Conduct risk assessment on PCs and networks

5 pts.
Information security governance
Risk analysis
Risk assessment
Security threats
I want to how to conduct a risk assessment to protect our PCs and networks.

Answer Wiki

Thanks. We'll let you know when a new response is added.

Check out


Conducting risk assessment could not be predicted right away. This is because virus or any other malware programs could attack anytime with a single click or press of your keyboard. The most important thing you have to consider is to make sure that you have the latest antivirus software in a full license and constantly scan your computer system for possible threats.

The best factors you have to consider in your risk assessment procedure for the effective protection of your computer are the following.

-Antivirus Software
-Operating System Updates

Discuss This Question: 2  Replies

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
  • Bobkberg
    Before you get too far, I'd ask management (assuming that they asked you to do this), what sorts of risks they are looking for. Here are some basic areas - each of those divides into many more. 1) Physical - Dust, dirt, lack of cooling, dirty electricity, safety of equipment and personnel 2) Unpatched (and therefore vulnerable) workstations and servers, Event logs checks for important problems - disk failure, time synch errors, file system integrity. 3) Poor security configurations (no controls on passwords, file sharing, wide-open firewall, etc.) 4) Poor security awareness on the part of staff - i.e. has everyone been trained on what's good and bad? 5) State of cleanliness/infection from a virus and spyware point of view. Also - check out the SANS reading room at Lots of good material there too. Bob
    1,070 pointsBadges:
  • Paolaas
    Try to classify the data you would like to assess. With your classification as a basis, you know which data is vital for your organisation, and needs to be well protected and which data is more or less public. Classification in ITIL terms are confidentiality, integrity and availability. Re your local legislation, confidentiality refers to any privacy legislation local or, if applicable, European Union acts. With integrity you ensure the completeness and timelyness of your data and availability has to do with the continuity of your data. Let me know if there is anything I can help you with.
    10 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.


Share this item with your network: