Skip to content
Casturity.com
  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES
Casturity.com
cyber security training
Documentation

What is Risk? – Risk Management Terminology

Risk is the probability or likelihood that a threat will exploit a vulnerability to cause harm to an asset.

When written out in a formula, risk can be defined as shown below:

Risk = threat * vulnerability

Post navigation

Previous Previous
What is Exposure? – Risk Management Terminology
NextContinue
What are Safeguards? – Risk Management Terminology

Similar Posts

HTTP Status Code 208 – Already Reported
Documentation

HTTP Status Code 208 – Already Reported

Read More HTTP Status Code 208 – Already ReportedContinue

Cybersecurity Threats and Vulnerabilities: List Edition
Documentation

Cybersecurity Threats and Vulnerabilities: List Edition

Read More Cybersecurity Threats and Vulnerabilities: List EditionContinue

HTTP Status Code 504 – Gateway Timeout
Documentation

HTTP Status Code 504 – Gateway Timeout

Read More HTTP Status Code 504 – Gateway TimeoutContinue

What Is A Cross-layer function?
Documentation

What Is A Cross-layer function?

Read More What Is A Cross-layer function?Continue

What is Security Governance?
Documentation

What is Security Governance?

Read More What is Security Governance?Continue

HTTP Status Code 304 – Not Modified
Documentation

HTTP Status Code 304 – Not Modified

Read More HTTP Status Code 304 – Not ModifiedContinue

Casturity.com

Network & Infrastructure Security

Documentation

  • What is an IAVM? | DoD RMF
  • What Is A Cross-layer function?
  • Cross-layer functions
    Cross-layer functions | OSI Model
  • Seven Layers of OSI Model Explained
    7 Layers of OSI Model Explained

Guides

  • HTML Injection. Tryhackme. Free cyber security training.
    HTML Injection Explained
  • How to perform a Penetration Test.
    Comprehensive Guide to Penetration Tests | Tools, Process & Methods
  • Universal XSS via Evernote WebClipper
    Universal XSS via Evernote WebClipper
  • Semmle QL
    Vulnerability hunting with Semmle QL: DOM XSS

Tutorials

  • How to use exiftool. Learn cyber security.
    How to use ExifTool? Metadata Tool
  • How to use inurlbr dork automation tool. Learn cyber security.
    How to use Inurlbr? Dork Automation Tool
  • How to use search engine dorks with Google.
    How to use Search Engine Dorks?
  • How to use Photon for OSINT. Learn cyber security.
    How to use Photon.py? | RECON

© 2020-2022 Casturity.com

  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES