Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 6, Problem 20RQ
Explanation of Solution
Simplest Risk formula:
The simplest risk formula given in this chapter is as follows.
Risk = Vulnerability occurrence times value or impact – percentage risk already controlled + element of uncertainty
Primary elements of simplest risk formula:
The primary elements of the above given risk formula are as follows:
- Vulnerability occurrence times value:
- Likelihood refers to the overall rating of a numerical value on a defined scale of profitability which a specific vulnerability will be exploited.
- Likelihood is rated between 0.1 and 1.0, where 0.1 is the lower part of the scale and 1.0 is the higher part of it.
- Value of information can be rated from 1 to 100 where 1 means low critical asset, 50 means medium value, and 100 means all important assets...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Spiral model is a. phase-driven model b. risk-driven model c. risk-process model d. risk-safe model
Which five risk-control strategies should be mentioned and quickly explained?
Why is it better to analyze risk using intervals of chance and consequence rather than precise numbers?
Chapter 6 Solutions
Management Of Information Security
Ch. 6 - Prob. 1RQCh. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Prob. 4RQCh. 6 - Prob. 5RQCh. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - Prob. 9RQCh. 6 - Prob. 10RQ
Ch. 6 - Prob. 11RQCh. 6 - Prob. 12RQCh. 6 - When you document procedures, why is it useful to...Ch. 6 - Prob. 14RQCh. 6 - Prob. 15RQCh. 6 - Prob. 16RQCh. 6 - Prob. 17RQCh. 6 - Prob. 18RQCh. 6 - Prob. 19RQCh. 6 - Prob. 20RQCh. 6 - Prob. 1ECh. 6 - Prob. 2ECh. 6 - Prob. 3ECh. 6 - Prob. 4ECh. 6 - Prob. 5ECh. 6 - Prob. 1DQCh. 6 - Prob. 2DQCh. 6 - Prob. 1EDM
Knowledge Booster
Similar questions
- Discuss how scenario building can be used as an important tool in risk management. In your answer, show steps that are required to build a scenario.arrow_forwardWhat is the difference between Risk appetite statement and risk tolerance?arrow_forwardList and briefly characterise the five risk-control methodologies.arrow_forward
- Explain at least one alternative formula for simplest risk formula to rank risks.arrow_forwardWhat's the difference between a risk appetite statement and merely declaring you're prepared to accept risks?arrow_forwardIt is important to mention and quickly explain each of the five different risk-control strategies.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Information Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning