|
For any information system, the risk is the likelihood of destructive impact on its components through the implementation of a threat to information security. Accordingly, one of the most necessary components underlying the creation of an information security system is the methodology for risk assessment. This article is devoted to the investigation of the methodology for assessing information security risks. The methodological base of the terminology of information security is considered, which shows the relationship of risks with other components of the information security process. An example of a typical information system of the organization is also given. The methodology used is based on the expert methodology for risk analysis in accordance with ISO / IEC 27005-2011, which includes: asset identification, threat identification, vulnerability identification, identification of countermeasures taken, identification of consequences, risk measurement, impact assessment, risk measurement. The relevance of the topic at the moment is due to the ever-increasing number of cyberthreats, the activity of intruders in the information environment, as well as the transition from a threat-oriented method of developing information security systems to a risk-oriented approach. The result of the work can be used in the construction of information security systems in various organizations, regardless of their scale and scope.
Keywords:risk, threat, vulnerability, incident, asset, confidentiality, integrity, accessibility, probability, consequences, countermeasure.
|