CH 04
CH 04
Learning Objectives
Upon completion of this material, you should be able to:
Define risk management, risk identification, and risk control Describe how risk is identified and assessed Assess risk based on probability of occurrence and likely impact Explain the fundamental aspects of documenting risk via the process of risk assessment
Introduction
Organizations must design and create safe environments in which business processes and procedures can function Risk management: process of identifying and controlling risks facing an organization Risk identification: process of examining an organizations current information technology security situation Risk control: applying controls to reduce risks to an organizations data and information systems
Principles of Information Security, Fourth Edition 4
Risk Identification
Risk management involves identifying, classifying, and prioritizing an organizations assets A threat assessment process identifies and quantifies the risks facing each asset Components of risk identification
People Procedures Data Software Hardware
8
11
Asset attributes to be considered are: name; IP address; MAC address; element type; serial number; manufacturer name; model/part number; software version; physical or logical location; controlling entity Automated tools can identify system elements for hardware, software, and network components
Principles of Information Security, Fourth Edition 14
Management of Classified Data Storage, distribution, portability, and destruction of classified data Clean desk policy Dumpster diving
Principles of Information Security, Fourth Edition 16
17
18
20
Table 4-2 Example of a Weighted Factor Analysis Worksheet Notes: EDI: Electronic Data Interchange SSL: Secure Sockets Layer
Principles of Information Security, Fourth Edition 21
22
Vulnerability Identification
Specific avenues threat agents can exploit to attack an information asset are called vulnerabilities Examine how each threat could be perpetrated and list organizations assets and vulnerabilities Process works best when people with diverse backgrounds within organization work iteratively in a series of brainstorming sessions At end of risk identification process, list of assets and their vulnerabilities is achieved
24
Risk Assessment
Risk assessment evaluates the relative risk for each vulnerability Assigns a risk rating or score to each information asset The goal at this point: create a method for evaluating the relative risk of each listed vulnerability
25
Likelihood
The probability that a specific vulnerability will be the object of a successful attack Assign numeric value: number between 0.1 (low) and 1.0 (high), or a number between 1 and 100 Zero not used since vulnerabilities with zero likelihood are removed from asset/vulnerability list Use selected rating model consistently Use external references for values that have been reviewed/adjusted for your circumstances
Principles of Information Security, Fourth Edition 26
Risk Determination
For the purpose of relative risk assessment:
Risk EQUALS Likelihood of vulnerability occurrence TIMES value (or impact) MINUS percentage risk already controlled PLUS an element of uncertainty
27
28
29
Deliverable
Purpose
Information asset classification worksheet Assembles information about information assets and their impact
Assigns ranked value of risk rating for each uncontrolled asset-vulnerability pair
32
Defend
Attempts to prevent exploitation of the vulnerability Preferred approach Accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards Three common methods of risk avoidance:
Application of policy Training and education Applying technology
33
Transfer
Control approach that attempts to shift risk to other assets, processes, or organizations If lacking, organization should hire individuals/firms that provide security management and administration expertise Organization may then transfer risk associated with management of complex systems to another organization experienced in dealing with those risks
34
Mitigate
Attempts to reduce impact of vulnerability exploitation through planning and preparation Approach includes three types of plans
Incident response plan (IRP): define the actions to take while incident is in progress Disaster recovery plan (DRP): most common mitigation procedure Business continuity plan (BCP): encompasses continuation of business activities if catastrophic event occurs
Principles of Information Security, Fourth Edition 35
Accept
Doing nothing to protect a vulnerability and accepting the outcome of its exploitation Valid only when the particular function, service, information, or asset does not justify cost of protection
36
Terminate
Directs the organization to avoid those business activities that introduce uncontrollable risks May seek an alternate mechanism to meet customer needs
37
38
Feasibility Studies
Before deciding on strategy, all information about economic/noneconomic consequences of vulnerability of information asset must be explored A number of ways exist to determine advantage of a specific control
40
42
ALE(prior) is annualized loss expectancy of risk before implementation of control ALE(post) is estimated ALE based on control being in place for a period of time ACS is the annualized cost of the safeguard
Principles of Information Security, Fourth Edition 43
44
45
46
47
49
50
51
53
Documenting Results
At minimum, each information asset-threat pair should have documented control strategy clearly identifying any remaining residual risk Another option: document outcome of control strategy for each information asset-vulnerability pair as an action plan Risk assessment may be documented in a topicspecific report
55
56
Summary
Risk identification: formal process of examining and documenting risk in information systems Risk control: process of taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of components of an information system Risk identification
A risk management strategy enables identification, classification, and prioritization of organizations information assets Residual risk: risk remaining to the information asset even after the existing control is applied
Principles of Information Security, Fourth Edition 57
Summary (continued)
Risk control: five strategies are used to control risks that result from vulnerabilities:
Defend Transfer Mitigate Accept Terminate
58
Summary (continued)
Selecting a risk control strategy
Cost Benefit Analysis Feasibility Study
Risk Appetite: organizational risk tolerance Residual risk: risk remaining after application of risk controls
Principles of Information Security, Fourth Edition 59