0% found this document useful (0 votes)
43 views3 pages

Security Risk Assesment

Uploaded by

nickjohn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views3 pages

Security Risk Assesment

Uploaded by

nickjohn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Location Threat (What Threat Agent Vulnerability Existing Safeguards Consequence (What is

Likelihood
Severity
(Possible Risk could happen) (Who could do (Is it (What is in place to the worst thing that

Risk
Area) it?) possible?) prevent it?) could happen?)

President’s Office Unauthorized Intruders, High Access control systems, Unauthorized access to

Medium
access to unauthorized security personnel confidential data, potential
sensitive personnel theft

High

High
information, theft
HR Office Breach of Unauthorized High Access control, encrypted Compromised employee

Medium
sensitive personnel files data, legal liabilities
employee

High

High
information
DSA Office Unauthorized Intruders, High Access control, restricted Loss of student records,

Medium
access, theft of disgruntled records access privacy breaches
student records students

High

High
TES Office Unauthorized Intruders, High Access control, encrypted Financial loss,

Medium
access, theft of unauthorized financial data compromised records
financial records personnel

High

High
Guidance Office Breach of Unauthorized High Access control, encrypted Compromised student

Medium
sensitive student personnel files data, legal liabilities
information

High

High
Accounting Office Data breach, Employees, Moderate Restricted access, Loss of financial data,

Medium
embezzlement hackers encryption, regular audits misappropriation of funds

High

High
BSBA Office Unauthorized Intruders, High Access control, restricted Loss of academic records,

Medium
access, theft of unauthorized records access privacy breaches
academic records personnel

High

High
Registrar's Office Unauthorized Intruders, High Access control, encrypted Incorrect academic

Medium
access, alteration disgruntled records records, legal issues
of student records students

High

High
Computer Data breach, Students, High Secure login systems, Theft of equipment,
Laboratory equipment theft unauthorized equipment tracking, compromise of sensitive
users surveillance data

High

High

High
Classrooms Vandalism, Students, intruders Low Lockable doors, access Property damage,

Medium

Medium
unauthorized control systems disruption of classes
entry

Low
Library Theft, damage to Students, Moderate Library staff, security Loss of valuable

Medium

Medium

Medium
materials outsiders cameras, anti-theft resources, disruption of
systems services

Canteen Food Students, Moderate CCTV surveillance, Foodborne illnesses,

Moderate

Moderate
contamination, outsiders designated seating areas, property theft, safety

Medium
theft, altercations staff training concerns during lunch
hours

Hallways / Bullying, theft, Students, Low Surveillance cameras, Student safety concerns,
Corridors unauthorized outsiders security presence, anti- property theft, disruption of
access bullying campaigns school environment

Low

Low

Low
Maintenance Equipment Maintenance staff, Moderate Restricted access, safety Equipment failure, safety

Moderate

Moderate
Areas / Utility malfunction, students training, equipment hazards, potential for theft

Medium
Rooms hazardous inspections or misuse
materials
exposure
Property Theft, Students, Moderate Access control systems, Loss of valuable property,

Moderate

Moderate
Custodian Office unauthorized unauthorized inventory management compromised security

Medium
access to personnel procedures
valuable items

Kindergarten Child safety risks, Students, Low Access control, staff Child endangerment,
Office unauthorized unauthorized supervision breach of security
access personnel

Low

Low

Low
Clinic Medical Students, Moderate Trained medical staff, Inadequate medical care,
emergencies, unauthorized access control theft of medical supplies

Medium
unauthorized personnel

High

High
access to medical
supplies
Senior High Data breaches, Students, Moderate Access control, Privacy violations,
School Office theft of sensitive outsiders encryption, staff training compromised student

Moderate

Moderate
Medium
information records

Faculty Office Data breaches, Students, Moderate Access control, Privacy violations,
theft of sensitive outsiders encryption, staff training compromised staff records

Moderate

Moderate
Medium
information

You might also like