Information Security Risk Assessment Basics
Information Security Risk Assessment Basics
Terminology
Information assets - information or data that is of value to the organization characteristics : They are recognized to be of value to the organization. They are not easily replaceable without cost, skill, time, resources or a combination. They form a part of the organization's corporate identity, without which, the organization may be threatened. Their Data Classification would normally be Proprietary, Highly Confidential or even Top Secret.
Terminology
An Information Security incident is an event which appears to be a breach of the organization's Information Security safeguards. vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements:
a system susceptibility or flaw, attacker access to the flaw, attacker capability to exploit the flaw.
Terminology
Threat: The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. Threat-Source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability Threat-Source Identification Natural Threats Human Threats Environmental Threats
Terminology
Risk is a function of the likelihood of a given threat-source s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization To determine the likelihood of a future adverse event, threats to an IT system must be analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT system. Impact refers to the magnitude of harm that could be caused by a threat s exercise of a vulnerability.
Threats
Imposition of legal and regulatory obligations Organized crime or terrorist groups Cyber-criminals, Malware authors Phishers, Spammers Negligent staff Storms, tornodos, floods(acts of nature) Fraudsters, Hackers, Saboteurs Accidental disclosure, intentional alteration of data Unethical competitors Disgruntled/untrained/ignorant employees Unauthorized access to or modification or disclosure of information assets Technical advances
vulnerabilities
Software bugs and design flaws Complexity in IT Inadequate investment in appropriate information security controls Insufficient attention to human factors in system design and implementation Unwarranted confidence Ignorance, carelessness, negligence Poor or missing governance Frequent change in the business Inadequate contingency planning Legacy systems Bugs in microprocessor designs and microcode Lack of will, concern and ability to impress the need for info sec
Secondary benefits
Transfer of knowledge from security assessment team to the organization s staff Increased communications regarding security among business units Increased security awareness within the organization Results of security risk assessment may be used as a measure of security posture& compared to previous and future results
Related Activities
Gap Assessment Compliance Audit Security Audit Vulnerability scanning Penetration testing Ad hoc testing Social Engineering Wardialing
caselets
Project preparation
Obtain permission Review business mission Identify critical systems Map assets Identify threats Determine expected controls
Technical
Physical
Threats