Skip to main content

Questions tagged [risk-analysis]

Risk Analysis is a practice used to identify and assess factors that may jeopardize the success of a project or achieving a goal. Security Risk Analysis or Risk Assessment could be Quantitative and Qualitative

1 vote
1 answer
77 views

I have some considerations about the following threat modelling and risk management combination approach: Is it a mistake for the standard ISO 27001 RA method (a well-established and standardised ...
t3kt0n1c's user avatar
0 votes
1 answer
160 views

I want to have a definitive understanding of the terms risk assessment and threat modelling. I read different articles, but I still can't grasp the difference. How do I know which exercise I should do?...
anonymous's user avatar
  • 559
2 votes
1 answer
101 views

For higher API request volumes, some APIs will offer some form of batch API requests (e.g. 1, 2). These allow for one HTTP(S) call to send many effective requests, freeing up network resources and ...
ZX9's user avatar
  • 173
3 votes
0 answers
158 views

I was recently with a client discussing their cyber risks and what main risks we were going to focus on. "And your top 5 information security risks are risks 1,2,3,4,5" He then said to me, &...
daikin's user avatar
  • 1,107
1 vote
0 answers
85 views

I’m developing a Risk Management Implementation strategy for my small SaaS organization, and I’d appreciate your feedback on the soundness of the approach outlined below. We’re hosted in the cloud, ...
karan bhandari's user avatar
3 votes
2 answers
486 views

This question is inspired by someone's comment on this question elsewhere In the modern era of Internet and encryption it's quite surprising that countries like Russia still regularly use coded radio ...
mustaccio's user avatar
  • 181
0 votes
1 answer
285 views

I look on all the corporations and firms that have embraced Microsoft Teams in the past and I can not stop wondering if it is a disaster waiting to happen or if I am missing something important. We ...
Marek Puchalski's user avatar
1 vote
0 answers
124 views

I have to add provide a draft of a risk assessment for a small EU project. As I've never done this, I struggle with identifying assets or vulnerabilities. I'm aware of very general lists, but I wonder ...
sk904861's user avatar
  • 111
0 votes
1 answer
176 views

I have a key-value database that uses asymmetric RSA-OAEP encryption to encrypt the data. The data is stored in tuples of (public key, encrypted data). The user identifies their data by the public key,...
willuhmjs's user avatar
2 votes
1 answer
281 views

While developing web software, I typically run a browser (chrome) from my IDE. Here's an example launch.json in VSCode: { // Use IntelliSense to learn about possible attributes. // Hover to ...
Nathan Goings's user avatar
1 vote
1 answer
231 views

I have a custom Debian router installation which I'm trying to keep both secure and low-maintenance. I've therefore set some scripts which keep my Docker containers, blocklists, and OS (security ...
Synthetic Ascension's user avatar
2 votes
0 answers
552 views

I recently stayed at a hotel where outbound SSH traffic (and seemingly only SSH traffic) was blocked on the guest WiFi network, and I'm trying to figure out what security-based rationale they might ...
Psychonaut's user avatar
-1 votes
1 answer
159 views

I m doing a Risk analysis according to an information security risk management guideline and in the risk assessement table there was a column called "initial Likelihood of risk scenario". ...
Zorghost's user avatar
2 votes
0 answers
402 views

I asked this question in money about telling my bank about using a second hand or grey market mobile phone. The the implication of some of the comments is that any worry is misplaced. It seems to me ...
User65535's user avatar
  • 447
4 votes
2 answers
626 views

I have been looking at risk assessments lately and I am looking for a way to practically estimate likelihood. Most people recommend assessing based on historical precedent which sounds great to me, ...
Mattey's user avatar
  • 97

15 30 50 per page
1
2 3 4 5
12