Asset | Description | Value (Impact) |
---|---|---|
Customer Database | Contains sensitive customer information | High |
Financial Server | Processes financial transactions | Critical |
Company Website | Provides information and services to customers | Medium |
Employee Laptops | Used for daily business operations | Medium |
Asset | Description | Value (Impact) |
---|---|---|
Customer Database | Contains sensitive customer information | High |
Financial Server | Processes financial transactions | Critical |
Company Website | Provides information and services to customers | Medium |
Employee Laptops | Used for daily business operations | Medium |
Threat | Description | Potential Impact |
---|---|---|
Ransomware | Encrypts files and demands ransom for decryption key | Data loss, financial loss, reputational damage |
Phishing | Deceives users into revealing sensitive information | Data breach, identity theft, financial loss |
DDoS Attack | Overwhelms system with traffic, causing service disruption | Loss of productivity, revenue loss, reputational damage |
Insider Threat | Employee intentionally or unintentionally compromises security | Data breach, financial loss, legal penalties |
Threat | Description | Potential Impact |
---|---|---|
Ransomware | Encrypts files and demands ransom for decryption key | Data loss, financial loss, reputational damage |
Phishing | Deceives users into revealing sensitive information | Data breach, identity theft, financial loss |
DDoS Attack | Overwhelms system with traffic, causing service disruption | Loss of productivity, revenue loss, reputational damage |
Insider Threat | Employee intentionally or unintentionally compromises security | Data breach, financial loss, legal penalties |
Vulnerability | Description | Severity |
---|---|---|
Unpatched Software | Outdated software versions with known security flaws | High |
Weak Password Policy | Lack of strong password requirements and enforcement | Medium |
Open Ports | Unnecessary open ports on network devices | Medium |
Lack of Employee Training | Insufficient security awareness training for employees | Low |
Vulnerability | Description | Severity |
---|---|---|
Unpatched Software | Outdated software versions with known security flaws | High |
Weak Password Policy | Lack of strong password requirements and enforcement | Medium |
Open Ports | Unnecessary open ports on network devices | Medium |
Lack of Employee Training | Insufficient security awareness training for employees | Low |
Threat | Vulnerability | Likelihood | Impact | Risk Level |
---|---|---|---|---|
Ransomware | Unpatched Software | High | High | High |
Phishing | Lack of Employee Training | Medium | Medium | Medium |
DDoS Attack | Open Ports | Low | High | Medium |
Insider Threat | Weak Password Policy | Medium | High | High |
Threat | Vulnerability | Likelihood | Impact | Risk Level |
---|---|---|---|---|
Ransomware | Unpatched Software | High | High | High |
Phishing | Lack of Employee Training | Medium | Medium | Medium |
DDoS Attack | Open Ports | Low | High | Medium |
Insider Threat | Weak Password Policy | Medium | High | High |
Risk | Mitigation Strategy | Priority | Status |
---|---|---|---|
Ransomware | Patch software regularly, implement anti-malware, backup data | Critical | In Progress |
Phishing | Provide security awareness training, implement email filtering | High | Completed |
DDoS Attack | Implement DDoS protection services, configure firewalls | Medium | Planned |
Insider Threat | Implement strong access controls, monitor user activity | High | In Progress |
Risk | Mitigation Strategy | Priority | Status |
---|---|---|---|
Ransomware | Patch software regularly, implement anti-malware, backup data | Critical | In Progress |
Phishing | Provide security awareness training, implement email filtering | High | Completed |
DDoS Attack | Implement DDoS protection services, configure firewalls | Medium | Planned |
Insider Threat | Implement strong access controls, monitor user activity | High | In Progress |