{"id":63,"date":"2025-08-24T15:58:59","date_gmt":"2025-08-24T13:58:59","guid":{"rendered":"https:\/\/cybersecuritat.eu\/?p=63"},"modified":"2025-08-24T16:07:31","modified_gmt":"2025-08-24T14:07:31","slug":"lanalisi-de-riscs","status":"publish","type":"post","link":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/","title":{"rendered":"L&rsquo;Analisi de Riscs"},"content":{"rendered":"\n<p>Aqueth article que s&rsquo;interveng tau demiei de la partida <strong>Govern\u00e0ncia <\/strong>de la cyberseguretat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Metodologias d&rsquo;Analisi<\/h2>\n\n\n\n<p>L&rsquo;analisi de riscs que&rsquo;s p\u00f2t basar sus div\u00e8rsas metodologias arreconegudas, com <strong>EBIOS <\/strong>(o <strong>EBIOS RM <\/strong>de l&rsquo;ANSSI), l&rsquo;<strong>ISO 27005<\/strong>, enter autas.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Objectius e Via de H\u00e8r<\/h2>\n\n\n\n<p>L&rsquo;objectiu principau de l&rsquo;analisi de riscs qu&rsquo;ei de perm\u00e9ter a l&rsquo;equipa encargada de la ciberseguretat d&rsquo;interagir estreitament dab las <strong>equipas mesti\u00e8rs<\/strong> (o : los m\u00e8stiers). Aquera collaboracion qu&rsquo;ei essenciau t\u00e0 <strong>identificar la valor balhada<\/strong> (o: la valor d&rsquo;ap\u00f2rt) de l&rsquo;enterpresa (o de la collectivitat), autament dit, \u00e7\u00f2 qui ei critic t\u00e0 la soa foncionament.<\/p>\n\n\n\n<p>Un c\u00f2p aqueths elements de valor identificats, l&rsquo;equipa ciberseguretat, tostemps merc\u00e9s a escambis dab lo mesti\u00e8r, que va definir <strong>scenaris d&rsquo;atacas realistas<\/strong> e avaliar los sons <strong>impactes potenciaus<\/strong>.<\/p>\n\n\n\n<p>Au cap d&rsquo;aquera avaloracion, que cau determinar lo <strong>tractament apropriat<\/strong> t\u00e0 cada risc. Qu&rsquo;existeish quate opcions principaus : l&rsquo;acceptar, lo minvar, lo transferir o lo refusar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Los Diferents Tractaments deu Risc<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Acceptar lo Risc<\/h3>\n\n\n\n<p>Lo risc qu&rsquo;ei acceptat si lo son niv\u00e8u qu&rsquo;ei jutjat <strong>conf\u00f2rme <\/strong>a la politica e a la toler\u00e0ncia de l&rsquo;organizacion.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Refusar lo Risc<\/h3>\n\n\n\n<p>Si lo risc n&rsquo;ei pas en adequacion dab lo perim\u00e8tre de l&rsquo;organizacion, que p\u00f2t estar refusat. Per exemple, ua organizacion que p\u00f2t refusar un risc ligat a un servidor web si non ne possedeish pas nat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Minvar o Transferir lo Risc<\/h3>\n\n\n\n<p>Quan un risc qu&rsquo;ei aplicable e qui lo son niv\u00e8u qu&rsquo;ei <strong>inacceptable <\/strong>en l&rsquo;estat, l&rsquo;organizacion que causish enter lo minvar o lo transferir.<\/p>\n\n\n\n<p><strong>Transferir <\/strong>: Aqu\u00f2 que revien a har suportar lo risc (juridicament o contractuaument) a un <strong>t\u00e8r\u00e7<\/strong>. Per exemple, lo risc ligat a la seguretat d&rsquo;un l\u00f2c web que p\u00f2t estar transferit a un prestataure ext\u00e8rne au quau qu&rsquo;ei delegada la creacion e la mantienuda deu l\u00f2c en condicion de seguretat.<br><br><strong>Minvar <\/strong>: L&rsquo;organizacion que c\u00e8rca a minvar un risc quan lo son niv\u00e8u n&rsquo;ei pas acceptable en l&rsquo;estat e qui non se p\u00f2t (o non v\u00f2u) lo transferir. En aqueth cas, que va m\u00e9ter en \u00f2bra accions (sia de <strong>govern\u00e0ncia <\/strong>sia <strong>tecnicas<\/strong>) t\u00e0 har baishar lo son <strong>impacte <\/strong>o la soa <strong>gravetat<\/strong>, e atau minvar lo son niv\u00e8u dinc a un lindau tolerable.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aqueth article que s&rsquo;interveng tau demiei de la partida Govern\u00e0ncia de la cyberseguretat. Metodologias d&rsquo;Analisi L&rsquo;analisi de riscs que&rsquo;s p\u00f2t basar sus div\u00e8rsas metodologias arreconegudas, com EBIOS (o EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, enter autas. Objectius e Via de H\u00e8r L&rsquo;objectiu principau de l&rsquo;analisi de riscs qu&rsquo;ei de perm\u00e9ter a l&rsquo;equipa encargada de la [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[63],"tags":[76,84],"class_list":["post-63","post","type-post","status-publish","format-standard","hentry","category-governanca","tag-analisi-de-riscs","tag-ebios-rm-oc"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>L&#039;Analisi de Riscs - Cybersecuritat<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L&#039;Analisi de Riscs - Cybersecuritat\" \/>\n<meta property=\"og:description\" content=\"Aqueth article que s&rsquo;interveng tau demiei de la partida Govern\u00e0ncia de la cyberseguretat. Metodologias d&rsquo;Analisi L&rsquo;analisi de riscs que&rsquo;s p\u00f2t basar sus div\u00e8rsas metodologias arreconegudas, com EBIOS (o EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, enter autas. Objectius e Via de H\u00e8r L&rsquo;objectiu principau de l&rsquo;analisi de riscs qu&rsquo;ei de perm\u00e9ter a l&rsquo;equipa encargada de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecuritat\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-24T13:58:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-24T14:07:31+00:00\" \/>\n<meta name=\"author\" content=\"stan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\"},\"author\":{\"name\":\"stan\",\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"headline\":\"L&rsquo;Analisi de Riscs\",\"datePublished\":\"2025-08-24T13:58:59+00:00\",\"dateModified\":\"2025-08-24T14:07:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\"},\"wordCount\":418,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"keywords\":[\"Analisi de riscs\",\"EBIOS RM\"],\"articleSection\":[\"governan\u00e7a\"],\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\",\"url\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\",\"name\":\"L'Analisi de Riscs - Cybersecuritat\",\"isPartOf\":{\"@id\":\"https:\/\/cybersecuritat.eu\/#website\"},\"datePublished\":\"2025-08-24T13:58:59+00:00\",\"dateModified\":\"2025-08-24T14:07:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#breadcrumb\"},\"inLanguage\":\"oc\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/cybersecuritat.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L&rsquo;Analisi de Riscs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersecuritat.eu\/#website\",\"url\":\"https:\/\/cybersecuritat.eu\/\",\"name\":\"Cybersecuritat\",\"description\":\"Lo prum\u00e8r site de cybersecuritat en occitan\",\"publisher\":{\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersecuritat.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"oc\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf\",\"name\":\"stan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"oc\",\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"contentUrl\":\"https:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png\",\"width\":512,\"height\":323,\"caption\":\"stan\"},\"logo\":{\"@id\":\"https:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/\"},\"sameAs\":[\"http:\/\/cybersecuritat.eu\"],\"url\":\"https:\/\/cybersecuritat.eu\/index.php\/author\/stan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L'Analisi de Riscs - Cybersecuritat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/","og_locale":"en_US","og_type":"article","og_title":"L'Analisi de Riscs - Cybersecuritat","og_description":"Aqueth article que s&rsquo;interveng tau demiei de la partida Govern\u00e0ncia de la cyberseguretat. Metodologias d&rsquo;Analisi L&rsquo;analisi de riscs que&rsquo;s p\u00f2t basar sus div\u00e8rsas metodologias arreconegudas, com EBIOS (o EBIOS RM de l&rsquo;ANSSI), l&rsquo;ISO 27005, enter autas. Objectius e Via de H\u00e8r L&rsquo;objectiu principau de l&rsquo;analisi de riscs qu&rsquo;ei de perm\u00e9ter a l&rsquo;equipa encargada de la [&hellip;]","og_url":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/","og_site_name":"Cybersecuritat","article_published_time":"2025-08-24T13:58:59+00:00","article_modified_time":"2025-08-24T14:07:31+00:00","author":"stan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"stan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#article","isPartOf":{"@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/"},"author":{"name":"stan","@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"headline":"L&rsquo;Analisi de Riscs","datePublished":"2025-08-24T13:58:59+00:00","dateModified":"2025-08-24T14:07:31+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/"},"wordCount":418,"commentCount":0,"publisher":{"@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"keywords":["Analisi de riscs","EBIOS RM"],"articleSection":["governan\u00e7a"],"inLanguage":"oc","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/","url":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/","name":"L'Analisi de Riscs - Cybersecuritat","isPartOf":{"@id":"https:\/\/cybersecuritat.eu\/#website"},"datePublished":"2025-08-24T13:58:59+00:00","dateModified":"2025-08-24T14:07:31+00:00","breadcrumb":{"@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#breadcrumb"},"inLanguage":"oc","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cybersecuritat.eu\/index.php\/2025\/08\/24\/lanalisi-de-riscs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/cybersecuritat.eu\/"},{"@type":"ListItem","position":2,"name":"L&rsquo;Analisi de Riscs"}]},{"@type":"WebSite","@id":"https:\/\/cybersecuritat.eu\/#website","url":"https:\/\/cybersecuritat.eu\/","name":"Cybersecuritat","description":"Lo prum\u00e8r site de cybersecuritat en occitan","publisher":{"@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersecuritat.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"oc"},{"@type":["Person","Organization"],"@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/dd09a9551d25d269ef58a95bacd11ccf","name":"stan","image":{"@type":"ImageObject","inLanguage":"oc","@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/","url":"https:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","contentUrl":"https:\/\/cybersecuritat.eu\/wp-content\/uploads\/2023\/07\/cropped-cropped-cybersecuritat-1.png","width":512,"height":323,"caption":"stan"},"logo":{"@id":"https:\/\/cybersecuritat.eu\/#\/schema\/person\/image\/"},"sameAs":["http:\/\/cybersecuritat.eu"],"url":"https:\/\/cybersecuritat.eu\/index.php\/author\/stan\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/comments?post=63"}],"version-history":[{"count":3,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/63\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/posts\/63\/revisions\/70"}],"wp:attachment":[{"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/media?parent=63"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/categories?post=63"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritat.eu\/index.php\/wp-json\/wp\/v2\/tags?post=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}