IT Risk Assessment Methodology Flowchart
Download Free IT Risk Assessment Methodology Flowchart. This Flowchart is part of IT Risk Management Guidelines from NIST-SP 800:30, that could be used to getting better understanding and approach how to manage IT risk within a company. Some of the process that covered in this flowchart are:
- System Characterization, Define the scope of the effort. In this step, the boundaries of the IT system are identified, along with the resources and the information that constitute the system.
- Threat Identification, Identify the potential threat-sources and compile a threat statement listing potential threat-sources that are applicable to the IT system being evaluated.
- Vulnerability Identification, Develop a list of system vulnerabilities (flaws or weaknesses) that could be exploited by the potential threat-sources.
|Free Download Attachment||Size|