wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

IT RISK

profile
Anjali Tiwari
Aug 30, 2022
0 Likes
0 Discussions
182 Reads

Your IT systems and the information that you hold on them face a wide range of risks. If your business relies on technology for key operations and activities, you need to be aware of the range and nature of those threats.

Types of risks in IT systems

Threats to your IT systems can be external, internal, deliberate and unintentional. Most IT risks affect one or more of the following:

business or project goals

service continuity

bottom-line results

business reputation

security

infrastructure

 

Looking at the nature of risks, it is possible to differentiate between:

Physical threats - resulting from physical access or damage to IT resources such as the servers. These could include theft, damage from fire or flood, or unauthorised access to confidential data by an employee or outsider.

Electronic threats - aiming to compromise your business information - eg a hacker could get access to your website, your IT system could become infected by a computer virus, or you could fall victim to a fraudulent email or website. These are often of a criminal nature.

Technical failures - such as software bugs, a computer crash or the complete failure of a computer component. A technical failure can be catastrophic if, for example, you cannot retrieve data on a failed hard drive and no backup copy is available.

Infrastructure failures - such as the loss of your internet connection can interrupt your business - eg you could miss an important purchase order.

Human error - is a major threat - eg someone might accidentally delete important data, or fail to follow security procedures properly.

Measuring IT risk (or cyber risk) can occur at many levels. At a business level, the risks are managed categorically. Front line IT departments and NOC's tend to measure more discrete, individual risks. Managing the nexus between them is a key role for modern CISO's.

When measuring risk of any kind, selecting the correct equation for a given threat, asset, and available data is an important step. Doing so is subject unto itself, but there are common components of risk equations that are helpful to understand.

 

There are four fundamental forces involved in risk management, which also apply to cybersecurity. They are assets, impact, threats, and likelihood. You have internal knowledge of and a fair amount of control over assets, which are tangible and intangible things that have value. You also have some control over impact, which refers to loss of, or damage to, an asset. However, threats that represent adversaries and their methods of attack are external to your control. Likelihood is the wild card in the bunch. Likelihoods determine if and when a threat will materialize, succeed, and do damage. While never fully under your control, likelihoods can be shaped and influenced to manage the risk.


Comments ()


Sign in

Read Next

Android Flashlight Application

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

The Right way of cooking

Blog banner

Heart Fulness Meditation

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

ZOHO

Blog banner

I/O buffer and its techniques

Blog banner

Go Daddy

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

Process states

Blog banner

Data Security must be your Priority!

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Threats To Computer System

Blog banner

Virtual memory in os

Blog banner

Process in OS

Blog banner

Life lesson

Blog banner

Impact of social media on the human life

Blog banner

What is E-commerce

Blog banner

Business Intelligence v/s Big Data

Blog banner

Routers

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Memory Management

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Security in Operating Systems

Blog banner

Cache memory

Blog banner

Digital Forensics Challenges and Tools

Blog banner

THE DESIRE OF MANY

Blog banner

SQL Injection

Blog banner

Understanding - Proof of Work!

Blog banner

Be you

Blog banner

Online Education

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

A Heartfelt Act of Kindness

Blog banner

Security issues

Blog banner

Data Science & AI

Blog banner

Models of Information Security.

Blog banner

Deadlock and starvation

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Memory management and virtual memory

Blog banner