Solved

What are examples of IT Business Risks for a Risk Assessment

Posted on 2007-12-03
4
1,459 Views
Last Modified: 2012-06-27
I am tasked with coming up with IS business risks.  Could a few of you show me a list of all of the various business risks or show me a web site that has good IS business risks?

Awakenings
0
Comment
Question by:awakenings
  • 3
4 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 20401754
You'll find some starting points in these:

http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
http://www.theirm.org/publications/documents/Risk_Management_Standard_030820.pdf

While there no doubt are generic threat lists for certain systems or environments, the true value of risk assessment comes from mapping out the target system/environment and coming up with threats/risks specifically related to it. An "IT business risk" can be any IT-related threat or occurrence that can cause losses or hinder/terminate business operations.
0
 

Author Comment

by:awakenings
ID: 20402580
CoccoBill,

    Thanks.  This is a stab in the right direction.  I understand the basic premise and I've read the NIST document before.  I have written IS risks, but the document I am attempting to work on is Business IS risks and I'm having a hard time distinguishing between the IS risks and the business IS risks.  They seem to interrelated and I don't have much to go on from the material.

    I'll wait for further response from you and from others to see if I can get anything new...

Thanks,

Awakenings
0
 

Author Comment

by:awakenings
ID: 20419491
CoccoBill,

    I don't think anyone else is going to respond.  I was hoping to get more, but I'll give ya points anyway.

Awakenings
0
 

Author Closing Comment

by:awakenings
ID: 31412430
This question is slightly off-target for this site.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now