Determining Risk Associated with Information Assets | Exam CISM

Best Way to Determine Risk Level of Information Assets Processed by IT Application

Prev Question Next Question

Question

What is the BEST way to determine the level of risk associated with information assets processed by an IT application?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

When it comes to determining the level of risk associated with information assets processed by an IT application, the BEST approach would be to evaluate the potential value of the information for an attacker. This means that the organization should consider the information that could be targeted by an attacker and determine how valuable it would be to them.

The reason why this approach is effective is that attackers are motivated by the potential gains they can make from compromising the confidentiality, integrity, or availability of information. The higher the potential value of the information, the more likely attackers are to target it, and the higher the level of risk associated with it.

In contrast, the other answer options do not provide an accurate or comprehensive assessment of the level of risk associated with information assets processed by an IT application.

Calculating the business value of information assets, for example, may not take into account the potential value that the information could have for an attacker. Additionally, the cost of acquiring information assets for the business or the compliance requirements associated with the information may not necessarily reflect the level of risk associated with the information assets.

In summary, evaluating the potential value of the information for an attacker is the BEST way to determine the level of risk associated with information assets processed by an IT application. This approach considers the motivation of potential attackers and can provide a more accurate and comprehensive assessment of the risks involved.