Risk terminology: Understanding assets, threats and vulnerabilities (2024)

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face.

You might have a broad idea of what a risk is, but did you know there’s a specific way you can calculate it? It looks like this:

A + T + V = risk

In this equation, ‘A’ refers to ‘asset’, ‘T’ to ‘threat’ and ‘V’ to vulnerability. By identifying and defining these three elements, you will gain an accurate picture of each risk.

To help you do that, let’s break down each of these terms and how they work within your organisation.

What’s an asset?

An asset is any data, device or other component of an organisation’s systems that is valuable – often because it contains sensitive data or can be used to access such information.

For example, an employee’s desktop computer, laptop or company phone would be considered an asset, as would applications on those devices. Likewise, critical infrastructure, such as servers and support systems, are assets.

An organisation’s most common assets are information assets. These are things such as databases and physical files – i.e. the sensitive data that you store.

A related concept is the ‘information asset container’, which is where that information is kept. In the case of databases, this would be the application that was used to create the database. For physical files, it would be the filing cabinet where the information resides.

What’s a threat?

A threat is any incident that could negatively affect an asset – for example, if it’s lost, knocked offline or accessed by an unauthorised party.

Threats can be categorised as circ*mstances that compromise the confidentiality, integrity or availability of an asset, and can either be intentional or accidental.

Intentional threats include things such as criminal hacking or a malicious insider stealing information, whereas accidental threats generally involve employee error, a technical malfunction or an event that causes physical damage, such as a fire or natural disaster.

What’s a vulnerability?

A vulnerability is an organisational flaw that can be exploited by a threat to destroy, damage or compromise an asset.

You are most likely to encounter a vulnerability in your software, due to their complexity and the frequency with which they are updated. These weaknesses, known as bugs, can be used by criminal hackers to access to sensitive information.

Vulnerabilities don’t only refer to technological flaws, though. They can be physical weaknesses, such as a broken lock that lets unauthorised parties into a restricted part of your premises, or poorly written (or non-existent) processes that could lead to employees exposing information.

Other vulnerabilities include inherent human weaknesses, such as our susceptibility to phishing emails; structural flaws in the premises, such as a leaky pipe near a power outlet; and communication errors, such as employees’ sending information to the wrong person.

Understanding risk

Now that we’ve explained the constituent elements of risk, you can see that the concept is a lot more complex than you might have thought. But, although it sounds counterintuitive, that’s not necessarily a bad thing.

That’s because the specificity of what counts as a risk means that you may well have fewer of them than you estimated.

After all, an information security risk must have something that’s in jeopardy (an asset), an actor that can exploit it (a threat) and a way that they can happen (a vulnerability).

If you’ve identified a vulnerability, but there is no threat to exploit it, you have little to no risk. Likewise, you might detect a threat but have already secured any weaknesses that it could exploit.

Of course, identifying risks is only the first step towards securing your organisation. You need to document them, assess and prioritise them, and finally implement measures to secure them.

This can be a labour-intensive task, but our risk assessment tool, vsRisk, does much of the work for you.

This software package provides a simple and fast way to create your risk assessment methodology and deliver repeatable, consistent assessments year after year.

Its asset library assigns organisational roles to each asset group, applying relevant potential threats and risks by default.

Meanwhile, its integrated risk, vulnerability and threat databases eliminate the need to compile a list of risks, and the built-in control sets help you comply with multiple frameworks.

A version of this blog was originally published on 15 February 2017.

Risk terminology: Understanding assets, threats and vulnerabilities (2024)

FAQs

Risk terminology: Understanding assets, threats and vulnerabilities? ›

A vulnerability is a flaw or weakness in an asset's design, implementation, or operation and management that could be exploited by a threat. A threat is a potential for a threat agent to exploit a vulnerability. A risk is the potential for loss when the threat happens.

What are assets, risk, threats, and vulnerabilities? ›

After all, an information security risk must have something that's in jeopardy (an asset), an actor that can exploit it (a threat) and a way that they can happen (a vulnerability). If you've identified a vulnerability, but there is no threat to exploit it, you have little to no risk.

What is threat vs vulnerability vs risk? ›

Vulnerability vs threat vs risk

In short, we can see them as a spectrum: First, a vulnerability exposes your organization to threats. A threat is a malicious or negative event that takes advantage of a vulnerability. Finally, the risk is the potential for loss and damage when the threat does occur.

What is the difference between an asset and a vulnerability? ›

Asset: Any item of value to an organization, such as data, hardware, software, or intellectual property. Vulnerability: A weakness in a system that can be exploited by a threat to gain unauthorized access or cause damage.

What are assets in risk assessment? ›

An asset-based risk assessment is a type of risk assessment that focuses on identifying and evaluating the risks to an organization's assets. Assets can include physical assets such as buildings, equipment, and infrastructure, and intangible assets such as data, intellectual property, and reputation.

What is an example of an asset threat? ›

Threat: Something that can damage or destroy an asset

Let's use the example of home ownership to illustrate these. Your home would be your asset. A threat would be a burglar, or even the tools that a burglar might use, like a lock pick. These potential threats can do damage to your home if not protected against.

What are the examples of asset risk? ›

Risk assets are assets that have significant price volatility, such as equities, commodities, high-yield bonds, real estate, and currencies.

What are the 4 main types of vulnerability? ›

The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

What are three types of assets in security? ›

Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information.

What is the process of identifying assets and threats in an organization called? ›

Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations. These risks stem from a variety of sources, including financial uncertainties, legal liabilities, technology issues, strategic management errors, accidents and natural disasters.

What are the risk levels of assets? ›

Definition. Your “Risk Level” is how much risk you are willing to accept to get a certain level of reward; riskier stocks are both the ones that can lose the most or gain the most over time.

How do you quantify risk of assets? ›

The Bottom Line

Modern portfolio theory uses five statistical indicators—alpha, beta, standard deviation, R-squared, and the Sharpe ratio—to do this. Likewise, the capital asset pricing model and value at risk are widely employed to measure the risk to reward tradeoff with assets and portfolios.

How do you calculate risk assets? ›

Calculating risk-weighted assets

Banks calculate risk-weighted assets by multiplying the exposure amount by the relevant risk weight for the type of loan or asset. A bank repeats this calculation for all of its loans and assets, and adds them together to calculate total credit risk-weighted assets.

What is the risk on assets? ›

“Risk-on assets” refers to changes in investments that can drive investors to take on higher risk tolerance. Assets representing this portfolio strategy include stocks, commodities, high-yield bonds, real estate and currencies.

What are the risk factors of assets? ›

There are three major risk factors, corresponding to different economic risks: growth, inflation, and liquidity. Pick any asset class, and you'll be able to attribute much of its returns to some combination of these three, plus the risk-free rate.

What are threats and vulnerabilities explain with examples? ›

A vulnerability is a weakness or flaw in an operating system, network, or application. A threat actor tries to exploit vulnerabilities to gain unauthorized access to data or systems. Security vulnerabilities can arise for many reasons, including misconfigurations, design flaws, or outdated software versions.

Top Articles
AdGuard DNS — ad-blocking DNS server
Feed Item Detail | Salesforce Trailblazer Community
Craigslist San Francisco Bay
Wordscapes Level 6030
Weeminuche Smoke Signal
FFXIV Immortal Flames Hunting Log Guide
Ingles Weekly Ad Lilburn Ga
Craigslist Parsippany Nj Rooms For Rent
Dr Doe's Chemistry Quiz Answer Key
Wal-Mart 140 Supercenter Products
Decaying Brackenhide Blanket
Amateur Lesbian Spanking
Matthew Rotuno Johnson
Oc Craiglsit
Chris Hipkins Fue Juramentado Como El Nuevo Primer Ministro De...
Uhcs Patient Wallet
Nj State Police Private Detective Unit
Mineral Wells Independent School District
National Weather Service Denver Co Forecast
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Mals Crazy Crab
SF bay area cars & trucks "chevrolet 50" - craigslist
A Biomass Pyramid Of An Ecosystem Is Shown.Tertiary ConsumersSecondary ConsumersPrimary ConsumersProducersWhich
Rqi.1Stop
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Morse Road Bmv Hours
Certain Red Dye Nyt Crossword
Naya Padkar Gujarati News Paper
Fiona Shaw on Ireland: ‘It is one of the most successful countries in the world. It wasn’t when I left it’
R Baldurs Gate 3
Stephanie Bowe Downey Ca
Mobile crane from the Netherlands, used mobile crane for sale from the Netherlands
Redbox Walmart Near Me
UPC Code Lookup: Free UPC Code Lookup With Major Retailers
The value of R in SI units is _____?
Craigslist Georgia Homes For Sale By Owner
Whitehall Preparatory And Fitness Academy Calendar
Muziq Najm
Delaware judge sets Twitter, Elon Musk trial for October
Section 212 at MetLife Stadium
Emulating Web Browser in a Dedicated Intermediary Box
Birmingham City Schools Clever Login
Unitedhealthcare Community Plan Eye Doctors
Dragon Ball Super Super Hero 123Movies
Tfn Powerschool
Exam With A Social Studies Section Crossword
Grand Valley State University Library Hours
Kenwood M-918DAB-H Heim-Audio-Mikrosystem DAB, DAB+, FM 10 W Bluetooth von expert Technomarkt
The top 10 takeaways from the Harris-Trump presidential debate
Spongebob Meme Pic
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6252

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.