical nonsense.[2][3]

Factor Analysis of Information Risk deeply analyze different risk factors and measure security risk.

There are a number of methodologies to analyse and manage security risk: see Category:Risk analysis methodologies

Usually after a cost benefit analysis a countermeasure is set to decrease the likelihood or the consequence of the threat. Security service is the name of countermeasure while transmitting the information.

Psychological Factors relating to Security Risk[edit]

Main article: Risk - Risk in Psychology

Given the strong influence affective states can play in the conducting of security risk assessment, many papers have considered the roles of affect heuristic[4] and biases in skewing findings of the process.[5]

See also[edit]

References[edit]

  1. ^ Function of security risk assessments to ERM
  2. ^ http://www.bloginfosec.com/2010/08/23/why-the-risk-threats-x-vulnerabilities-x-impact-formula-is-mathematical-nonsense/
  3. ^ http://www.bloginfosec.com/2010/08/31/why-the-%e2%80%9crisk-threat-x-vulnerability-x-impact%e2%80%9d-formula-is-mathematical-nonsense-part-2/
  4. ^ Keller, C., Siegrist, M., & Gutscher, H. The Role of the Affect and Availability Heuristics in Risk Communication. Risk Analysis, Vol. 26, No. 3, 2006
  5. ^ Heuristics and risk perception – Risk assessments pitfalls

External links[edit]