wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IT RISK

profile
Anjali Tiwari
Aug 30, 2022
0 Likes
0 Discussions
181 Reads

Your IT systems and the information that you hold on them face a wide range of risks. If your business relies on technology for key operations and activities, you need to be aware of the range and nature of those threats.

Types of risks in IT systems

Threats to your IT systems can be external, internal, deliberate and unintentional. Most IT risks affect one or more of the following:

business or project goals

service continuity

bottom-line results

business reputation

security

infrastructure

 

Looking at the nature of risks, it is possible to differentiate between:

Physical threats - resulting from physical access or damage to IT resources such as the servers. These could include theft, damage from fire or flood, or unauthorised access to confidential data by an employee or outsider.

Electronic threats - aiming to compromise your business information - eg a hacker could get access to your website, your IT system could become infected by a computer virus, or you could fall victim to a fraudulent email or website. These are often of a criminal nature.

Technical failures - such as software bugs, a computer crash or the complete failure of a computer component. A technical failure can be catastrophic if, for example, you cannot retrieve data on a failed hard drive and no backup copy is available.

Infrastructure failures - such as the loss of your internet connection can interrupt your business - eg you could miss an important purchase order.

Human error - is a major threat - eg someone might accidentally delete important data, or fail to follow security procedures properly.

Measuring IT risk (or cyber risk) can occur at many levels. At a business level, the risks are managed categorically. Front line IT departments and NOC's tend to measure more discrete, individual risks. Managing the nexus between them is a key role for modern CISO's.

When measuring risk of any kind, selecting the correct equation for a given threat, asset, and available data is an important step. Doing so is subject unto itself, but there are common components of risk equations that are helpful to understand.

 

There are four fundamental forces involved in risk management, which also apply to cybersecurity. They are assets, impact, threats, and likelihood. You have internal knowledge of and a fair amount of control over assets, which are tangible and intangible things that have value. You also have some control over impact, which refers to loss of, or damage to, an asset. However, threats that represent adversaries and their methods of attack are external to your control. Likelihood is the wild card in the bunch. Likelihoods determine if and when a threat will materialize, succeed, and do damage. While never fully under your control, likelihoods can be shaped and influenced to manage the risk.


Comments ()


Sign in

Read Next

Studying ProRat

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Article on IT development trends

Blog banner

?Why Social and Emotional Skills Matter More Than ABCs in Early Years?

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

Fault tolerance

Blog banner

Decrypting Cryptocurrency: Tracing Transactions in Cyber Investigations

Blog banner

Cache Memory

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

Cloud Security: Trends and Innovations

Blog banner

A buffer overflow

Blog banner

How to write a cover letter

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Answer

Blog banner

VIDEO INTERVIEWS : A NEW ECOSYSTEM TO GET DREAM JOBS

Blog banner

RAID

Blog banner

Operating system

Blog banner

Security Issues and Countermeasures

Blog banner

Why we should do reading

Blog banner

The House ??of Patola Designs: Traditional Weaves with a Modern Twist

Blog banner

HR Automation : Need of the hour

Blog banner

Modern operating system

Blog banner

Multiprocessor and scheduling

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Direct Memory Access

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

MQTT (MQ Telemetry Transport) in Data Science

Blog banner

Creating Digitally Signed Document

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Mumbai Metro 3

Blog banner

Virus

Blog banner

Tools to support CSI activities

Blog banner

Comprehensive Bitcoin Mining - Aarti Dabholkar

Blog banner

Online Education

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Virtual memory in Operating System

Blog banner

Android Flashlight Application

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Docker Framework

Blog banner