From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Risk analysis, assessment, and scope

Risk analysis, assessment, and scope

- [Presenter] Risks are everywhere in the world of information security. From hackers and malware to lost devices and missing security patches, there's a lot on the plate of information security professionals. Of course, addressing each one of these risks takes both time and money. Therefore, information security professionals need to prioritize their risk lists in order to spend these precious resources where they will have the greatest security effect. That's where risk assessment comes into play. Risk assessment is the process of identifying and triaging the risks facing an organization based on the likelihood of their occurrence and their expected impact on the organization. Before you begin a risk assessment, you should determine the scope of that assessment. This means deciding which parts of your organization, such as specific systems, departments, or processes, will be included. Setting the scope helps ensure that your assessment is focused and relevant, targeting key areas…

Contents