Archive for Risk Assessment

You are browsing the archives of Risk Assessment.

Hacking Drones

Insurgents have learned how to intercept video relays from drones in Iraq and Afghanistan and the vulnerability has existed for some time. Hacking warfare robots will become more of an issue as they become more commonplace. Think about how network hacking techniques can be applied to war scenarios and vice-versa: botnets – encrypted control channels […]

Documentation

Documentation

Risk assessment report

Control Recommendations

Control Recommendations

The goal of the controls is to reduce risk to a level that is acceptable

Risk Analysis

Risk Analysis

Control Analysis
Likelihood Determination
Impact Analysis
Risk Determination

Patch Management

Patch Management is a critical part of security.

Vulnerability Identification

Vulnerability Identification

Vulnerability lists and system testing

Threat Identification

Threat Identification

Natural (storms), Human and Environmental (power failure)

Initiation Phase

Initiation Phase

This is where the need and purpose for the information system is defined and documented. This includes System Characterization and the beginnings of Risk Assessment.
(…more)