Shiver me timbers, a Risk Assessment!

Skip to content

Avast ye! This be a machine-translated text, an’ it may contain errors, aye!

Knowin’ that threats be existin’ be good, but ‘tis little help if ye don’t know which threats be most relevant to yer system. A risk analysis helps ye prioritize: what should ye be protectin’, what can go wrong, and what should ye be doin’ about it?

What be a Risk Analysis?

A risk analysis be a systematic review where ye:

  1. Discover what can go amiss
  2. Consider how likely it be
  3. Consider how grave the consequence be
  4. Propose measures to lessen the risk

Ye need not be a security expert to do this. ‘Tis about thinkin’ systematically.

Avast, Here Be the Steps!

1. Treasure Appraisal: What Booty Do We Have?

Before ye can guard somethin’, ye must know what ye possess. List the most valuable treasures in the system:

Treasure Example Why ‘tis Important?
Data User data, project files Cannot be recreated
Services Web server, email, file storage Folk be dependin’ on ‘em
Hardware Servers, network equipment Costs coin and time to replace
Reputation The trust users have in the system Difficult to rebuild

2. Risk Identification: What Could Go Astray?

Think through what might threaten yer treasures:

Risk Description
Ransomware Files be encrypted and demandin’ ransom
Power Outage Servers and networks be fallin’ dark
Disk Failure Data be lost to the depths
Phishing Someone gives up their passwords
Misconfiguration A change that brings a service to its knees
Natural Disaster Fire, water damage, storms

3. Weigh the Likelihood and Impact

For each risk, ye be assessin’ two things on a scale (e.g. 1-5):

  • Likelihood: How likely be it that this comes to pass?
  • Impact: How grievous be it if ‘tis to happen?

Risk Value = Likelihood × Impact

Risk Likelihood (1-5) Impact (1-5) Risk Value
Disk Failure 3 4 12
Ransomware 2 5 10
Phishing 4 3 12
Power Outage 2 3 6
Misconfiguration 3 3 9

The higher the risk value, the more priority ye should give to the measures.

Risikomatrise

A risk matrix shows this visually with colours:

  • 🟢 Low (1-6): Acceptable risk, but keep a weather eye on it
  • 🟡 Medium (7-14): Should have measures in place
  • 🔴 High (15-25): Requires immediate action

4. Propose Courses o’ Action

Fer each risk o’ high or moderate value, ye propose measures:

Risk Course o’ Action
Disk Failure Backup (3-2-1 rule), RAID on servers
Ransomware Updates, offline backup, trainin’
Phishin’ Awareness, MFA, email filterin’
Misconfiguration Documentation, change log, snapshot afore changin’

5. Chart the Course and Keep a Weather Eye

A risk assessment be not a one-time task, aye. Scribble it down, share it with yer crew, and review it regularly (such as every six months or after an event).

Medium Task 1 - Conduct a Mini-Risk Analysis

Choose a system ye know well (e.g., yer own PC, a VM ye’ve set up, or the school network) and walk the plank through these steps:

  1. List 3-5 treasures (what be important?)
  2. Find 3-5 perils (what can go wrong?)
  3. Give each point a probability and consequence (1-5)
  4. Propose measures for those with the highest risk value

Use a spreadsheet or a simple table in Markdown.

Summation

  • A risk analysis be helpin’ ye prioritize security measures, aye.
  • The steps be: value assessment, risk identification, assessin’ probability/consequence, measures, and documentation.
  • Risk value = probability × consequence
  • Risk analysis ain’t a one-time task, it should be updated regularly, savvy?

Ye can download a template for risk assessment at Datatilsynet.