Expert Advice Community

Guest

Threats identification

  Quote
Guest
Guest user Created:   Dec 06, 2016 Last commented:   Dec 06, 2016

Threats identification

I have an computer as an asset (note: no data/information is stored on it, we use shared folders), what are then the threats? only the loss of the device? or malfunction of system, fire?
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Dec 06, 2016

Answer: To identify threats you should consider how the information confidentiality, integrity and availability aspects may be compromised by a computer. Some examples of threats you should consider are:

- Unauthorized access.
- Loss of access to information.
- Computer damaged.

This article will provide you further explanation about identifying threats:
- ISO 27001 risk assessment: How to match assets, threats and vulnerabilities https://advisera.com/27001academy/knowledgebase/iso-27001-risk-assessment-how-to-match-assets-threats-and-vulnerabilities/

This material can provide you some other examples of threats:
- Catalogue of threats & vulnerabilities https://advisera.com/27001academy/knowledgebase/threats-vulnerabilities/

These materials will also help you regarding threats identification:
- Book Secure & Simple: A Small-Business Guide to Implementing ISO 27001 On Your
Own https://advisera.com/books/secure-and-simple-a-small-business-guide-to-implementing-iso-27001-on-your-own/
- Free online training ISO 27001 Foundations Course
https://advisera.com/training/iso-27001-foundations-course/

Quote
0 0
Guest
jacekwojdyla Dec 06, 2016

Thanks! well, we use shared folders and have a policy to not save any information on clients. this implies that information values such as A/I/C can not be affected, so in this case I assume that it is not necessary to list computers in the risk assessment process, right?

Quote
0 0
Expert
Rhand Leal Dec 06, 2016

In your scenario you use the computer only to access information, not storing it, but if the computer is somehow compromised the information can be at risk.

For example, if a malware is installed in the computer, files can be downloaded without user knowledge. Another point is that only a policy defining information is not to be saved in clients may not be enough to prevent user to actually download files, and sometimes, depending upon the information system, information can be downloaded to clients (as temp files), and if the system is not well configured to properly delete temp files, they may remain in the client.

So, my suggestion is you should consider computers in you risk assessment process. During the process you may identify that there are no relevant risks regarding the computer (there is no risk or the risk value is acceptable), and no further actions are required.

Quote
0 0
Guest
jacekwojdyla Dec 08, 2016

thanks, very helpful input. will consider your suggestions.

Quote
0 1

Comment as guest or Sign in

HTML tags are not allowed

Dec 06, 2016

Dec 08, 2016

Suggested Topics