Glossary of Terms
The probability that the actual outcome or result of an action will be different from the expected outcome.
The level of risk that an organization is prepared to accept in the pursuit of its objectives.
The degree of risk or uncertainty that is deemed acceptable to either an individual or an organization.
Risk stemming from people, such as employees falling for phishing attempts or malicious "insider threats" who sell or misuse company data.
Risk arising from sources like insecure devices, network vulnerabilities, loose firewall rules, or insecurely stored passwords.
Risk from threats that hinder everyday business functionality, such as physical threats (fires, floods) or large-scale technical issues like ransomware attacks.
The possibility that future regulations or legal restrictions may not align with the current business model, potentially forcing major changes or even business failure.
The process of identifying potential risks that could prevent an organization from achieving its objectives. It is the first step in the risk management process.
A method of creating scenarios to identify potential threats to system security. A common technique is STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege).
The process used to identify, evaluate, and estimate the levels of risks involved in a situation, followed by determining an acceptable risk level.
A subjective analysis of the probability and impact of risks, often based on expertise and judgment, using categories like "High," "Medium," and "Low."
A method that seeks to assign numerical values to risks, using data and statistical methods to quantify probability and potential losses (e.g., in monetary terms).
Tools designed to help identify, evaluate, and mitigate risks in organizations of all sizes. Examples include NIST RMF, TARA, COSO, and COBIT.
The National Institute for Standards and Technology (NIST) Risk Management Framework, designed to integrate security and privacy into the development cycle of digital systems from the start.
The COSO enterprise risk management framework, designed to seamlessly integrate risk management into a corporate strategy for success. It is often visualized as a cube.
The Control Objectives for Information and related Technology (COBIT) framework, developed by ISACA for IT management and governance.
Voluntary sets of guidelines and practices to help organizations mitigate risks (e.g., CIS Controls, NIST SP 800-53).
Mandated procedures aimed at mitigating risks and their potential harms, which often entail consequences (like fines) for non-compliance.