From the course: Complete Guide to Open Source Security

Unlock the full course today

Join today to access over 24,500 courses taught by industry experts.

Entering risks into eramba

Entering risks into eramba

- [Instructor] Let's assume our reviewer, Penelope, has carried out her risk assessment. So we can now select Actions, Add to add a new risk. And we'll call it, financial files may not be accessible. And in the description we'll say, financial files may be deleted or made otherwise inaccessible. And we'll put Penelope down as both the risk originator and the GRC contact. And we'll put a next review date of end of the year. On the Analysis tab, we'll select our Transpay System. And we'll just get rid of some of the threats we don't want and we'll keep Remote Exploit, Web Application Attack, Malware Distribution, and Viruses. And under the threat description, we'll add ransomware is activated against financial data. And in the vulnerabilities, we'll remove those and we'll select lack of patching and lack of network controls. In the vulnerabilities description we'll enter, the system is exposed to remote attack to achieve initial access through the network. And patching is out of date on…

Contents