Information Security Risk Assessment Summary Example

AssetCategoryMajor ThreatsVulnerabilitiesRisk Assessment
Client    
  • Executive staff computers

  • Employee computers

  • Personal digital assistants

  • Critical

  • Standard

  • Standard

  • Theft

  • Viruses

  • Theft

  • Security awareness

  • Virus definition update process

  • Security awareness

  • Medium

  • Low

  • Low

Servers    
  • ERP, CRM

  • E-commerce

  • Email

  • Departmental engineering

  • Mission-Critical

  • Mission-Critical

  • Critical

  • Standard awareness

  • Impersonation

  • Hacking

  • Viruses

  • Social

  • Account administration process

  • Patch management

  • Virus definition update process

  • Security

  • High

  • Medium

  • Low

  • Low

Gateway    
  • Customer—partner DMZ

  • Email

  • Internet

  • Mission-Critical

  • Critical

  • Standard

  • Denial of service

  • Viruses

  • Impersonation

  • Overall security architecture

  • Virus definition update process

  • Account administration ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.