{"id":1121,"date":"2022-10-04T10:46:13","date_gmt":"2022-10-04T08:46:13","guid":{"rendered":"https:\/\/gltsafeandsound.nohup.it\/analisi-del-contesto-e-individuazione-dei-rischi\/"},"modified":"2022-11-02T12:49:15","modified_gmt":"2022-11-02T11:49:15","slug":"analisi-del-contesto-e-individuazione-dei-rischi","status":"publish","type":"post","link":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/","title":{"rendered":"Context analysis and risk identification"},"content":{"rendered":"<p>It is a constantly changing sector, both technical and regulatory, and where, in most cases, protective measures are only developed after a threat has already turned into damage. Therefore, the context analysis phase plays a crucial role.<\/p>\n<p>The context of an organization entails the particular combination of all internal and external factors that characterize the organization, in all its aspects, and that has an effect on the organization\u2019s operations.<\/p>\n<p>We can identify internal factors as all the elements proper to an organization that characterize it and distinguish it from others: the characteristics of the activities performed by the organization, the location and work, the information system used, and the types of information processed.<\/p>\n<p>External factors, on the other hand, are those elements that define the organization\u2019s context over which the organization does not have direct control: current or potential competitors, applicable regulations, market trends and the economic, political, and social situation, customers, and suppliers, etc.<\/p>\n<p>Both internal and external factors affect, each to a certain extent, the security of the information processed by the organization. It is therefore necessary to have a clear picture of the context in which the organization operates. This is because only after analyzing the context can the risks and sources of risk to information security be identified. The correct analysis of internal factors can highlight the weaknesses, criticalities and vulnerabilities of the information system adopted. In addition, the identification of the characteristics of the location and the work performed will lead to the adoption of protection measures rather than others.<\/p>\n","protected":false},"excerpt":{"rendered":"It is a constantly changing sector, both technical and regulatory,&nbsp;&#8230;","protected":false},"author":1,"featured_media":1962,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-1121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-best-practices"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Context analysis and risk identification - GLT Cyber Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Context analysis and risk identification - GLT Cyber Security\" \/>\n<meta property=\"og:description\" content=\"It is a constantly changing sector, both technical and regulatory,&nbsp;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/\" \/>\n<meta property=\"og:site_name\" content=\"GLT Cyber Security\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T08:46:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-02T11:49:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"387\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nohup\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nohup\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/\",\"url\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/\",\"name\":\"Context analysis and risk identification - GLT Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg\",\"datePublished\":\"2022-10-04T08:46:13+00:00\",\"dateModified\":\"2022-11-02T11:49:15+00:00\",\"author\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b\"},\"breadcrumb\":{\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage\",\"url\":\"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg\",\"contentUrl\":\"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg\",\"width\":400,\"height\":387},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gltsafeandsound.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Context analysis and risk identification\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#website\",\"url\":\"https:\/\/gltsafeandsound.com\/en\/\",\"name\":\"GLT Cyber Security\",\"description\":\"Cyber Security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gltsafeandsound.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b\",\"name\":\"Nohup\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g\",\"caption\":\"Nohup\"},\"sameAs\":[\"https:\/\/gltsafeandsound.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Context analysis and risk identification - GLT Cyber Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/","og_locale":"en_US","og_type":"article","og_title":"Context analysis and risk identification - GLT Cyber Security","og_description":"It is a constantly changing sector, both technical and regulatory,&nbsp;...","og_url":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/","og_site_name":"GLT Cyber Security","article_published_time":"2022-10-04T08:46:13+00:00","article_modified_time":"2022-11-02T11:49:15+00:00","og_image":[{"width":400,"height":387,"url":"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg","type":"image\/jpeg"}],"author":"Nohup","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nohup","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/","url":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/","name":"Context analysis and risk identification - GLT Cyber Security","isPartOf":{"@id":"https:\/\/gltsafeandsound.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage"},"image":{"@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage"},"thumbnailUrl":"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg","datePublished":"2022-10-04T08:46:13+00:00","dateModified":"2022-11-02T11:49:15+00:00","author":{"@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b"},"breadcrumb":{"@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#primaryimage","url":"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg","contentUrl":"https:\/\/gltsafeandsound.com\/wp-content\/uploads\/2022\/11\/analisi_contesto_ricerca_rischi.jpg","width":400,"height":387},{"@type":"BreadcrumbList","@id":"https:\/\/gltsafeandsound.com\/en\/analisi-del-contesto-e-individuazione-dei-rischi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gltsafeandsound.com\/en\/"},{"@type":"ListItem","position":2,"name":"Context analysis and risk identification"}]},{"@type":"WebSite","@id":"https:\/\/gltsafeandsound.com\/en\/#website","url":"https:\/\/gltsafeandsound.com\/en\/","name":"GLT Cyber Security","description":"Cyber Security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gltsafeandsound.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/0f5edf6afcfdff537774d2f69f7ce00b","name":"Nohup","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gltsafeandsound.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/92ac0c8fd062ec0dc73d9f1ce38ed0d4?s=96&d=mm&r=g","caption":"Nohup"},"sameAs":["https:\/\/gltsafeandsound.com"]}]}},"_links":{"self":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1121"}],"collection":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/comments?post=1121"}],"version-history":[{"count":1,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1121\/revisions"}],"predecessor-version":[{"id":1769,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/posts\/1121\/revisions\/1769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/media\/1962"}],"wp:attachment":[{"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/media?parent=1121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/categories?post=1121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gltsafeandsound.com\/en\/wp-json\/wp\/v2\/tags?post=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}