Risk terminology: Understanding assets, threats and vulnerabilities (2024)

Whether you’re addressing cyber security on your own, following ISO 27001 or using the guidance outlined in the GDPR (General Data Protection Regulation), the process begins by assessing the risks you face.

You might have a broad idea of what a risk is, but did you know there’s a specific way you can calculate it? It looks like this:

A + T + V = risk

In this equation, ‘A’ refers to ‘asset’, ‘T’ to ‘threat’ and ‘V’ to vulnerability. By identifying and defining these three elements, you will gain an accurate picture of each risk.

To help you do that, let’s break down each of these terms and how they work within your organisation.

What’s an asset?

An asset is any data, device or other component of an organisation’s systems that is valuable – often because it contains sensitive data or can be used to access such information.

For example, an employee’s desktop computer, laptop or company phone would be considered an asset, as would applications on those devices. Likewise, critical infrastructure, such as servers and support systems, are assets.

An organisation’s most common assets are information assets. These are things such as databases and physical files – i.e. the sensitive data that you store.

A related concept is the ‘information asset container’, which is where that information is kept. In the case of databases, this would be the application that was used to create the database. For physical files, it would be the filing cabinet where the information resides.

What’s a threat?

A threat is any incident that could negatively affect an asset – for example, if it’s lost, knocked offline or accessed by an unauthorised party.

Threats can be categorised as circ*mstances that compromise the confidentiality, integrity or availability of an asset, and can either be intentional or accidental.

Intentional threats include things such as criminal hacking or a malicious insider stealing information, whereas accidental threats generally involve employee error, a technical malfunction or an event that causes physical damage, such as a fire or natural disaster.

What’s a vulnerability?

A vulnerability is an organisational flaw that can be exploited by a threat to destroy, damage or compromise an asset.

You are most likely to encounter a vulnerability in your software, due to their complexity and the frequency with which they are updated. These weaknesses, known as bugs, can be used by criminal hackers to access to sensitive information.

Vulnerabilities don’t only refer to technological flaws, though. They can be physical weaknesses, such as a broken lock that lets unauthorised parties into a restricted part of your premises, or poorly written (or non-existent) processes that could lead to employees exposing information.

Other vulnerabilities include inherent human weaknesses, such as our susceptibility to phishing emails; structural flaws in the premises, such as a leaky pipe near a power outlet; and communication errors, such as employees’ sending information to the wrong person.

Understanding risk

Now that we’ve explained the constituent elements of risk, you can see that the concept is a lot more complex than you might have thought. But, although it sounds counterintuitive, that’s not necessarily a bad thing.

That’s because the specificity of what counts as a risk means that you may well have fewer of them than you estimated.

After all, an information security risk must have something that’s in jeopardy (an asset), an actor that can exploit it (a threat) and a way that they can happen (a vulnerability).

If you’ve identified a vulnerability, but there is no threat to exploit it, you have little to no risk. Likewise, you might detect a threat but have already secured any weaknesses that it could exploit.

Of course, identifying risks is only the first step towards securing your organisation. You need to document them, assess and prioritise them, and finally implement measures to secure them.

This can be a labour-intensive task, but our risk assessment tool, vsRisk, does much of the work for you.

This software package provides a simple and fast way to create your risk assessment methodology and deliver repeatable, consistent assessments year after year.

Its asset library assigns organisational roles to each asset group, applying relevant potential threats and risks by default.

Meanwhile, its integrated risk, vulnerability and threat databases eliminate the need to compile a list of risks, and the built-in control sets help you comply with multiple frameworks.

A version of this blog was originally published on 15 February 2017.

Risk terminology: Understanding assets, threats and vulnerabilities (2024)

FAQs

Risk terminology: Understanding assets, threats and vulnerabilities? ›

A vulnerability is a flaw or weakness in an asset's design, implementation, or operation and management that could be exploited by a threat. A threat is a potential for a threat agent to exploit a vulnerability. A risk is the potential for loss when the threat happens.

What are assets, risk, threats, and vulnerabilities? ›

After all, an information security risk must have something that's in jeopardy (an asset), an actor that can exploit it (a threat) and a way that they can happen (a vulnerability). If you've identified a vulnerability, but there is no threat to exploit it, you have little to no risk.

What is threat vs vulnerability vs risk? ›

Vulnerability vs threat vs risk

In short, we can see them as a spectrum: First, a vulnerability exposes your organization to threats. A threat is a malicious or negative event that takes advantage of a vulnerability. Finally, the risk is the potential for loss and damage when the threat does occur.

What is the difference between an asset and a vulnerability? ›

Asset: Any item of value to an organization, such as data, hardware, software, or intellectual property. Vulnerability: A weakness in a system that can be exploited by a threat to gain unauthorized access or cause damage.

What are assets in risk assessment? ›

An asset-based risk assessment is a type of risk assessment that focuses on identifying and evaluating the risks to an organization's assets. Assets can include physical assets such as buildings, equipment, and infrastructure, and intangible assets such as data, intellectual property, and reputation.

What is an example of an asset threat? ›

Threat: Something that can damage or destroy an asset

Let's use the example of home ownership to illustrate these. Your home would be your asset. A threat would be a burglar, or even the tools that a burglar might use, like a lock pick. These potential threats can do damage to your home if not protected against.

What are the examples of asset risk? ›

Risk assets are assets that have significant price volatility, such as equities, commodities, high-yield bonds, real estate, and currencies.

What are the 4 main types of vulnerability? ›

The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

What are three types of assets in security? ›

Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information.

What is the process of identifying assets and threats in an organization called? ›

Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations. These risks stem from a variety of sources, including financial uncertainties, legal liabilities, technology issues, strategic management errors, accidents and natural disasters.

What are the risk levels of assets? ›

Definition. Your “Risk Level” is how much risk you are willing to accept to get a certain level of reward; riskier stocks are both the ones that can lose the most or gain the most over time.

How do you quantify risk of assets? ›

The Bottom Line

Modern portfolio theory uses five statistical indicators—alpha, beta, standard deviation, R-squared, and the Sharpe ratio—to do this. Likewise, the capital asset pricing model and value at risk are widely employed to measure the risk to reward tradeoff with assets and portfolios.

How do you calculate risk assets? ›

Calculating risk-weighted assets

Banks calculate risk-weighted assets by multiplying the exposure amount by the relevant risk weight for the type of loan or asset. A bank repeats this calculation for all of its loans and assets, and adds them together to calculate total credit risk-weighted assets.

What is the risk on assets? ›

“Risk-on assets” refers to changes in investments that can drive investors to take on higher risk tolerance. Assets representing this portfolio strategy include stocks, commodities, high-yield bonds, real estate and currencies.

What are the risk factors of assets? ›

There are three major risk factors, corresponding to different economic risks: growth, inflation, and liquidity. Pick any asset class, and you'll be able to attribute much of its returns to some combination of these three, plus the risk-free rate.

What are threats and vulnerabilities explain with examples? ›

A vulnerability is a weakness or flaw in an operating system, network, or application. A threat actor tries to exploit vulnerabilities to gain unauthorized access to data or systems. Security vulnerabilities can arise for many reasons, including misconfigurations, design flaws, or outdated software versions.

Top Articles
Markets and Trade – Food and Agriculture Organization of the United Nations
How Will AI Impact Project Management? | UMGC
Netronline Taxes
Cumberland Maryland Craigslist
Melfme
Optimal Perks Rs3
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Ecers-3 Cheat Sheet Free
My.doculivery.com/Crowncork
ATV Blue Book - Values & Used Prices
zopiclon | Apotheek.nl
No Strings Attached 123Movies
Ivegore Machete Mutolation
Insidekp.kp.org Hrconnect
Premier Reward Token Rs3
Craigslist Blackshear Ga
Fool’s Paradise movie review (2023) | Roger Ebert
Wisconsin Women's Volleyball Team Leaked Pictures
Velocity. The Revolutionary Way to Measure in Scrum
E22 Ultipro Desktop Version
Why Should We Hire You? - Professional Answers for 2024
Quest: Broken Home | Sal's Realm of RuneScape
Rufus Benton "Bent" Moulds Jr. Obituary 2024 - Webb & Stephens Funeral Homes
Pasco Telestaff
Bethel Eportal
Wkow Weather Radar
Chamberlain College of Nursing | Tuition & Acceptance Rates 2024
Boise Craigslist Cars And Trucks - By Owner
Finding Safety Data Sheets
Booknet.com Contract Marriage 2
Random Bibleizer
Craigslist Auburn Al
Craigslist Boerne Tx
Blush Bootcamp Olathe
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Blackstone Launchpad Ucf
Imperialism Flocabulary Quiz Answers
Acadis Portal Missouri
Los Garroberros Menu
Winco Money Order Hours
Mid America Clinical Labs Appointments
Noaa Duluth Mn
Cl Bellingham
Trivago Sf
Joey Gentile Lpsg
Shell Gas Stations Prices
Missed Connections Dayton Ohio
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Jesus Calling Oct 6
ats: MODIFIED PETERBILT 389 [1.31.X] v update auf 1.48 Trucks Mod für American Truck Simulator
Cataz.net Android Movies Apk
Supervisor-Managing Your Teams Risk – 3455 questions with correct answers
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6252

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.