Cyber security Risk Assessment [A step by step method to perform cybersecurity risk assessment]
56,054
Published 2019-09-30
In this tutorial, we will learn about
1. Cyber Security Risk Assessment,
2. Incident response plan in cyber security
Cyber security risk assessment is defined by NIST as the risks assessments that are used to identify, estimate, and prioritize risk to organizational operations, organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems. or A security risk assessment identifies, assesses, and implements key security controls in applications. It also focuses on preventing application security defects and vulnerabilities.
A cyber security risk assessment is a crucial part of any company or organization’s risk management strategy.
Click on the 🔔bell icon to get instant notification of my new videos. You will get notified about future music, shows, covers and projects before anyone else.
► SUBSCRIBE FOR MORE VIDEOS: bit.ly/2EWoyIW
Time stamping
0:00 Introduction
0:16 Characterize the system
1:00 Identify threats
2:45 Determine inherent risk and impact
3:20 Analyze the control environment
5:05 Determine a likelihood rating
6:05 Calculate the risk rating
7:50 Question
🎥MORE VIDEOS BY SECURE DISRUPTIONS
Data Analysis: bit.ly/2NeE5aU
Cyber Security: bit.ly/2ZrPI0O
Python Programming: bit.ly/3qAbfAj
AWS vs Azure: bit.ly/3k1g5UB
Azure tutorial for beginners: bit.ly/3pAl9QZ
RECOMMENDED BOOKS AND COURSES
We can’t recommend the guide “Cyber Self Défense” much if you are serious about your cyber defense or your cyber security. The guidebook is a definitive guide on internet security & privacy. Cyber Self Défense is split into super easy to follow chapters. Here’s a preview.
bit.ly/3lyjDAJ
If you want to learn in a self-paced manner and want to have a pocket friendly course, below course/s from Udemy are our recommendations.
1. Learn about Practical Ethical Hacking - The Complete Course
bit.ly/3axUhvo
2. The Complete Cyber Security Course : Hackers Exposed! Vol - 1
bit.ly/2XjLZS6
OTHER RECOMMENDED COURSES
There is no denying the fact that the advantages of attending a course in live session mode are manifold. You can ask live questions, ask for repetitions of any concept, contact with your peer groups.
If are serious and want to learn in a live session and ready to shell out some money, below courses from Edureka are recommended. Once you are skilled, you can easily get return of investment by working with some of the top organizations.
1. Cyber security training and certification - 📚Live Class - bit.ly/37pshcS
This course is live, instructor-led, and gives you ample used case to practice.
If you want to earn credentials from leading companies such as IBM, Google and universities such as Yale Stanford and Georgia Institute of Technology and want to gain expertise with practical skills also want to earn industry-recognized credentials and professional certificate from Google, IBM, Facebook & others, we can’t recommend Coursera much. Here are our recommendations.
1. Cybersecurity Specialization - Cybersecurity Fundamentals and Construction of Secure Systems – Offered by The University of Maryland - bit.ly/3g5mK0d
2. IBM Cybersecurity Analyst Professional Certificate - Offered by IBM - bit.ly/3mPaiTO
If you a multitasker, or someone who travels a lot, or can’t stick at a place staring videos for long, below audio book is recommended from our side. It is an audio recording of the book. Also you get two free audiobooks to start with and you can cancel at any time.
👬WHO ARE WE
We are a group of cyber security professionals and enthusiasts. Secure Disruptions is an online IT security community. We create videos (One video every fortnight on different IT security topics) to spread security awareness, especially on the trending disruptive technologies such as IT security, cyber security, cloud security, network security, DevOps security, application security, data security in an easy to understand language for educating peers and business community about security.
📲GET IN TOUCH
If you’d like to talk, we would love to hear from you. Drop us an email to
[email protected], and we will respond to everyone
PS: Some of the links in this description are affiliate links.
⚙GEARS
Video making software credits : Doodle maker software
jvz6.com/c/1696327/357045
📞CONTACT
For business enquiries contact email : securedisruptions@gma
All Comments (21)
-
Want to know what are the top 5 technologies to learn in 2024.? Check it out here. youtu.be/qVGN5qPDkVc
-
True regular risk assessment should be a part of the Risk assessment where we improve the process and should be ready when we receive any incident...
-
Impact X Likelihood and True
-
True, thanks for the well explained video on cybersecurity risk assessment.
-
short but informative
-
In my humble opinion, the starting point should be the identification/ inventory of information assets, segregate the assets relative to exposure to cyber threats etc
-
Clear explanation. Thank you!
-
Awesome
-
Excellent tutorial
-
short and sweet!!
-
TRUE
-
Thats for this I'm doing a secondment in cybersecurity and my manager told me to do my first risk assessment of an update
-
Very clear
-
True
-
Thanks
-
My answer is TRUE
-
How do you perform cyber security risk assessment in your organization? Do you do something innovative? Drop us a comment.
-
How do you conduct cybersecurity stress test (CST) using: 1. Penetration testing, and 2. Vulnerability assessment testing. Thank you.
-
True.
-
who is the inventor this formula Risk (R) = Likelihood (L) × Severity (S) or risk matrix? with reference.