Risk Assessment - Finalizing
Risk Assessment - Finalizing
Risk Assessment - Finalizing
For making risk assessment model we have to first apply methodology then Methods, nestled inside of
frameworks, provide an approach to achieve a specific goal. Frameworks, the next inner layer in our
process architecture matryoshka doll, provide the structure needed to implement a model (or some part
of the a model). Models, the outside layer of our doll, are an abstraction that provides a rough definition
of practices and inter-relationships needed by an organization to deliver a product or service. Models
are valuable if they are theoretically consistent, fit the real world and have predictive power
Software
Application Layer
Logical Layer
Database Layer
Hosting Layer
High: Vulnerability may harm both the Patient Data and system
For the likelihood levels, each are given a level of 1.0 for high, 0.5 for medium and 0.1 for low.
For the impact levels, each are given a level of 10 for high, 5 for medium and 1 for low.
For resulting matrix, 0.1 - 1 being low, 1 - 5 being medium and 6 - 10 being high
Impact
Threat Likelihood Low Medium High
High 1.0*1 1.0*5 1.0*10
Medium 0.5*1 0.5*5 0.5*10
Low 0.1*1 0.1*5 0.1*10
Risk Matrix
Impact
Likelihoo Risk level
d
1 (low) 5(medium) 10(High)
Vul#1,3,5,10 Vul#2,4,6,7 Vul#8,9
Identification of Risk
Risk Risk
magnitude
Productivity Cost of Competitive legal
Response Advantage
Phishing
Hacking
Data theft
Malware
Ransomware
Identify purpose
Identify scope
scammer
Attackers
insider
Identify threat events
Threat events Threat event inputs
Ransomware Spam mail,masquerading,social engineering
Data theft Human error,compromised downloads Insider:
Hacking Malicious email, weblink,virus,popup
messages
phishing Email
Malware Email text, compromised website,torjan
horse
Determine Likelihood
Determine Risk