Security Risk Assessment Stages

The activities undertaken when performing a risk assessment are as follows:

  • Planning
  • Information gathering
  • Risk analysis
  • Identifying and implementing controls
  • Monitoring

Before discussing the stages of a risk assessment, it’s a good idea to review the following points:

  • An asset is anything of value, such as people, property, intellectual property, or information. In essence, an asset is what you are trying to protect.
  • A threat is anything that can damage or compromise an asset. In other words, a threat is what you are trying to protect against.
  • A vulnerability is a weakness that makes a threat possible or even probable. A vulnerability can also be a gap in the protection measures against a threat.
  • Risk is the ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.