Defined term

Risk Assessment

Risk Assessment: The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and safeguards…

Verified
🏆 High Consensus
security
Operational Security

Definition

The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and safeguards that would mitigate this impact.

Alternative Definitions

Definition 2

Process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and additional safeguards that would mitigate this impact.

Source: NISTType: standard
Definition 3

The process of identifying, estimating, and prioritizing risks to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls that are planned or in place.

Source: The State and Local Election Cybersecurity PlaybookType: external
Definition 4

The process of identifying, estimating, and prioritizing risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis.

Source: Committee on National Security Systems Glossary CNSSI 4009-2015Type: standard
Definition 5

The product or process which collects information and assigns values to risks for the purpose of informing priorities, developing or comparing courses of action, and informing decision making.

Source: NICCS GlossaryType: standard
Definition 6

The process of identifying risks to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation, arising through the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis. (SP 800-53; SP 800-53A; SP 800-37) (NISTIR)

Source: The Cyber GlossaryType: external
Definition 7

The “process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and safegua rds that would mitigate this impact.” 2005 VVSG GLOSSARY.

Source: Electronic Voting GlossaryType: external

Sources

1
Glossary of Election Terms, U.S. Election Assistance Commission (EAC)
View Source
2
Glossary for Voting Systems, National Institute of Standards and Technology (NIST)
View Source
3
NIST Election Terminology Glossary, National Institute of Standards and Technology (NIST)
View Source
4
The State and Local Election Cybersecurity Playbook
View Source
5
Committee on National Security Systems Glossary CNSSI 4009-2015
View Source
6
EAC Glossary of Terms
View Source
7
EAC Glossary of Election Terms
View Source
8
NICCS Glossary
View Source
9
NIST Election Glossary
View Source
10
The Cyber Glossary
View Source
11
Electronic Voting Glossary
View Source

Continue Research

Browse the full glossary for adjacent terms, or subscribe for updates when definitions and sources are expanded.