0% found this document useful (0 votes)
59 views

Risk Assessment: Cyber Security

Uploaded by

Faisal Abdo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Risk Assessment: Cyber Security

Uploaded by

Faisal Abdo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CYBER SECURITY RISK ASSESSMENT

The matrix provides a consistent way to measure and compare threats and vulnerabilities. It’s also an ideal resource for explaining the findings of your risk assessment to the board. It
demonstrates why certain risks are dangerous and the need to prioritise defence capabilities.

VULNERABILITY LEVEL
RISK ASSESSMENT
MATRIX
VERY HIGH HIGH MODERATE LOW VERY LOW

VERY HIGH ● Very High ● Very High ● High ● High ● Moderate


THREAT LEVEL

HIGH ● Very High ● High ● Moderate ● Moderate ● Low

MODERATE ● High ● Moderate ● Moderate ● Moderate ● Low

LOW ● High ● Moderate ● Moderate ● Low ● Very Low

VERY LOW ● Moderate ● Low ● Low ● Very Low ● Very Low

THREAT VULNERABILITY ASSET & CONSEQUENCES RISK

System overheating - server room Old air conditioning system


All services (email, website, database) will be
HIGH
unavailable for at least 3h.
HIGH HIGH

Natural disaster - flooding Server room - on the 4th floor


All services (email, website, database) will be
LOW
unavailable for at least 1 day.
MODERATE VERY LOW

Accidental file deleting Permissions configured


Data can be lost. Maybe even critical data. MODERATE
HIGH LOW
© TemplateLab.com

You might also like