Solved

What are examples of IT Business Risks for a Risk Assessment

Posted on 2007-12-03
4
1,522 Views
Last Modified: 2012-06-27
I am tasked with coming up with IS business risks.  Could a few of you show me a list of all of the various business risks or show me a web site that has good IS business risks?

Awakenings
0
Comment
Question by:awakenings
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 20401754
You'll find some starting points in these:

http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
http://www.theirm.org/publications/documents/Risk_Management_Standard_030820.pdf

While there no doubt are generic threat lists for certain systems or environments, the true value of risk assessment comes from mapping out the target system/environment and coming up with threats/risks specifically related to it. An "IT business risk" can be any IT-related threat or occurrence that can cause losses or hinder/terminate business operations.
0
 

Author Comment

by:awakenings
ID: 20402580
CoccoBill,

    Thanks.  This is a stab in the right direction.  I understand the basic premise and I've read the NIST document before.  I have written IS risks, but the document I am attempting to work on is Business IS risks and I'm having a hard time distinguishing between the IS risks and the business IS risks.  They seem to interrelated and I don't have much to go on from the material.

    I'll wait for further response from you and from others to see if I can get anything new...

Thanks,

Awakenings
0
 

Author Comment

by:awakenings
ID: 20419491
CoccoBill,

    I don't think anyone else is going to respond.  I was hoping to get more, but I'll give ya points anyway.

Awakenings
0
 

Author Closing Comment

by:awakenings
ID: 31412430
This question is slightly off-target for this site.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question