TRANSCRIPTEnglish

BTEC Level 3 IT - Unit 11 - Cyber Security & Incident Management - Part 03 - RISK ASSESSMENT Theory

13m 56s2,639 words368 segmentsEnglish

FULL TRANSCRIPT

0:01

[Music]

0:06

welcome back welcome back so this is

0:09

going to be the theory so this is just

0:11

going to be the Powerpoint stuff for

0:13

Activity one and in the next video I'm

0:15

going to show you my actual word

0:17

document I'm gonna have the exam paper

0:19

to one side my word document to one side

0:21

and go through the process I would

0:22

normally go through

0:24

so a risk assessment is the process of

0:27

identifying what hazards currently

0:29

exists or may appear in the workplace

0:31

this was a definition I copied from

0:33

Google not too far from what we are

0:36

going to be doing in this Activity one

0:39

from an examiner's report this activity

0:42

requires Learners to assess the cyber

0:44

security implications of this scenario

0:46

and produce a risk assessment a risk

0:49

assessment template is provided together

0:51

with a simple Matrix for determining

0:54

risk severity so they give you almost

0:56

everything you need

0:58

so what do you actually do what do you

1:00

do in the activity you will get a

1:02

scenario on the exam paper you will need

1:04

to read and make some notes from the

1:06

scenario I recommend highlighting on the

1:09

physical paper I recommend also in Your

1:12

Word documents jotting down notes I've

1:14

actually done that on a few occasions

1:15

where I have my word document template

1:17

open and I simply jot down a few notes

1:19

so I can always go back and copy and

1:21

paste and change things

1:22

uh there will be weaknesses present uh

1:26

some will be obvious and others not so

1:28

much so you have to this is why I

1:29

recommend reading and highlighting

1:31

things not everything is going to be

1:33

obvious

1:34

the scenario will have all the

1:35

information you need this scenario will

1:38

have information of the company the

1:40

hardware and software the company uses a

1:43

plan of the building so that's like a

1:45

diagram showing what rooms they're going

1:47

to have and where things are going to be

1:48

laid out and there will also be a

1:51

network diagram and how the network and

1:53

its devices are arranged so think of a

1:56

network diagram as just well a diagram

1:58

that shows you how what device is the

2:00

company is actually going to be using

2:03

and in some cases well in every single

2:06

case how they are connected

2:08

so Activity one again what to do you

2:10

will need to find these weaknesses so

2:13

the weaknesses I mentioned earlier after

2:15

reading through this scenario you'll

2:17

have to highlight pick out as many

2:19

weaknesses as you can I suggest making a

2:21

list of all the things you find make

2:24

this list exhaustive at first so make

2:26

the league make the list big then trim

2:29

the list down if you need to so every

2:33

single thing that you see or read that

2:35

could be an issue note it down and what

2:38

you would do afterwards is you shorten

2:41

the list but don't start off with just

2:43

three or four things I would say between

2:46

6 and 10 is a good number maybe six and

2:48

eight is a good number but again make

2:51

your list exhaust exhaustive so as soon

2:53

as you see something and you think

2:55

actually this could be a potential

2:56

weakness write it down you can always

2:58

remove it so this is the risk severity

3:00

Matrix table here this is given to you

3:03

in the Activity one template very simple

3:06

to use but I'm going to try and explain

3:08

using my pop one here how it works for

3:11

every threat or weakness that you have

3:13

found you need to do one of these or you

3:15

need to make use of this table what I've

3:18

done in the past is I've created this

3:19

table myself I have it in my document

3:22

and I fill it in for every single thing

3:24

I find I simply I simply copy and paste

3:27

it every time

3:29

so the reciprocity Matrix there are two

3:31

things we need to do using the Matrix

3:33

well it's actually three so that's

3:36

actually wrong the probability of the

3:39

thing occurring so How likely is it that

3:42

this error or this weakness or this

3:45

fault or this issue will occur the

3:47

potential size of law so let's just say

3:50

for argument's sake it does happen what

3:52

is the potential size of loss to the

3:55

company the person or the system

3:57

and then finally how severe the threat

4:00

is so the implications if it happens so

4:02

if this thing happens how bad is it

4:04

going to be for the company uh so things

4:06

you need to do again list all the

4:09

threats do the below for each thread the

4:12

threat probabilities that's a likelihood

4:14

of it happening so How likely is it to

4:17

happen the possible threat impact how

4:20

not how much but how much damage could

4:23

it cause

4:24

and the risk severity Matrix example so

4:27

I've given the example the threat is no

4:29

encryption on the admin server that's

4:30

the example I'm giving imagine this is

4:33

my threat let's give this the worst case

4:36

scenario a popular Secondary School

4:38

which is going to have maybe a server

4:40

it's probably going to have thousands

4:43

and thousands of details of past

4:44

students current students and maybe

4:47

students coming in September so it has

4:49

details on students parents teachers

4:51

payroll information

4:54

it just has everything okay so this is

4:57

going to be a really serious one I need

4:59

to use the risk severity Matrix to work

5:01

out the probability and the possible

5:03

size of loss

5:05

so the probability of the threat

5:07

occurring so again the threat is no

5:09

encryption on the admin server the

5:12

probability in my opinion my educated

5:14

opinion is very likely an educated guest

5:18

based on this scenario so this is going

5:20

to be your interpretation of what you

5:23

think as well right I have worked in a

5:25

school before where one of the sites was

5:27

actually attacked by hackers and they

5:30

were being targeted because obviously

5:33

it's a school security isn't typically

5:34

the best in school because they don't

5:36

typically want to spend a lot of money

5:38

on people and on things and services so

5:42

it's typically relatively easy to get

5:44

into a school versus let's say a

5:46

multi-million dollar company even though

5:48

schools do have millions of pounds so

5:50

I'm gonna say the probability for this

5:52

is very likely

5:53

very likely to happen because if there's

5:55

no encryption on the admin server and

5:57

someone gets into the admin server even

5:59

if it's a student they can see

6:01

everything nothing is encrypted they can

6:03

click on something and read all the

6:04

information and print it and copy it and

6:06

paste it I'm going to say very likely

6:08

then the size of the loss the threat

6:11

again is No encryption on the admin

6:13

server I would say this could be a major

6:16

loss so why would it be a major loss

6:18

think about it like this

6:19

if there is no encryption on the admin

6:22

server and someone gets access to the

6:24

admin server they have all the

6:27

information on every past student every

6:30

current student and potentially students

6:32

coming in in September they have

6:33

information on the cleaners the teachers

6:36

the principal payroll information the

6:38

schools Bank details they have

6:39

information on every single thing so the

6:43

size of the loss and the loss doesn't

6:44

have to be them legitimately losing all

6:48

the data in terms of of um someone

6:50

deleting it that is a big thing as well

6:54

but it could be a case where someone

6:55

just has access to everything so they

6:57

technically lost data because someone

6:59

else has access to it so size of loss

7:01

here could be both things but I would

7:03

stick to them actually losing the data

7:05

not being able to have the data anymore

7:07

and I'm going to say major for this one

7:10

and then finally risk severity how

7:13

severe is this risk if I'm saying the

7:17

probability is very likely and I'm

7:19

saying the size of loss is Major uh I

7:23

would say extreme and let me go over how

7:25

this works again so

7:27

I'm gonna say the probability of the

7:30

threat is very low let me bring my pen

7:31

up one second

7:33

the probability of the threat I said

7:36

very lightly so I'm going to highlight

7:38

that one there you can do this on a

7:40

Excel spreadsheet and copy it into word

7:42

and highlight as and when you need to

7:43

the size of the loss I'm going to say

7:45

major because again if someone gets

7:47

access to a unsecured server that has

7:51

people's details that's going to be a

7:53

major major size of loss and from here

7:56

so we choose very likely from the

7:58

probability and from the bottom row we

8:00

can either choose minor moderate or

8:02

major and then the same thing for

8:05

probability of threat actually it could

8:07

either be very likely likely or unlikely

8:10

we only have three options for those now

8:11

you can add one or two more options if

8:13

you really really wanted to but I don't

8:15

think it's necessary stick with the

8:16

template they give you that's perfectly

8:18

fine

8:19

and then from there we work out the risk

8:21

of severity so if it's very likely and

8:25

this major I'm going to say the risk of

8:27

severity is going to be high or extreme

8:29

and in this case because if they get

8:32

access to the information or the data on

8:34

the server it's going to be detrimental

8:36

to not only the school but to people as

8:38

well because you have addresses names

8:40

data bursts maybe photocopies of of

8:43

birth certificates on passports and Bank

8:45

details this people would have

8:47

everything they need to go out there and

8:49

commit fraud essentially so I would say

8:51

again very likely for the probability

8:54

that's why I've circled that one there

8:55

and I would say size of loss would be

8:57

major and the risk severity is going to

9:00

be extreme so this is how you use this

9:04

table I'm gonna probably do another

9:06

example when I get to my word document

9:08

section I'm going to have a list of

9:10

issues or weaknesses and I'm going to go

9:12

through this a few times with you guys

9:13

just so everyone fully fully understands

9:15

it

9:16

clarissivarity Matrix I'm going to say

9:19

copy and paste the table as many times

9:20

as you need it you don't need to copy

9:23

and paste it you could simply create

9:24

your own table do whatever you think is

9:27

best but I would copy and paste the

9:30

table and for every single weakness I

9:33

find I fill in the information on the

9:35

way I would do that I would simply maybe

9:36

highlight this green so if I'm saying my

9:39

threat is no encryption on the admin

9:41

server I would highlight this one here

9:44

green I would highlight size of loss as

9:46

major and I would highlight the risk

9:48

severity as extreme so it's very obvious

9:50

to me to The Examiner that's reading

9:52

what does this person think about that

9:54

particular threat you could even go as

9:56

far as to create a quick table again

9:58

that says that gives you the threat and

10:01

then under the threat you could have

10:02

probability of thread size of loss and

10:05

risk severity and you can simply put

10:07

that put that and you can simply put

10:09

that information in I will go over this

10:11

when I get to my word document copy and

10:13

paste the table as many times as you

10:15

need it do the same aim for the

10:17

assessment itself so that's the next

10:19

section which I am going to show as well

10:21

or create a shortened version of what

10:24

the table shows I will show that as well

10:26

so the risk severity Matrix the threat

10:28

again is No encryption on the admin

10:30

server this is how I would do mine

10:32

personally so you could do the table way

10:35

or you could just have this in text on a

10:37

Word document this is only going to be

10:39

what three or four lines in a Word

10:40

document so you could say threat and you

10:42

state what the threat is the probability

10:45

I've said for mine is that it's going to

10:47

be very likely the size of loss I've

10:50

said is going to be major and the risk

10:52

severity I've said is going to be

10:53

extreme you choose whatever you want but

10:55

this is how I would do it so all of this

10:57

I would copy this first line in a Word

11:00

document the second line on the second

11:02

line of the word document this it would

11:04

be the third line that would be the

11:06

fourth line that's it keep it very very

11:08

simple and do this for each one so the

11:10

next thread might be there is no

11:13

password on the Wi-Fi right that's the

11:15

next threat the problem ability of the

11:18

threat occurring would be in my opinion

11:19

very likely size of loss probably I

11:23

don't know medium what whatever the

11:25

table said and the risk severity for

11:26

this may might be something like medium

11:28

or high again so I would simply have

11:31

this information as many times as I have

11:33

threats or weaknesses so if I have 10

11:35

weaknesses I'm going to have all of this

11:38

information here roughly 10 times

11:41

so show example word document all right

11:43

I'll be using the 2018 past paper this

11:47

is the only one on the website on the

11:49

Pearson's website that's not locked to

11:51

the public so that's why I've opted for

11:53

that one I'm also going to put links in

11:55

the description for you guys to be able

11:57

to download it from my personal Google

11:59

drive if you don't know how to find it

12:01

on the website if you'd prefer to just

12:04

Google it yourself that's fine you could

12:06

just Google search btec level 3 it and

12:09

it will come up with the Pearson's

12:11

website the b-tech website with all the

12:13

files everything that I'm using here is

12:15

completely free as I said this is the

12:17

only one that's not locked so this is

12:19

the risk assessment this Carries On from

12:22

the previous section you will need all

12:25

those risks and the severities which you

12:28

found in the previous section I will go

12:30

through this not to worry you fill in

12:32

the table for every threat you've

12:33

identified so again let's just say for

12:36

argument's sake we found five threats

12:38

I'm gonna have this table here copied

12:41

five times and where it says threat

12:43

number I would obviously put something

12:45

like let's say 0 1 a threat title in

12:48

here I would put something uh what was

12:50

the previous one again the previous one

12:52

was no encryption on the admin server

12:54

that would be for that one I'll put the

12:56

probability uh potential size of impact

12:59

with severity explanation of the threat

13:00

in context so why do I think the

13:03

probability is going to be so high why

13:04

do I think the potential size of loss is

13:06

going to be so high why do I think the

13:08

risk severity is what it is so give some

13:11

context give some explanation justify

13:13

why you're saying what you're saying in

13:16

the last box here and again if you have

13:18

10 or sorry I said 5 before if you have

13:21

five different threats or weaknesses you

13:24

have five of these boxes I'm gonna show

13:26

you even how to copy and paste them when

13:29

I get to my word document so bear with

13:30

me

13:31

and that's it for this one so the next

13:34

part of the well the next video is going

13:36

to be Activity one me in my word

13:38

document with the exam paper on the left

13:40

me making some notes me doing the risk

13:43

uh the risk assessment and we'll take it

13:45

from there thank you for watching

13:46

hopefully this was useful

13:49

[Music]

UNLOCK MORE

Sign up free to access premium features

INTERACTIVE VIEWER

Watch the video with synced subtitles, adjustable overlay, and full playback control.

SIGN UP FREE TO UNLOCK

AI SUMMARY

Get an instant AI-generated summary of the video content, key points, and takeaways.

SIGN UP FREE TO UNLOCK

TRANSLATE

Translate the transcript to 100+ languages with one click. Download in any format.

SIGN UP FREE TO UNLOCK

MIND MAP

Visualize the transcript as an interactive mind map. Understand structure at a glance.

SIGN UP FREE TO UNLOCK

CHAT WITH TRANSCRIPT

Ask questions about the video content. Get answers powered by AI directly from the transcript.

SIGN UP FREE TO UNLOCK

GET MORE FROM YOUR TRANSCRIPTS

Sign up for free and unlock interactive viewer, AI summaries, translations, mind maps, and more. No credit card required.