Expert Advice Community

Guest

Identification of threats

  Quote
Guest
Guest user Created:   Sep 08, 2018 Last commented:   Sep 08, 2018

Identification of threats

how do you know if you have identified all the threats to an organisation? I have had to add threats to your list as I couldn’t may all the threats I could think of back to you list. Now I am wondering what other threats I may have missed.
0 0

Assign topic to the user

ISO 27001 BACKUP POLICY

Set of rules for the creation of backup copies.

ISO 27001 BACKUP POLICY

Set of rules for the creation of backup copies.

Guest
Antonio Jose Segovia Sep 08, 2018

Answer: Our catalogue of threats/vulnerabilities is enough for most of companies (small and medium size), because the list is generic, and includes a lot kind of threats, useful for any business. Anyway, each business is a different world, and maybe in some cases you need to include specific threats, but probably with our list, you can identify the most important ones.

You should know that it is not possible to identify all the risks - this is why risk assessment needs to be updated regularly (at least one a year, but if possible more often), and through this updates you will improve the list by adding the risks you identified through time.

You can also use the catalogue of ISO 27005, which is an international standard that gives you a code of best practices for the information security r isk management, including a catalogue of threats and vulnerabilities, and maybe can help you as complement of our catalogue. You can buy this standard directly from iso.org : https://www.iso.org/standard/75281.html

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Sep 08, 2018

Sep 08, 2018

Suggested Topics