Determining New Risks in Legacy Applications

Best Method for Identifying New Risks in Legacy Applications

Prev Question Next Question

Question

Which of the following is the BEST method for determining whether new risks exist in legacy applications?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

When considering legacy applications, which may have been in use for an extended period of time, it is important to assess whether new risks exist. This assessment can be accomplished using several methods, each with its strengths and weaknesses.

Option A: Regularly scheduled risk assessments Regularly scheduled risk assessments involve periodically examining the application to determine whether any new risks have arisen. This method can be useful in identifying new risks, but it may not be as effective in identifying all potential risks, particularly if the assessment is conducted infrequently or if the assessment team is not familiar with the application.

Option B: Automated vulnerability scans Automated vulnerability scans can be useful in identifying known vulnerabilities in an application. However, they may not identify all vulnerabilities, particularly those that are not known or those that are not easily detected through automated means.

Option C: Third-party penetration testing Third-party penetration testing involves engaging an external party to simulate an attack on the application to identify any vulnerabilities. This method can be effective in identifying potential risks that may not be identified through other methods. However, it can also be expensive and time-consuming.

Option D: Frequent updates to the risk register Frequent updates to the risk register can be useful in identifying new risks as they arise. However, this method relies on individuals to identify potential risks and may not be as effective in identifying all potential risks.

Overall, the best method for determining whether new risks exist in legacy applications will depend on the specific circumstances, such as the size and complexity of the application, the available resources, and the level of risk tolerance. Ideally, a combination of these methods could be used to ensure that potential risks are identified and addressed in a timely manner.