IT Examiner School, Palm Springs, CA

Risk Assessment Process

Identify and value sensitivity of information assets.

Identify potential internal/ external threats and/or vulnerabilities.

Rank likelihood and impact of threats and/or vulnerabilities.

Assess sufficiency of risk control policies, procedures, information systems, etc.

Inherent Risk >>> Residual Risk

Made with FlippingBook - professional solution for displaying marketing and sales documents online