Special Offer! Limited-Time Offer! Get 25% Off on All Certification Exams – Prepare & Pass with Confidence! Use Code: DC25OFF
creative products, the company has been part of the printing industry for more than 30 years. Three years ago,
the company started to operate online, providing greater flexibility for its clients. Through the website, clients
could find information about all services offered by Printary and order personalized products. However,
operating online increased the risk of cyber threats, consequently, impacting the business functions of the
company. Thus, along with the decision of creating an online business, the company focused on managing
information security risks. Their risk management program was established based on ISO/IEC 27005
guidelines and industry best practices.
Last year, the company considered the integration of an online payment system on its website in order to
provide more flexibility and transparency to customers. Printary analyzed various available solutions and
selected Pay0, a payment processing solution that allows any company to easily collect payments on their
website. Before making the decision, Printary conducted a risk assessment to identify and analyze information
security risks associated with the software. The risk assessment process involved three phases: identification,
analysis, and evaluation. During risk identification, the company inspected assets, threats, and vulnerabilities.
In addition, to identify the information security risks, Printary used a list of the identified events that could
negatively affect the achievement of information security objectives. The risk identification phase highlighted
two main threats associated with the online payment system: error in use and data corruption After conducting
a gap analysis, the company concluded that the existing security controls were sufficient to mitigate the threat
of data corruption. However, the user interface of the payment solution was complicated, which could
increase the risk associated with user errors, and, as a result, impact data integrity and confidentiality.
Subsequently, the risk identification results were analyzed. The company conducted risk analysis in order to
understand the nature of the identified risks. They decided to use a quantitative risk analysis methodology
because it would provide more detailed information. The selected risk analysis methodology was consistent
with the risk evaluation criteria. Firstly, they used a list of potential incident scenarios to assess their potential
impact. In addition, the likelihood of incident scenarios was defined and assessed. Finally, the level of risk
was defined as low.
In the end, the level of risk was compared to the risk evaluation and acceptance criteria and was prioritized
accordingly.
Based on the scenario above, answer the following question: What type of risk identification approach did Printary use?
© Copyrights Dumpscity 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.