Organisation Threats
What are threats and threat types?
Threat types are collections of threats which are interrelated. A threat is a potential risk that has a given likelihood of causing an impact to an organisation. To ensure a consistent approach, threats are considered at an organisation level, and risk assessments that take place must use this list. To view organisational threats, click on “RA Setup” from the main organisation homepage, then select “Organisation Threats”.Threat Types
Adding new threat types
New threat types can be added by clicking on the “New Threat Type” link in the sidebar. Threat types are placeholders to group together threats and therefore only require a name.Deleting threat types
Threat types can only be deleted when there are no threats attached to them. Click on a threat type that needs to be deleted and click “Delete Threat Type” from the left hand sidebar. Warning: As a threat type can only be deleted when no threats exist, this is a firm delete operation.
Adding new threats
New threats can be added by clicking on the “New Threat” link in the sidebar. As well as name, description and threat type, other attributes exist that need to be defined. These- Threat Reference - This is an organisation defined reference for the threat, there is not default but it is recommended that a logical naming scheme is used.
- Duration Flag - Some threats could cause an impact more because they affect a resource for a time period that actually has a direct impact. For example, within an office based business, a power cut might cause very little direct impact but would render an office unusable. The impact can then be derived from the impact that was assessed during the BIA.
1.1.3.5 Threat
Threat to resource mapping
Different threats only affect certain types of resources. For each threat that is entered into Abriska, it must be linked to each of the default resource types. Warning: This will delete the existing mapping and could therefore affect any risk assessment that has already been conducted. This is a firm delete operation. 1.1.3.6 Resource
Resource threat linking hierarchy
To allow an additional level of granularity to be added to this relationship, individual resources or resource sub-categories can have a customised threat linking.Threat to control mapping
If a risk assessment is being used in conjunction with the control maturity Threat attributes
If the impact variable is