Difference between revisions of "Risk Identification"
Jump to navigation
Jump to search
(→National Definitions) |
(→Australia) |
||
Line 10: | Line 10: | ||
{{definition| Risk identification is the process of determining what can happen, why and how. <ref name="MAIMAus">[https://www.em.gov.au/Documents/Manual03-AEMGlossary.PDF Australian Emergency Management Glossary, Emergency Management Australia (1998)]</ref>}} | {{definition| Risk identification is the process of determining what can happen, why and how. <ref name="MAIMAus">[https://www.em.gov.au/Documents/Manual03-AEMGlossary.PDF Australian Emergency Management Glossary, Emergency Management Australia (1998)]</ref>}} | ||
<br /> | <br /> | ||
+ | |||
+ | {{definition|Process of finding, recognizing and describing risks. <ref> [http://www.risknz.org.nz/files/3114/0868%2F4596%2F5050-2010.pdf Australia AS NZS 5050 (2010)]</ref>}}<br /> | ||
====Czech Republic==== | ====Czech Republic==== |
Revision as of 12:06, 29 May 2015
Contents
Definitions
European Definitions
Other International Definitions
National Definitions
Australia
Risk identification is the process of determining what can happen, why and how. [1]
Process of finding, recognizing and describing risks. [2]
Czech Republic
Process of looking for, recognizing, and describing risks (Proces hledání, rozpoznávání a popisování rizik)[3]
Standard Definition
ISO/IEC 27000:2014 and ISO 31000:2009
The standard defines risk assessment as
the "process of finding, recognizing and describing risks" [4] [5]. (based on the ISO Guide 73:2009[6]).
- Risk identification involves the identification of risk sources, events, their causes and their potential consequences.
- Risk identification can involve historical data, theoretical analysis, informed and expert opinions, and stakeholders’ needs.
See also
Notes
- ↑ Australian Emergency Management Glossary, Emergency Management Australia (1998)
- ↑ Australia AS NZS 5050 (2010)
- ↑ Cyber Security Explanatory Glossary (2013)
- ↑ ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary
- ↑ ISO/IEC 31000:2009, Risk management -- Principles and guidelines
- ↑ ISO Guide 73:2009 Risk management -- Vocabulary