||This article may be too technical for most readers to understand. (November 2013)|
Security Risk describes employing the concept of risk to the security risk management paradigm to make a particular determination of security orientated events.
Security risk is the demarcation of risk, into the security silo, from the broader enterprise risk management framework for the purposes of isolating and analysing unique events, outcomes and consequences.
Security risk is often, quantitatively, represented as any event that compromises the assets, operations and objectives of an organisation. 'Event', in the security paradigm, comprises those undertaken by actors intentionally for purposes that adversely affect the organisation.
The role of the 'actors' and the intentionality of the 'events', provides the differentiation of security risk from other risk management silos, particularly those of safety, environment, quality, operational and financial.
Common Approaches to Analysing Security Risk
Some security professionals describe the relationship between security terms according to one of the following formulas.
Risk = Threat × Harm
Risk = Consequence × Threat × Vulnerability
Risk = Consequence × Likelihood
Risk = Consequence × Likelihood × Vulnerability
These formulas should be considered as intuitive relations rather than scientific models. Jeff Lowder has in an Internet blog argued that Risk = Consequence x Threat x Vulnerability are mathematical nonsense.
There are a number of methodologies to analyse and manage security risk: see Category:Risk analysis methodologies
Usually after a cost benefit analysis a countermeasure is set to decrease the likelihood or the consequence of the threat. Security service is the name of countermeasure while transmitting the information.
Psychological Factors relating to Security Risk
Main article: Risk - Risk in Psychology
Given the strong influence affective states can play in the conducting of security risk assessment, many papers have considered the roles of affect heuristic and biases in skewing findings of the process.
- Asset (computing)
- Attack (computing)
- Computer security
- Computer insecurity
- Common Vulnerabilities and Exposures (CVE)
- Common Vulnerability Scoring System (CVSS)
- Exploit (computer security)
- Full disclosure (computing security)
- Information Security
- Information security management system
- IT risk
- Security control
- Vulnerability management
- Function of security risk assessments to ERM
- Keller, C., Siegrist, M., & Gutscher, H. The Role of the Affect and Availability Heuristics in Risk Communication. Risk Analysis, Vol. 26, No. 3, 2006
- Heuristics and risk perception – Risk assessments pitfalls
- Society of Information Risk Analysts
- 800-30 NIST Risk Management Guide
- 800-39 NIST DRAFT Managing Risk from Information Systems: An Organizational Perspective
- FIPS Publication 199, Standards for Security Categorization of Federal Information and Information
- FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems
- 800-37 NIST Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach
- FISMApedia is a collection of documents and discussions focused on USA Federal IT security
- Internet2 Information Security Guide: Effective Practices and Solutions for Higher Education
- The Institute of Risk Management (IRM) is risk management's leading international professional education and training body
-  NGO Security Risk Assessment Recommended Guidance