NIST Methodology for Risk Assessment

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

System Characterization

The process of defining the boundaries of a system by identifying and documenting key components such as hardware, software, data, and workflows. It is essential for understanding the system's operational environment and ensuring effective risk assessment and security measures.

2
New cards

Threat Identification

The process of identifying and categorizing potential threats by analyzing their sources, motivations, and manifestation vectors, while evaluating historical incidents to anticipate future risks.

3
New cards

Vulnerability Identification

The process of identifying weaknesses in a system, including technical vulnerabilities (software bugs, configuration errors) and physical vulnerabilities (inadequate security controls, poor access management), using assessment tools, penetration testing, and audits to uncover security gaps.

4
New cards

Control Analysis

A thorough examination of existing security controls to evaluate their design, implementation, and effectiveness in mitigating vulnerabilities, aligning with best practices and regulatory requirements, and identifying any gaps or redundancies.

5
New cards

Likelihood Determination

Assessment of the probability of a threat event occurring based on historical data and trends, considering potential impacts on operations, data integrity, finances, reputation, and compliance.

6
New cards

Impact Analysis

Evaluation of potential negative consequences of a threat event on operations, assets, and individuals, including severity, duration, recovery, and impact on functions, finances, reputation, and compliance.

7
New cards

Risk Determination

Assessing overall risk by combining the likelihood of a threat occurring with an analysis of potential negative impacts on operations, assets, and individuals.

8
New cards

Control Recommendations

Development of security measures to mitigate unacceptable risks, including evaluation and prioritization of controls based on effectiveness, cost, feasibility, and compliance.

9
New cards

Results Documentation

Recording and presenting findings from the risk assessment process, including summaries of threats, vulnerabilities, risk assessment results, methodologies, recommendations, and actionable insights for stakeholders, ensuring transparency and accountability.