⚠️ CISSP Study Note: Risk

⚠️ CISSP Study Note: Risk


๐Ÿ” Definition

Risk is the possibility of damage, harm, or loss, combined with the likelihood that such harm will actually be realized. In cybersecurity, risk represents the potential impact of a threat exploiting a vulnerability, leading to negative consequences for systems, data, or the organization.

Risk = Threat × Vulnerability × Impact


๐Ÿง  Why It Matters in Cybersecurity

Everything in security is risk-based.
You can’t secure everything equally, nor should you. Understanding and managing risk allows organizations to:

  • Prioritize resources

  • Make informed decisions

  • Balance security and usability

  • Stay compliant with regulations

Unmanaged or misunderstood risk leads to over-spending, under-protecting, or catastrophic events.


⚖️ Key Risk Terms

Term Definition
Threat Anything that can exploit a vulnerability and cause harm
Vulnerability A weakness that could be exploited by a threat
Impact The damage or loss resulting from a successful exploit
Likelihood The probability that a threat will successfully exploit a vulnerability
Risk The intersection of impact and likelihood

Risk exists only when both a threat and a vulnerability are present.


๐Ÿ› ️ Types of Risk in Cybersecurity

Type Example
Operational Risk Process failure or human error
Strategic Risk Poor decision-making or misaligned priorities
Compliance Risk Violating laws or regulatory standards
Reputational Risk Breaches that harm brand trust
Technical Risk Exploits, malware, unpatched systems

๐Ÿงพ Risk Assessment Process

  1. Identify Assets – What are we protecting?

  2. Identify Threats & Vulnerabilities – What could go wrong and how?

  3. Determine Likelihood & Impact – Use qualitative or quantitative scoring

  4. Calculate Risk Level – Risk = Likelihood × Impact

  5. Treat the Risk – Accept, Avoid, Mitigate, or Transfer


✅ Example (CISSP-Style)

A healthcare provider identifies that its patient records are stored unencrypted on an internal server. The threat of ransomware and the vulnerability of lack of encryption produce a high likelihood of exposure, with a high potential impact due to HIPAA violations.
✅ This scenario illustrates high risk and requires immediate mitigation (e.g., encryption, access control).


๐Ÿ“– Found In CISSP Domains

Domain Focus
๐Ÿ“˜ Domain 1: Security and Risk Management Core domain covering risk concepts, risk tolerance, assessment, and treatment.
๐Ÿ“˜ Domain 7: Security Operations Applies risk understanding to operational resilience, BCP/DRP, and monitoring.

๐Ÿ”‘ Memory Hook

“Risk is the chance of something bad happening—and how bad it will be.”
Security isn’t about eliminating risk—it’s about making sure you can live with what’s left.


Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards