Questions tagged [risk]

104 questions
1
vote
3 answers

Risk Assessment Methodology ISO 27001

I would like to apply ISO 27001 best practices for a company that has not completed its final online architecture yet and it is still under development phase. However, they pretty much know which technologies/systems (mainly on cloud) to be used but…
1
vote
1 answer

Risk in FTP connect

excuse me the question perhaps beginner, but came out a doubt. One person asked me to edit your site, but it was very strange story and did not know this person yet ... When I connect me by filezilla, an unknown certificate warning appeared, and was…
Fábio
  • 11
  • 1
1
vote
1 answer

How do companies deal with storing their source code on GitHub from a data-loss risk management point-of-view?

When it comes to storing my data "in the cloud" (aka: on someone else's server), I alway have kind of a bad feeling that something like "Google's deleted an artist's blog, along with 14 years of his work" might happen to my data, too. On the other…
Uwe Keim
  • 2,686
  • 2
  • 15
  • 25
1
vote
1 answer

Is it a security risk, lack of knowledge for reactive action, when abuse mail is rejected?

When inspecting the DNS configuration for example with dnsinspect.com, the following shows up sometimes (note I used example.com): Accepts Abuse Address WARNING: Found mail servers which are not accepting emails to abuse@example.com address:…
Bob Ortiz
  • 6,234
  • 8
  • 43
  • 90
1
vote
1 answer

How could one determine if a web page is vulnerable?

Suppose that we have a web page. This page could be vulnerable to any attack such as SQLI. By looking the HTML code of the page, we can find some input elements that could be used by attackers to exploit vulnerabilities. So we can guess that pages…
0
votes
1 answer

What is a good risk assessment for different types of online file references?

Personally I'm a big fan of hosting everything myself, just because of the privacy aspect. For that reason I try to use external files as least as possible. Nevertheless, I'm wondering if it is a security risk to hotlink to files other than…
Bob Ortiz
  • 6,234
  • 8
  • 43
  • 90
0
votes
1 answer

Risks of software backdoors

Risks of backdoors in software are evident ever since Ken Thompson's Turing Award Lecture "Reflections on Trusting Trust". Certainly this applies to hardware just as well. Limiting ourselves here to software, what are the genuinely good solutions of…
Mok-Kong Shen
  • 1,199
  • 1
  • 10
  • 14
0
votes
1 answer

WLFriends encrypted login risk

I recently had created on WLFriends.org which is presented by Wikileaks, I noticed a big thing there that the process of signing up at WLFriends was very distinct from the other normal sites. There, they asked my language, place, contact details, my…
Saharsh
  • 121
  • 3
0
votes
1 answer

What is the impact of someone accidentally getting my IMEI number from my Android phone?

I have a concern regarding how risky it is if someone knows or has the copy of my 2 IMEI numbers. As we all know, on Android phones, the IMEI are at the back cover of the phone like a sticker. So, my question is, what if someone intentionally took…
0
votes
1 answer

Safety assessment vs. Security assessment. What's the difference?

The safety requirement confuses me when I look at security risk assessment methodologies. Looking at safety alone, it usually is related to the physical aspect and the physical interactions between a system and the user. But it also looks like that…
NoRel
  • 1
  • 5
0
votes
1 answer

Risk Assessment of Windows Cert Store

We all know that SmartCards protect private keys much better than any software-based solution. However, when it comes to the Windows Cert Store to be compared to SmartCards: how difficult is it for an attacker to extract the private key of a…
luke
  • 3
  • 2
0
votes
1 answer

What are the risks of allowing general users to add printers to their company laptops?

I work for a company with a large user base. There is a requirement to allow users to add printers to their laptops e.g. when working from home. What are the security risks? Is their a bad actor can use a printer to hack the laptop? Can a print…
Architect
  • 631
  • 1
  • 6
  • 9
0
votes
0 answers

Risk, threat, vulnerability with an example

Given a situation where a system has SSL 3.0 and TLS 1.0 enabled would the following mapping be accurate: Weakness/vulnerability: The remote service accepts connections encrypted using TLS 1.0 and SSL 3.0. Threat: An attacker can exploit these…
user211245
  • 79
  • 3
0
votes
2 answers

risk threat vulnerability

From ENISA - Threat and Risk Management Identification, analysis and evaluation of these threats and vulnerabilities are the only way to understand and measure the impact of the risk involved and hence to decide on the appropriate measures …
blabla_trace
  • 236
  • 1
  • 9
0
votes
2 answers

Risk of infecting the host OS if the guest OS is out of date

I'd like to know how much the risk changes if I don't update the software on the guest OS in a VM (applications and the guest operating system itself), compared to the risk in case it's all kept up-to-date. NOTE: The guest OS in the VM can…
reed
  • 15,398
  • 6
  • 43
  • 64