UNIT - II (IS)
UNIT - II (IS)
RISK MANAGEMENT
• It is the process of identifying, analysis and
controlling risks facing an organization.
• Risk management is the discipline of
identifying, monitoring and limiting risks.
The following are the major hurdles faced by the
organizations to protect their information resources:
14
Components of Risk Identification
18
Hardware, Software, and Network Asset
Identification
Name
IP address
MAC address
Element type
Serial Number
Manufacturer Name
Physical Location
Logical Location
19
2. Information Asset Classification
Information owners responsible for
classifying their information assets
Information classifications must be
reviewed periodically
Most organizations do not need detailed level
of classification used by military or federal
agencies;
• Instead organizations may use other data
classification schemes
• Confidential
• Internal
• Public data
• Categories must be comprehensive and
mutually exclusive
3. Information Asset Valuation
Questions help develop criteria for asset
valuation
25
26
5. Security Clearances
The other side of the data classification
scheme is the personnel security clearance
structure.
Each user of data must be assigned a single
authorization level that indicates the level of
classification he or she is authorized to view.
Need - to know requirements policy.
6. Management of Classified Data
Management of classified data includes its storage,
distribution, portability, and destruction.
A clean desk policy requires that employees secure
all information in appropriate storage containers at
the end of each day.
Dumpster diving-> to retrieve information that
could embarrass a company or compromise
information security.
Threat Identification (Identifying and
Prioritizing threats)
Realistic threats need investigation; unimportant
threats are set aside
Threat assessment:
Which threats present danger to assets?
Which threats represent the most danger to
information?
How much would it cost to recover from attack?
Which threat requires greatest expenditure to
prevent?
29
Table 4-3 Threats to Information Security5
30
Vulnerability Identification
Specific avenues threat agents can exploit to
attack an information asset are called
vulnerabilities
Examine how each threat could be
perpetrated and list organization’s assets
and vulnerabilities
At end of risk identification process, list of
assets and their vulnerabilities is achieved
31
Vulnerability Identification
The TVA Worksheet At the end of the risk
identification process, you should have a prioritized list
of assets and their vulnerabilities. threats-
vulnerabilities-assets(TVA)
one or more vulnerabilities exist between the two, and
as these vulnerabilities are identified, they are
categorized as follows:
T1V1A1—Vulnerability 1 that exists between Threat 1
and Asset 1
T1V2A1—Vulnerability 2 that exists between Threat 1
and Asset 1
T2V1A1—Vulnerability 1 that exists between Threat 2
and Asset 1 … and so on.
Technical Hardware failures or Power system failures are always
errors possible
35
Risk Determination
For the purpose of relative risk
assessment, risk equals:
Formula for calculating risk:
36
Value of Information Assets:
• Assigning weighted values to the
information assets is called
information values
• The scale could range from 1 to 100
• Some organizations use 1, 3 and 5 to
represent low, medium and high
valued assets
Likelihood
The probability that a specific vulnerability will be
the object of a successful attack
Assign numeric value: number between 0.1 (low)
and 1.0 (high), or a number between 1 and 100
Zero not used since vulnerabilities with zero
likelihood removed from asset/vulnerability list
Use selected rating model consistently
Use external references for values that have been
reviewed/adjusted for your circumstances
38
Identify Possible Controls
For each threat and associated vulnerabilities that
have residual risk, create preliminary list of
control ideas
39
Access control
Access control is the method by which systems
determine whether and how to admit a user into a
trusted area of the organization—that is,
information systems, restricted areas such as
computer rooms, and the entire physical location.
There are number of approaches to control the
access.
Access control can be: (Types)
Discretionary
Mandatory
Non-discretionary
Mandatory access controls (MACs) u
use data classification schemes; they
give users and data owners limited
control over access to information
resources.
With this type of control, the column of attributes
associated with a particular object (such as a printer) is
referred to as an access control list (ACL).
Nondiscretionary controls are a strictly-enforced
version of MACs that are managed by a central
authority in the organization and can be based on an
individual’s role— role-based controls —or a
specified set of tasks (subject- or object-based) —
task-based controls.
Discretionary access controls (DACs) are
implemented at the discretion or option of the data
user.
Documenting the Results of Risk
Assessment
Ranked vulnerability risk worksheet
Worksheet details are:
Asset, asset impact, vulnerability, vulnerability
likelihood, and risk-rating factor
Ranked vulnerability risk worksheet is initial
working document for next step in risk management
process: assessing and controlling risk
Table 4-9 Ranked Vulnerability Risk Worksheet
46
Deliverable Purpose
Information asset classification Assembles information about
worksheet information assets and their
impact
Weighted criteria analysis Assigns ranked value or impact
worksheet weight to each information asset
Ranked vulnerability risk Assigns ranked value of risk
worksheet rating for each uncontrolled
asset-vulnerability pair
50
Cost Benefit Analysis (CBA)
51
Cost Benefit Analysis (CBA)
Steps in Cost-Benefit Analysis
52
Cost Benefit Analysis (CBA)
1. Assign a Monetary Value
o Convert all benefits and costs into a common currency
for comparison.
2. Calculate Net Benefit
o Use the formula:
Net Benefit=Total Benefits−Total Costs
4. Compare Results
o If Net Benefit > 0, the project is financially viable.
o If Net Benefit < 0, the project is not profitable.
53
Cost Benefit Analysis (CBA)
54
Cost Benefit Analysis (CBA)
Most common approach for deciding on information
security controls is economic feasibility of implementation
55
Cost Benefit Analysis (CBA) (continued)
Once value of assets is estimated, potential loss from
exploitation of vulnerability is studied
Process result is estimate of potential loss per risk
Expected loss per risk stated in the following equation:
Annualized loss expectancy (ALE) equals
Single loss expectancy (SLE) TIMES
Annualized rate of occurrence (ARO)
SLE is equal to asset value times exposure factor (EF)
56
The Cost Benefit Analysis (CBA) Formula
CBA determines if alternative being evaluated is worth
cost incurred to control vulnerability
CBA is most easily calculated using ALE from earlier
assessments, before implementation of proposed control:
CBA = ALE(prior) – ALE(post) – ACS
ALE(prior) is annualized loss expectancy of risk before
implementation of control
ALE(post) is estimated ALE based on control being in
place for a period of time
ACS is the annualized cost of the safeguard
57
The Cost Benefit Analysis (CBA) Formula
Scenario:
A company wants to determine whether implementing a
new firewall is cost-effective in reducing the risk of
cyberattacks.
Given Data:
• Annualized Loss Expectancy before control (ALE
prior) = $50,000
• Annualized Loss Expectancy after control (ALE post)
= $10,000
• Annualized Cost of Safeguard (ACS) = $15,000
58
The Cost Benefit Analysis (CBA) Formula
CBA Calculation:
CBA=ALE(prior)−ALE(post)−ACSCBA = ALE(prior) -
ALE(post) - ACSCBA=ALE(prior)−ALE(post)−ACS
CBA=50,000−10,000−15,000CBA = 50,000 - 10,000 -
15,000CBA=50,000−10,000−15,000 CBA=25,000CBA =
25,000CBA=25,000
Since the CBA is positive ($25,000), the cost savings
from reducing risk outweigh the cost of implementing the
firewall. This indicates that implementing the firewall is a
financially beneficial decision.
59
The Cost Benefit Analysis (CBA) Formula
Scenario:
A retail company is considering implementing an
advanced biometric access control system to prevent
unauthorized access to its payment processing servers.
Given Data:
• Annualized Loss Expectancy before control (ALE
prior) = $30,000
• Annualized Loss Expectancy after control (ALE post)
= $5,000
• Annualized Cost of Safeguard (ACS) = $30,000
60
The Cost Benefit Analysis (CBA) Formula
CBA Calculation:
CBA=ALE(prior)−ALE(post)−ACSCBA = ALE(prior) -
ALE(post) - ACSCBA=ALE(prior)−ALE(post)−ACS
CBA=30,000−5,000−30,000CBA = 30,000 - 5,000 -
30,000CBA=30,000−5,000−30,000 CBA=−5,000CBA = -
5,000CBA=−5,000Interpretation:
Since the CBA is negative (-$5,000), the cost of
implementing the biometric access system is higher than
the savings from risk reduction. This suggests that the
investment may not be financially justifiable, and the
company should consider alternative, more cost-effective
security measures.
61
Evaluation, Assessment, and Maintenance
of Risk Controls
Selection and implementation of control strategy is
not end of process
Strategy and accompanying controls must be
monitored/reevaluated on on-going basis to
determine effectiveness and to calculate more
accurately the estimated residual risk
Process continues as long as organization continues
to function
Figure 4-9 Risk Control Cycle
63
Quantitative versus Qualitative Risk Control
Practices
Performing the previous steps using actual values or
estimates is known as quantitative assessment
Possible to complete steps using evaluation process
based on characteristics using non-numerical
measures; called qualitative assessment
Utilizing scales rather than specific estimates
relieves organization from difficulty of determining
exact values
Benchmarking and Best Practices
An alternative approach to risk management
Process-based measures
65
Benchmarking and Best Practices
(continued)
Standard of due care: when adopting levels of
security for a legal defense, organization shows it
has done what any prudent organization would do in
similar circumstances
Due diligence: demonstration that organization is
diligent in ensuring that implemented standards
continue to provide required level of protection
Failure to support standard of due care or due
diligence can leave organization open to legal
liability
66
Benchmarking and Best Practices
(continued)
Best business practices: security efforts that provide
a superior level of information protection
67
Problems with the Application of
Benchmarking and Best Practices
Organizations don’t talk to each other (biggest
problem)
68
Baselining
Analysis of measures against established standards.In
information security, baselining is comparison of security
activities and events against an organization’s future
performance.Useful during baselining to have a guide to the
overall process
97
Rules of thumb
When vulnerability (flaw or weakness) exists:
Implement security controls to reduce the likelihood
of a vulnerability being exercised.
When vulnerability can be exploited: Apply layered
protections, architectural designs, and administrative
controls to minimize the risk.
When the attacker’s cost is less than his potential
gain: Apply protections to increase the attacker’s cost.
When potential loss is substantial: Apply design
principles, architectural designs, and technical and
non-technical protections to limit the extent of the
attack, thereby reducing the potential for loss.
Rules of thumb
1. When a Vulnerability Exists → Apply Risk
Mitigation or Avoidance
📌 Example:
• A company discovers a software vulnerability in its
customer database system.
• Action: The company patches the software to prevent
potential attacks (Mitigation).
• If no patch is available, the company discontinues the
vulnerable software (Avoidance).
Rules of thumb
2. When a Vulnerability Can Be Exploited → Apply
Risk Mitigation or Transference
📌 Example:
• A retail store's payment system is vulnerable to
hacking.
• Action: The store enhances encryption and security
monitoring (Mitigation).
• Additionally, it buys cyber insurance to cover financial
losses in case of an attack (Transference).
Rules of thumb
3. When Attacker’s Cost is Less Than Potential Gain
→ Apply Strong Security Controls
📌 Example:
• Hackers target a company’s email system to steal
confidential business data.
• Reason: The cost of phishing attacks is low, but stolen
information can be sold for a high profit.
• Action: The company enforces strict email filtering,
employee training, and two-factor authentication
(2FA) to increase the attacker's cost and reduce risk.
Rules of thumb
When Potential Loss is Substantial → Apply Risk
Avoidance or Strong Mitigation
📌 Example:
• A hospital stores sensitive patient data that, if leaked,
could result in huge legal and financial penalties.
• Action: The hospital invests in advanced
cybersecurity controls, encrypts all patient records,
and conducts regular security audits to prevent a
breach.
103
Control Function
Safeguards designed to defend systems are either
preventive or detective.
Preventive controls use a technical procedure, such
as encryption, or some combination of technical
means and enforcement methods.
Detective controls – warn organizations of
violations of security principles, organizational
policies, or attempts to exploit vulnerabilities.
ONLINE REFERENCES:
3. https://nptel.ac.in/courses/106/106/106106129/
2. https://nptel.ac.in/courses/106/106/106106178/
3. https://nptel.ac.in/courses/106/106/106106157 /