<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WENTZ’S RISK MODEL in Exam Preparation</title>
    <link>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/29371#M2559</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Wentz’s Risk Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;incorporates the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Peacock Model&lt;/STRONG&gt;, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Onion Model&lt;/STRONG&gt;, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Ring Model,&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Concept of Neutral Risk&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Concept of Neutral Risk&lt;/STRONG&gt;, based on the risk definition of ISO 31000&lt;STRONG&gt;,&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;introduces the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business mindset&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of seizing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;opportunities&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and avoiding&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;threats&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to highlight that information security is not only a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business enabler&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;but also a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business driver&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Peacock Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a notion of information systems that extends the definition defined by 44 U.S.C, Sec 3502. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Onion Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;denotes the concept of layered defense or defense in depth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Ring Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is derived from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;NIST Generic Risk Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to specify risk in the context of information security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/10/30/wentzs-risk-model/" target="_blank"&gt;https://wentzwu.com/2019/10/30/wentzs-risk-model/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WENTZ’S RISK MODEL" style="width: 649px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3620i884540936C643908/image-size/large?v=v2&amp;amp;px=999" role="button" title="Wentz’s Risk Model.png" alt="WENTZ’S RISK MODEL" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;WENTZ’S RISK MODEL&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Oct 2019 08:39:42 GMT</pubDate>
    <dc:creator>wentzwu</dc:creator>
    <dc:date>2019-10-30T08:39:42Z</dc:date>
    <item>
      <title>RISK Concept in CISSP</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28953#M2556</link>
      <description>&lt;P&gt;It's common for friends to tell me how they feel frustrated when they are studying the concept of risk on the CISSP journey. The following is my two cents and I hope it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Risk is the effect of uncertainty on objectives.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Source: ISO 31000&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Risk = Uncertainty + Objectives + Effect&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Threat = Uncertainty + Objectives + Negative Effect = Negative Risk&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;Uncertainty = Threat Source + Threat Event + Vulnerability&lt;/LI&gt;&lt;LI&gt;Objectives = CIA&lt;/LI&gt;&lt;LI&gt;Negative Effect = Impacts&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Threat = (Threat Source + Threat Event + Vulnerability) + CIA + Impacts&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Risk Exposure = Uncertainty * Effect&lt;/LI&gt;&lt;LI&gt;Threat Exposure =&amp;nbsp;Uncertainty * Impacts&lt;/LI&gt;&lt;LI&gt;Exposure is short for Risk Exposure or Threat Exposure&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/10/15/wentzs-information-risk-model-v1-1/" target="_blank" rel="noopener"&gt;https://wentzwu.com/2019/10/15/wentzs-information-risk-model-v1-1/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Wentz’s Information Risk Model" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3581iFA3B871CF291C36D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Wentz’s Information Risk Model.jpg" alt="Wentz’s Information Risk Model" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Wentz’s Information Risk Model&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="InformationSecurityDefinition.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3570iB5B1BE9CA778F72A/image-size/large?v=v2&amp;amp;px=999" role="button" title="InformationSecurityDefinition.jpg" alt="InformationSecurityDefinition.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="The Peacock.jpg" style="width: 999px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3569i91D308DC1D845E24/image-size/large?v=v2&amp;amp;px=999" role="button" title="The Peacock.jpg" alt="The Peacock.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:20:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28953#M2556</guid>
      <dc:creator>wentzwu</dc:creator>
      <dc:date>2023-10-09T09:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: RISK Concept in CISSP</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28979#M2557</link>
      <description>&lt;P&gt;Hmmmm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I like these better:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="Risk-threat-vulnerability-and-asset-relationship-II" style="width: 850px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3575iC3F3BF874718D196/image-size/large?v=v2&amp;amp;px=999" role="button" title="Risk-threat-vulnerability-and-asset-relationship-II" alt="Risk-threat-vulnerability-and-asset-relationship-II" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="risk-analysis" style="width: 719px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3576i895CD2F05B0432E6/image-size/large?v=v2&amp;amp;px=999" role="button" title="risk-analysis" alt="risk-analysis" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They lay out the relationships between the various terms.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the best one is from the introduction to the Common Criteria:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="image002" style="width: 387px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3577i24FCF55A84C993D2/image-size/large?v=v2&amp;amp;px=999" role="button" title="image002" alt="image002" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 16:51:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28979#M2557</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-10-14T16:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: RISK Concept in CISSP</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28983#M2558</link>
      <description>&lt;P&gt;Thanks for sharing.&lt;/P&gt;&lt;P&gt;Would you pls advise the source for further study?&lt;/P&gt;&lt;P&gt;TKS!!&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 17:57:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/28983#M2558</guid>
      <dc:creator>wentzwu</dc:creator>
      <dc:date>2019-10-14T17:57:30Z</dc:date>
    </item>
    <item>
      <title>WENTZ’S RISK MODEL</title>
      <link>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/29371#M2559</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Wentz’s Risk Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;incorporates the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Peacock Model&lt;/STRONG&gt;, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Onion Model&lt;/STRONG&gt;, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Ring Model,&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Concept of Neutral Risk&lt;/STRONG&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Concept of Neutral Risk&lt;/STRONG&gt;, based on the risk definition of ISO 31000&lt;STRONG&gt;,&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;introduces the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business mindset&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;of seizing&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;opportunities&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and avoiding&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;threats&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to highlight that information security is not only a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business enabler&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;but also a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;business driver&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Peacock Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is a notion of information systems that extends the definition defined by 44 U.S.C, Sec 3502. The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Onion Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;denotes the concept of layered defense or defense in depth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Ring Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is derived from the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;NIST Generic Risk Model&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to specify risk in the context of information security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://wentzwu.com/2019/10/30/wentzs-risk-model/" target="_blank"&gt;https://wentzwu.com/2019/10/30/wentzs-risk-model/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WENTZ’S RISK MODEL" style="width: 649px;"&gt;&lt;img src="https://community.isc2.org/t5/image/serverpage/image-id/3620i884540936C643908/image-size/large?v=v2&amp;amp;px=999" role="button" title="Wentz’s Risk Model.png" alt="WENTZ’S RISK MODEL" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;WENTZ’S RISK MODEL&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 08:39:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Exam-Preparation/RISK-Concept-in-CISSP/m-p/29371#M2559</guid>
      <dc:creator>wentzwu</dc:creator>
      <dc:date>2019-10-30T08:39:42Z</dc:date>
    </item>
  </channel>
</rss>

