The process of formally evaluating the degree of threat to an information system. It describes the nature of the threat, and may provide specific suggestions for countermeasure to the threat, if countermeasures exist.
It is important to determine the level of threat, and to gauge the significance of a threat for a specific organization. A threat might be high for a financial institution, and not for an internet portal site. Certain threats are significate accross all types of enterprises.
The value of assessing risk and identifying weaknesses in systems cannot be understated. Recognizing threats that are specific to an entity or enterprise is an important part of determining the security stance required. There is no security or threat model that is suitable for everything. The costs of loss and effort to prevent that loss must all fit appropriately into a consequence management model.
How can you identify risk if you don't know, or have not identified who or what you are defending against? Each risk must be examined carefully to determine whether that risk is applicable to the current enterprise, and whether the cost of defending against that risk is worth the mitigation of that risk.
How can you identify risk if you don't know, or have not identified who or what you are defending against? Each risk must be examined carefully to determine whether that risk is applicable to the current enterprise, and whether the cost of defending against that risk is worth the mitigation of that risk. It is possible to play the odds and win. The true cost of losing must always be weighed against the price to protect against it.
Last modified: Sat Oct 30 23:06:31 PDT 2004