0
0
Cybersecurityknowledge~10 mins

Risk assessment methodologies in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Risk assessment methodologies
Identify Assets
Identify Threats
Identify Vulnerabilities
Analyze Risks
Evaluate Risks
Decide on Controls
Monitor and Review
The flow shows the step-by-step process of assessing risks by identifying assets, threats, vulnerabilities, analyzing and evaluating risks, deciding controls, and then monitoring.
Execution Sample
Cybersecurity
Assets = ['Server', 'Database']
Threats = ['Malware', 'Phishing']
Vulnerabilities = ['Outdated software']
Risk = Threat_likelihood * Vulnerability_impact
if Risk > Threshold:
    Apply_controls()
This example shows how to identify assets, threats, vulnerabilities, calculate risk, and decide if controls are needed.
Analysis Table
StepActionDetailsResult
1Identify AssetsServer, DatabaseAssets listed
2Identify ThreatsMalware, PhishingThreats listed
3Identify VulnerabilitiesOutdated softwareVulnerabilities listed
4Analyze RisksCalculate risk for Malware on ServerRisk = Likelihood * Impact = 0.7 * 0.8 = 0.56
5Evaluate RisksCompare risk 0.56 to threshold 0.5Risk is high
6Decide on ControlsApply patching and antivirusControls planned
7Monitor and ReviewSchedule regular checksOngoing process
8EndAll steps doneRisk assessment complete
💡 Process ends after monitoring and review step
State Tracker
VariableStartAfter Step 1After Step 2After Step 3After Step 4After Step 5After Step 6Final
Assets[]['Server', 'Database']['Server', 'Database']['Server', 'Database']['Server', 'Database']['Server', 'Database']['Server', 'Database']['Server', 'Database']
Threats[][]['Malware', 'Phishing']['Malware', 'Phishing']['Malware', 'Phishing']['Malware', 'Phishing']['Malware', 'Phishing']['Malware', 'Phishing']
Vulnerabilities[][][]['Outdated software']['Outdated software']['Outdated software']['Outdated software']['Outdated software']
RiskN/AN/AN/AN/A0.560.560.560.56
ControlsNoneNoneNoneNoneNonePlannedPlannedApplied
Key Insights - 3 Insights
Why do we multiply threat likelihood by vulnerability impact to get risk?
Because risk depends on how likely a threat is and how badly it can affect the asset. Multiplying combines these two factors to estimate risk level, as shown in step 4 of the execution_table.
What happens if the risk is below the threshold?
If risk is below the threshold, controls may not be needed immediately. Step 5 shows comparing risk to threshold to decide if action is required.
Why is monitoring and review important after applying controls?
Because risks and environments change over time. Monitoring ensures controls remain effective, as shown in step 7 where ongoing checks are scheduled.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table at step 4, what is the calculated risk value?
A0.7
B0.56
C0.8
D1.5
💡 Hint
Check the 'Result' column in step 4 of the execution_table.
At which step does the risk get compared to the threshold?
AStep 3
BStep 6
CStep 5
DStep 7
💡 Hint
Look at the 'Action' column for the step where evaluation happens.
If the vulnerability was fixed before step 4, how would the risk value change?
ARisk would decrease
BRisk would stay the same
CRisk would increase
DRisk would be zero
💡 Hint
Refer to variable_tracker for Vulnerabilities and Risk values.
Concept Snapshot
Risk assessment steps:
1. Identify assets, threats, vulnerabilities
2. Calculate risk = likelihood × impact
3. Compare risk to threshold
4. Decide controls if risk is high
5. Monitor and review regularly
Risk helps prioritize security efforts.
Full Transcript
Risk assessment methodologies involve identifying what you want to protect (assets), what can harm them (threats), and weaknesses that can be exploited (vulnerabilities). Then, you calculate risk by combining how likely a threat is and how much damage it can cause. If the risk is above a set limit, you decide on controls to reduce it. Finally, you keep checking to make sure controls work and risks stay low. This process helps keep systems safe by focusing on the biggest dangers first.