In
information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
, risk factor is a collective name for circumstances affecting the likelihood or impact of a
security risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
.
Definitions
FAIR
Factor Analysis of Information Risk (FAIR) is devoted to the analysis of different factors influencing
IT risk. It decompose at various levels, starting from the first level Loss Event Frequency and Probable Loss Magnitude, going on examining the
asset
In financial accountancy, financial accounting, an asset is any resource owned or controlled by a business or an economic entity. It is anything (tangible or intangible) that can be used to produce positive economic value. Assets represent value ...
, the
threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
agent capability compared to the
vulnerability (computing)
Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by ...
and the
security control (also called
countermeasure) strength, the probability that the agent get in contact and actually act against the asset, the organization capability to react to the event and the impact on stakeholders.
ISACA
Risk factors are those factors that influence the frequency and/or business impact of risk scenarios; they can be of different natures, and can be classified in two major categories:
[ISACA THE RISK IT FRAMEWORK (registration required)]
/ref>
* Environmental, further subdivided in:
** Internal environmental factors are, to a large extent, under the control of the enterprise, although they may not always be easy to change.
** External environmental factors are, to a large extent, outside the control of the enterprise.
* Capability of the organization, further subdivided in:
** IT risk management
IT risk management is the application of risk management methods to information technology in order to manage IT risk, i.e.:
:''The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an ...
capabilities—To what extent is the enterprise mature in performing the risk management processes defined in the Risk IT framework
** IT capabilities—How good is the enterprise at performing the IT processes defined in COBIT
** IT-related business capabilities (or value management)—How closely do the enterprise’s value management activities align with those expressed in the Val IT processes
Risk scenario
An IT risk risk scenario is a description of an IT related event that can lead to a business impact, when and if it should occur.
Risk factors can also be interpreted as causal factors of the scenario that is materialising, or as vulnerabilities
Vulnerability refers to "the quality or state of being exposed to the possibility of being attacked or harmed, either physically or emotionally."
A window of vulnerability (WOV) is a time frame within which defensive measures are diminished, com ...
or weaknesses. These are terms often used in risk management frameworks.[
Risk scenario is characterized by:][
* a ]threat
A threat is a communication of intent to inflict harm or loss on another person. Intimidation is a tactic used between conflicting parties to make the other timid or psychologically insecure for coercion or control. The act of intimidation for co ...
actor that can be:
** Internal to the organization (employee, contractor)
** External to the organization (competitor, business partner, regulator, act of god)
* a threat type
** Malicious,
** Accidental
** Failure
** Natural
* Event
** Disclosure,
** Modification
** Theft
** Destruction
** Bad design
** ineffective execution
** inappropriate use
* asset
In financial accountancy, financial accounting, an asset is any resource owned or controlled by a business or an economic entity. It is anything (tangible or intangible) that can be used to produce positive economic value. Assets represent value ...
or resource
** People and organization
** Process
** Infrastructure or facilities
** IT infrastructure
** Information
** Application
* Time
** Duration
** Timing of occurrence (critical or not)
** Timing to detect
** Timing to react
The risk scenario structure differentiates between loss events (events generating the negative impact), vulnerabilities or vulnerability events
(events contributing to the magnitude or frequency of loss events occurring), and threat events (circumstances or events that can trigger loss
events). It is important not to confuse these risks or throw them into one large risk list.["An Introduction to Factor Analysis of Information Risk (FAIR)", Risk Management Insight LLC, November 2006]
;
See also
* Asset
In financial accountancy, financial accounting, an asset is any resource owned or controlled by a business or an economic entity. It is anything (tangible or intangible) that can be used to produce positive economic value. Assets represent value ...
* Attack (computing)
A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted ...
* Countermeasure (computer)
In computer security a countermeasure is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so ...
* Computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
* Computer insecurity
* Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
* Information security management Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The core ...
* ISACA
* Information security management system Information security management (ISM) defines and manages controls that an organization needs to implement to ensure that it is sensibly protecting the confidentiality, availability, and integrity of assets from threats and vulnerabilities. The core ...
* ISO/IEC 27001
* IT risk
* Risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
* Risk Management
* The Open Group
* Threat (computer)
* Security control
* Security risk
In simple terms, risk is the possibility of something bad happening. Risk involves uncertainty about the effects/implications of an activity with respect to something that humans value (such as health, well-being, wealth, property or the environme ...
* Security service (telecommunication)
Security service is a service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers as defined by ITU-T X.800 Recommendation.
X.800 and ISO 7498-2 (Information processing systems †...
* Vulnerability (computing)
Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by ...
References
{{DEFAULTSORT:Risk Factor (Computing)
Computer security
Risk analysis