ABSTRACT

For several reasons, this simple equation is merely an illustration of the principle that security risk is calculated based on an understanding of the asset value, the extent of the threat, and the likelihood of the threat exploiting an existing vulnerability. Various security risk assessment approaches have di¤erent ways of specifying the security risk equation variables and of calculating their result.