


Volume 20 No 5 (2022)
Download PDF
ASSESSING CYBERSECURITY RISK: METHODS AND BEST PRACTICES FOR SECURING COMPUTER NETWORKS
Anshu Bansal Gupta, Shipra Gupta, Maman Poul
Abstract
Assessing cybersecurity risk is a crucial process for organizations and countries to identify and manage potential threats to their computer networks. Cybersecurity risks can come in various forms, including external threats like cyber-attacks, malware, and hacking, as well as internal threats like employee negligence or malicious insider activity. To manage these risks, organizations and countries use various methods such as vulnerability scanning, penetration testing, risk assessments, compliance audits, red team/blue team exercises, and security control testing. By conducting regular cybersecurity risk assessments, organizations and countries can improve their security posture, protect their critical infrastructure, data, and systems, and minimize the risk of a security incident or data breach. This paper provides an overview of the various methods used to assess cybersecurity risk, their benefits and limitations, and the importance of integrating cybersecurity risk assessment into an organization's overall security strategy.
Keywords
cybersecurity, risk analysis, pen testing
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.