⚠️ CISSP Study Note: Risk
⚠️ CISSP Study Note: Risk
๐ Definition
Risk is the possibility of damage, harm, or loss, combined with the likelihood that such harm will actually be realized. In cybersecurity, risk represents the potential impact of a threat exploiting a vulnerability, leading to negative consequences for systems, data, or the organization.
Risk = Threat × Vulnerability × Impact
๐ง Why It Matters in Cybersecurity
Everything in security is risk-based.
You can’t secure everything equally, nor should you. Understanding and managing risk allows organizations to:
-
Prioritize resources
-
Make informed decisions
-
Balance security and usability
-
Stay compliant with regulations
Unmanaged or misunderstood risk leads to over-spending, under-protecting, or catastrophic events.
⚖️ Key Risk Terms
| Term | Definition |
|---|---|
| Threat | Anything that can exploit a vulnerability and cause harm |
| Vulnerability | A weakness that could be exploited by a threat |
| Impact | The damage or loss resulting from a successful exploit |
| Likelihood | The probability that a threat will successfully exploit a vulnerability |
| Risk | The intersection of impact and likelihood |
Risk exists only when both a threat and a vulnerability are present.
๐ ️ Types of Risk in Cybersecurity
| Type | Example |
|---|---|
| Operational Risk | Process failure or human error |
| Strategic Risk | Poor decision-making or misaligned priorities |
| Compliance Risk | Violating laws or regulatory standards |
| Reputational Risk | Breaches that harm brand trust |
| Technical Risk | Exploits, malware, unpatched systems |
๐งพ Risk Assessment Process
-
Identify Assets – What are we protecting?
-
Identify Threats & Vulnerabilities – What could go wrong and how?
-
Determine Likelihood & Impact – Use qualitative or quantitative scoring
-
Calculate Risk Level – Risk = Likelihood × Impact
-
Treat the Risk – Accept, Avoid, Mitigate, or Transfer
✅ Example (CISSP-Style)
A healthcare provider identifies that its patient records are stored unencrypted on an internal server. The threat of ransomware and the vulnerability of lack of encryption produce a high likelihood of exposure, with a high potential impact due to HIPAA violations.
✅ This scenario illustrates high risk and requires immediate mitigation (e.g., encryption, access control).
๐ Found In CISSP Domains
| Domain | Focus |
|---|---|
| ๐ Domain 1: Security and Risk Management | Core domain covering risk concepts, risk tolerance, assessment, and treatment. |
| ๐ Domain 7: Security Operations | Applies risk understanding to operational resilience, BCP/DRP, and monitoring. |
๐ Memory Hook
“Risk is the chance of something bad happening—and how bad it will be.”
Security isn’t about eliminating risk—it’s about making sure you can live with what’s left.
Comments
Post a Comment