HOPEX IT Risk Management : HOPEX IT Risk Management : HOPEX IT Risk Management Reports : IT Risk Reports : Risk Identification Reports
   
Risk Identification Reports
Criticality of applications
Access path
Reports > IT Risk > Identification > Application Criticality
Parameters
Business process: list of business processes
*A business process represents a system that offers products or services to an internal or external client of the company or organization. At the higher levels, a business process represents a structure and a categorization of the business. It can be broken down into other processes. The link with organizational processes will describe the real implementation of the business process in the organization. A business process can also be detailed by a functional view.
Type of application (optional)
Result
This report presents, in bubble form, the applications connected to business processes, with the following information:
 
X-axis
The number of applications interfaced via application flows with the application in question
Y-axis
The number of business capabilities connected to the application
Size of the bubble
Number of software installations for the application
Color of the bubble
Depends on the global cost of the application
*A business capability is a component of information system processing. Processing can for example correspond to an activity or an enterprise business.
*The global cost of the application is available in HOPEX IT Portfolio Management.
Example
Table of Threats and Vulnerabilities
Access path
Reports > IT Risk > Identification > Threat and Vulnerability Table
Parameters
Start and end dates
*The start and end dates define the value range to take into account for the assessments. If the same object is assessed more than once during this period, the most recent assessment is taken into account.
Threats using vulnerabilities
*Threats are external or internal factors that endanger the IT assets of the enterprise.
*Vulnerabilities are failures to control an IT asset that makes it vulnerable to a threat and can lead to a breach of confidentiality, lack of integrity or availability of this asset.
Result
The report presents the risks via the Threat > Vulnerability > Application tree.
It displays the most recent risk assessment for the application context.
Example