SlideShare a Scribd company logo
SECURITY-IN-CONFIDENCE
                                                                                                                                          (Once completed)




Part 2. Security Threat and Risk Assessment

                                                                                                 Threat Reality                                                                                                                               Actions
Threat Activity                 Expectancy     Desire       Intent      Knowledge    Resources       Capability   Threat Level   Vulnerability   Threat Profile     Likelihood     Consequence    Risk Rating                                           Action Required

External theft, fraud             Certain      Certain      Certain      Certain      Certain         Certain       Certain          High           Certain       Almost Certain   Catastrophic    Extreme      Immediate action required.

External Robbery                 Very Low     Negligible   Negligible   Negligible   Very Low        Negligible    Negligible     Very High          Low             Possible        Minimal         Low        Manage by routine procedures and physical design.
External coercion                Medium       Medium       Medium       Very High    Medium            High        Medium            Low             Low             Unlikely         Major       Moderate      Management responsibility must be specified, additional physical and human resources may be
                                                                                                                                                                                                                utilised.
External DOS/hacking             Very Low       High         Low          Low          Low             Low           Low          Moderate           Low             Unlikely       Moderate      Moderate      Management responsibility must be specified, additional physical and human resources may be
                                                                                                                                                                                                                utilised.
External harassment/assault      Very High     Certain     Very High     Certain     Very High       Very High     Very High      Very High         Certain       Almost Certain      Minor       Moderate      Management responsibility must be specified, additional physical and human resources may be
                                                                                                                                                                                                                utilised.
External infrastructure           Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
vandalism                                                                                                                                                                                                       utilised.
External random attack from      Medium       Medium       Medium        Medium      Medium           Medium       Medium         Very High          High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
deranged person                                                                                                                                                                                                 utilised.
External sabotage, vandalism       Low        Very Low     Very Low     Very Low     Very Low        Very Low      Very Low        Very low       Negligible          Rare           Minimal         Low        Manage by routine procedures and physical design.

External virus attack             Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal accidental              Medium       Medium       Medium        Medium      Medium           Medium       Medium         Very High          High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
unauthorised information                                                                                                                                                                                        utilised.
disclosure
Internal coercion                 Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal data integrity           Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal harassment/assault       Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal information              Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
leak/misuse                                                                                                                                                                                                     utilised.
Internal negligence              Medium       Medium       Medium        Medium      Medium           Medium       Medium         Very High          High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal pranks                  Medium       Medium       Medium        Medium      Medium           Medium       Medium         Very High          High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal sabotage, vandalism      Certain      Certain      Certain       High        Certain        Very High     Very High         High            High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal theft, fraud             Certain      Certain      Certain       Low          Low             Low           High         Moderate         Medium            Possible      Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
                                                                                                                                                                                                                utilised.
Internal unauthorised asset      Medium       Medium       Medium        Medium      Medium           Medium       Medium         Very High          High             Likely       Catastrophic      High       Senior Management attention needed, additional physical and or human resources must be
use                                                                                                                                                                                                             utilised.
Terrorism                        Very Low       High         Low          Low          Low             Low           Low          Moderate           Low             Unlikely       Moderate      Moderate      Management responsibility must be specified, additional physical and human resources may be
                                                                                                                                                                                                                utilised.

References:
1. AS/NZS ISO 31000:2009 Risk management - Principles and guidelines
2. HB 167: Security risk management
3. AS/NZS 4360:2004 Risk management - superseded by AS/NZS ISO 31000: 2009
4. HB 221:2004 Business continuity management




Date and Time last saved
2. Assessment tool
EXAMPLE SECURITY RISK ASSESSMENT TOOL JULY 2010.xlsx                                                                                   SECURITY-IN-CONFIDENCE                                                                                                                                     1 of 1
File directory path                                                                                                                       (Once completed)                                                                                                                (C) GBHP Enterprises P/L 2010

More Related Content

Viewers also liked

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
Tom Eston
 
Security Analysis Report
Security Analysis ReportSecurity Analysis Report
Security Analysis Report
bhbern
 
HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
Jose Ivan Delgado, Ph.D.
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Gary Bahadur
 
Risk asssessment
Risk asssessmentRisk asssessment
Risk asssessment
BradleyBarnes16
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
Divya Kothari
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
EnergySec
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
Victor Oluwajuwon Badejo
 
Sample Risk Assessment
Sample Risk AssessmentSample Risk Assessment
Sample Risk Assessment
Scott Johnson
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
data brackets
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
Faheem Ul Hasan
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
timmcguinness
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
Faheem Ul Hasan
 
Risk management in Healthcare
Risk management in HealthcareRisk management in Healthcare
Risk management in Healthcare
Nadeem Baig
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
Steve Bishop
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
Enterprise Security Risk Management
 

Viewers also liked (16)

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Security Analysis Report
Security Analysis ReportSecurity Analysis Report
Security Analysis Report
 
HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Risk asssessment
Risk asssessmentRisk asssessment
Risk asssessment
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
Sample Risk Assessment
Sample Risk AssessmentSample Risk Assessment
Sample Risk Assessment
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Risk management in Healthcare
Risk management in HealthcareRisk management in Healthcare
Risk management in Healthcare
 
Powerpoint Risk Assessment
Powerpoint Risk AssessmentPowerpoint Risk Assessment
Powerpoint Risk Assessment
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 

Example security risk assessment tool july 2010

  • 1. SECURITY-IN-CONFIDENCE (Once completed) Part 2. Security Threat and Risk Assessment Threat Reality Actions Threat Activity Expectancy Desire Intent Knowledge Resources Capability Threat Level Vulnerability Threat Profile Likelihood Consequence Risk Rating Action Required External theft, fraud Certain Certain Certain Certain Certain Certain Certain High Certain Almost Certain Catastrophic Extreme Immediate action required. External Robbery Very Low Negligible Negligible Negligible Very Low Negligible Negligible Very High Low Possible Minimal Low Manage by routine procedures and physical design. External coercion Medium Medium Medium Very High Medium High Medium Low Low Unlikely Major Moderate Management responsibility must be specified, additional physical and human resources may be utilised. External DOS/hacking Very Low High Low Low Low Low Low Moderate Low Unlikely Moderate Moderate Management responsibility must be specified, additional physical and human resources may be utilised. External harassment/assault Very High Certain Very High Certain Very High Very High Very High Very High Certain Almost Certain Minor Moderate Management responsibility must be specified, additional physical and human resources may be utilised. External infrastructure Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be vandalism utilised. External random attack from Medium Medium Medium Medium Medium Medium Medium Very High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be deranged person utilised. External sabotage, vandalism Low Very Low Very Low Very Low Very Low Very Low Very Low Very low Negligible Rare Minimal Low Manage by routine procedures and physical design. External virus attack Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal accidental Medium Medium Medium Medium Medium Medium Medium Very High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be unauthorised information utilised. disclosure Internal coercion Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal data integrity Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal harassment/assault Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal information Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be leak/misuse utilised. Internal negligence Medium Medium Medium Medium Medium Medium Medium Very High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal pranks Medium Medium Medium Medium Medium Medium Medium Very High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal sabotage, vandalism Certain Certain Certain High Certain Very High Very High High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal theft, fraud Certain Certain Certain Low Low Low High Moderate Medium Possible Catastrophic High Senior Management attention needed, additional physical and or human resources must be utilised. Internal unauthorised asset Medium Medium Medium Medium Medium Medium Medium Very High High Likely Catastrophic High Senior Management attention needed, additional physical and or human resources must be use utilised. Terrorism Very Low High Low Low Low Low Low Moderate Low Unlikely Moderate Moderate Management responsibility must be specified, additional physical and human resources may be utilised. References: 1. AS/NZS ISO 31000:2009 Risk management - Principles and guidelines 2. HB 167: Security risk management 3. AS/NZS 4360:2004 Risk management - superseded by AS/NZS ISO 31000: 2009 4. HB 221:2004 Business continuity management Date and Time last saved 2. Assessment tool EXAMPLE SECURITY RISK ASSESSMENT TOOL JULY 2010.xlsx SECURITY-IN-CONFIDENCE 1 of 1 File directory path (Once completed) (C) GBHP Enterprises P/L 2010