Security risk

From Wikipedia, the free encyclopedia

Security Risk describes employing the concept of risk to the security risk management paradigm to make a particular determination of security orientated events.

Security risk is the demarcation of risk, into the security silo, from the broader enterprise risk management framework for the purposes of isolating and analysing unique events, outcomes and consequences.[1]

Security risk is often, quantitatively, represented as any event that compromises the assets, operations and objectives of an organisation. 'Event', in the security paradigm, comprises those undertaken by actors intentionally for purposes that adversely affect the organisation.

The role of the 'actors' and the intentionality of the 'events', provides the differentiation of security risk from other risk management silos, particularly those of safety, environment, quality, operational and financial.

Common Approaches to Analysing Security Risk

Some security professionals define security according to one of the following formulas.

Risk = Threat × Harm Risk=? Risk = Consequence × Threat × Vulnerability

Risk = Consequence × Likelihood

Risk = Consequence × Likelihood × Vulnerability

However, Jeff Lowder has argued that the Risk = Consequence x Threat x Vulnerability is "mathematical nonsense."

Factor Analysis of Information Risk deeply analyze different risk factors and measure security risk.

There are a number of methodologies to analyse and manage security risk: see Category:Risk analysis methodologies

Usually after a cost benefit analysis a countermeasure is set to decrease the likelihood or the consequence of the threat. Security service is the name of countermeasure while transmitting the information.

Psychological Factors relating to Security Risk

Main article: Risk - Risk in Psychology

Given the strong influence affective states can play in the conducting of security risk assessment, many papers have considered the roles of affect heuristic[2] and biases in skewing findings of the process.[3]

See also

References

  1. Function of security risk assessments to ERM
  2. Keller, C., Siegrist, M., & Gutscher, H. The Role of the Affect and Availability Heuristics in Risk Communication. Risk Analysis, Vol. 26, No. 3, 2006
  3. Heuristics and risk perception – Risk assessments pitfalls

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.