Page 84 - CISSO_Prep_ Guide
P. 84

identified. Several documents list many of the dangers to
            review, including ISO/IEC27005 and NIST SP800-30 Rev1.

            Threats are usually factors beyond the control of the
            organization. No policy will ever remove the threat of insider
            attack, nor will protection eliminate the risk of a tornado.


            Vulnerabilities

            A vulnerability is a weakness in a system or control that could
            be exploited by a threat. This may be an unpatched system, an
            untrained user, aging equipment, a building in a flood plain, or a
            control that is not being monitored and operated correctly. The
            risk assessor must consider the vulnerabilities since an asset
            with more significant weaknesses will be more likely to be
            exploited or suffer more damage than a properly defended asset.

            Whereas threats are usually outside of the control of the
            organization, most vulnerabilities are within the power of the
            organization. It is through the recognition of weaknesses that an
            organization can select appropriate solutions and risk mitigation
            solutions.


            Likelihood

            The likelihood is the probability that an adverse event will occur
            or that a threat will exploit a vulnerability. The possibility is a
            complicated calculation or estimation to make since it is very
            subjective and unpredictable. Probability plays on the law of
            averages - how often have things happened in the past? But that
            may not be an accurate predictor for the future. A future event
            may never arise or may happen more often than it has in the
   79   80   81   82   83   84   85   86   87   88   89