Chapter 2 - Risk Assessments part 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Technology risk

Age and condition, mixed vendors, languages, complexity, documentation, availability of replacement parts, ability to test, expertise for maintenance and patching

Control Category - Compensating

Alternate form of a control to correct a deficiency or weakness. Considered when an entity cannot meet a stated requirement due to legitimate technical or business constraints but can create a comparable acceptable level of risk by other means. Placing insecure systems on isolated networks, adding third party challenge response

Risk Assessment Technique - Reliability centered maintenance

Analyzes the functions and potential failures of a specific asset (physical). Helps establish safe minimum levels of maintenance.

Vulnerability Assessments and penetration testing

As a means to estimate the level of IT risk in the org. Tend to be very detailed. Advantage is these reports are granted a level of deference by senior management similar to an audit.

Tools to determine current state of IT risk controls

Audits, BCPs, Capability Maturity Models, Control tests, incident reports, IT operations, enterprise architecture assessment, logs, media reports, observation,self assessments, third party assurance, user feedback, vendor reports and vulnerability assessment

Core source of data used in the BCP

Business Impact Analysis which identifies the critical time lines (RTO and RPO) for services and products associated with value creation.

Org structure and culture

Contributing factors in risk prevention, detection and response.

Controls risk

Controls are implemented to reduce or maintain risk at acceptable levels but may be poorly maintained or unsuitable for the risk they are meant to control. They must be regularly reviewed.

Risk is more serious when any of the following are true

Controls are inadequate, wrong controls used, controls are ignored, controls are poorly maintained, logs not reviewed, controls not tested, changes to control configuration not managed, controls can be physically accessed and altered, duties are inadequately segregated

Risk Assessment Technique - Fault tree analysis

Deductive failure analysis. Starts with an event and examines possible means for the event to occur (top down). Diagram can be used to reduce or eliminate potential causes of the event. (used in engineering)

Risk Assessment Technique - Business Impact Analysis

Determine the impact of losing the support of any resource. In addition to identifying initial impact a comprehensive BIA seeks to establish the escalation of loss over time. Gives data to senior management to make decisions.

Risk Assessment Technique - Hazard analysis and critical control points (HACCP)

Developed for food safety industry, system for proactively preventing risk and assuring quality, reliability and safety of processes.

Risk Assessment Technique - Bow tie analysis

Diagram to communicate risk assessment results by displaying links between possible causes, controls and consequences. Cause is in the middle (knot) and triggers and controls, mitigation strategies and consequences branch off

Policies

Empower risk management, audit and security staff. Should clearly state senior managements position on protection of information. Overarching policy does not have technical focus in order to prevent it from becoming outdated. Likely to state the goal of managing risk through protecting the orgs assets. Instrumental in determining approach of the org to risk mgt and acceptable levels of risk. Risk practioner should identify presence or lack of policies.

Architecture risk

Enterprise approach to risk management, architecture and business continuity at the enterprise level promotes consistency repeatability compliance and accountability. Also improves visibility afforded to senior management. Lack of enterprise architecture results n ownership gaps between systems.

Risk Assessment Technique - Root cause analysis

Establish the origins of an event (5 whys)

Risk Assessment Technique - Hazard and operability studies (HAZOP)

Evaluating potential risk by looking at possible deviations from existing process (risks to personnel or equipment)

Risk Assessment Technique - Scenario analysis

Examines possible future scenarios that were identified during risk identification looking for risk associated with the scenario should it occur.

Crucial in developing positive risk culture and promoting risk principles

Example set by IT Management

Enterprise Architecture Assessment

Focuses on producing a view of the current state of IT, establishing vision for the future state and generating a strategy to get there.

Risk Assessment Technique - Event tree analysis

Forward looking, bottom up model that uses inductive reasoning to assess the probability of different events resulting in possible outcomes. Can see which pathway is causing the greatest probability of failure.

Risk Assessment Technique - Brainstorming/Structured Interview

Gather large group of risks to be ranked by a team. Can use prompts or interviews

Vendor reports

Government sponsored computer emergency response teams (CERTs) provide free reports and analysis

BCP risk assessment should identify the following

HR, data, infrastructure elements and other resources that support key processes, list of potential vulnerabilities, estimated probability of occurrence, efficiency and effectiveness of existing risk mitigation controls

First step in preparing a BCP

Identify the business processes of strategic importance (processes responsible for permanent growth of the business and for fulfillment of business goals)

Exception management

If exceptions are undocumented and uncontrolled the risk level is unknown and may represent a hidden vulnerability. Should only be allowed through documented formal process that requires approval by senior management.

Control Category - Preventative

Inhibit attempts to violate security policy. Encryption, user authentication and vault construction doors.

IT Operations and Management evaluation

Interviewing operations staff and reviewing logs of problem tickets con provide insight into an unmitigated or recurring problem

Risk Assessment Technique - Delphi technique

Leverages expert opinion received using two or more rounds of questionnaires. Results summarized after each round and communicated to experts. Collaborative technique helps to build consensus.

Risk Assessment Technique - Checklists

List of potential or typical threats, items can be checked off one at a time as they are completed. Can use previously developed lists, codes or standards.

Self assessments

Local managers have insight into behaviors of their staff so they are well suited to evaluate compliance with procedures, recurring problems, risk trends and vulnerabilities.

Risk Assessment Technique - Cause and effect analysis

Looks at factors that contributed to a certain effect which are then displayed in a diagram, tree structure or fishbone diagram.

Control Category - Directive

Mandate behavior by specifying what actions are and are not permitted. A policy.

Risk Assessment Technique - Bayesian Technique

Method od statistical inference that uses prior distribution data to determine the probability of a result.

Procedures

More granular than standards and support their implementation.Detailed steps to perform an operation. Created to define the way in which the processes should be carried out. Implement the intent of the policy.

Media reports

Newspapers, TV, etc. - with a degree of skepticism. RP should alert those with authority of a communication that could impact the org.

Third party assurance

Org benefits from expertise, objectivity and credibility of third party. Reviewing the outsourcing parties security policies will add a level of assurance.

Factors that can affect the calculation of a risk assessment

Org structure,Policies.Standards/Procedures, Technology, Architecture, Controls

Risk Assessment

Process used to identify and evaluate risk and its potential effects which included evaluation of: Critical Function, Risk Associated, Controls in place to reduce exposure, Prioritization of risk, Relationship between risk and enterprise risk appetite and tolerance

Desirable to have a single BCP integrated plan to ensure that

Proper coordination among various plan components, resources committed are used in the most effective way

Control Category - Detective

Provide warnings of violations or attempted violations of policy. Audit trails, intrusion detection systems and checksums.

Control Category - Deterrent

Provide warnings that may dissuade threat agents from attempting a compromise. Warning banners on logon screens.

Control Category - Corrective

Remediate erros, omissions, unauthorized uses and intrusions when detected. Data backups, error correction and automated failover.

Data Management (ops and mgt eval)

Risk practitioner should review and assess the data ownership and management processes of the organization including the protection of data from improper disclosure, modification and deletion.

Risk Assessment Technique - Layers of protection analysis (LOPA)

Semi quantitive risk analysis technique that uses aspects of HAZOP to determine risk. Looks at controls and their effectiveness. (Is is safe enough?)

Risk management function

Should have an enterprise mandate to review and provide input into all business processes, participate in incident management activities and review lessons learned to improve response planning, detection and recovery.

Risk Assessment Technique - Monte Carlo Analysis

Simulation used to aggregate variation in a system resulting from variations in the system for a number of inputs where each input has a defined distribution and the inputs are related to the output. For risk assessment triangular distributions or beta distributions are commonly used.

SSAE16

Statement on Standards for Attestation Engagements Number 16

Risk Assessment Technique - Structured what if technique (SWIFT)

Structured brainstorming to identify risk. Usually in a facilitated workshop. Using prompts and guide words.

Key elements to measure IT risk management capability

Support of senior mgt, Regular communications between stakeholders, existence of policies, Availability of BIA, Logging and monitoring, Reviewing logs, Scheduled risk assessments, Testing of BCPs, Training of staff, Involvement of risk principles on projects, Gathering feedback from users, Validating risk appetite, Time to detect/resolve issues

Standards

Support requirements in the policy. Mandatory requirements or code of practice. Implemented to comply with the requirements and direction of policy to limit risk and support efficient business operations.

User Feedback

System users know the shortcomings including potential vulnerabilities. Can help indicate where security controls could be circumvented for convenience.

Control test

Testing both technical and non technical aspects of the control (rules governing the operation of the control, procedures used in monitoring proficiency of staff)

Risk Assessment Technique - Sneak circuit analysis

Used to identify design errors or sneak conditions such as latent hardware, software or integrated conditions that are often undetected by system tests and may result in improper operations

Risk practitioner determines the current state of IT risk

Using reports generated by the controls themselves and the results of control testing activities and incident management programs.

Observation

Watching a process as an independent observer may highlight issues that may not be seen as clearly when the process is being executed. First consider what is actually happening an ensure it is reflected in the work flows.

Risk Assessment Technique - Preliminary hazard analysis

What threats or hazards may harm an organizations activities, facilities or systems.(OSHA)

Current state assessment

condition of the program at that point in time

Capability Maturity Models

contains the essential elements of effective processes for one or more disciplines. Describes and evolutionary improvement path from ad hoc to mature.

Incident response teams consist of

employees assigned specific roles during various incidents and external resources for forensic investigations

Business Continuity Plan

enable a business to continue critical services in the event of a disruption, up to and including the ability to survive a disastrous interruption

Primary focus of incident management

get the organizations affected systems and operations back to normal service as quickly as possible (this can affect evidence collecting). Each incident should be used to garner lessons learned.

SLAs only provide

monetary remedies

Logs

most valuable tool to monitor controls and detect risk. Should contain (changes to permissions, system startup/shutdown, login/logout, changes to data, errors/violations, job failures). Ensuring SOD is particularly important when it comes to log files.

In environments where the EA is immature or absent the risk practitioner should

place greater emphasis on the use of technology specific assessments as a means of building a piecemeal vision of current IT risk.

Disaster Recovery

reestablishment of business and IT services following a disaster within a predefined schedule and budget. Time frames are based on cost of recovery and length of time that management is willing to accept

Risk Assessment Technique should be used when

the goal is to produce results that can be compared over time

Four ares (EAA)

Are we doing the right things, Are we doing them the right way, Are we getting them done well, Are we getting the benefits

Risk Assessment Technique - Human reliability analysis (HRA)

Effect of human error on systems (manu, transport)

IT risk is

a subset of enterprise risk

IT risk assessment is only accurate

at the time the risk state was measured

A thorough review of a incident can

identify weak controls, poor detection, inappropriate or ineffective response and lack of training of staff

preventative control reduces

impact

Impact of an event

is hard to calculate with any degree of accuracy because there are so many factors. Sane incident could have different impacts depending on how ling it took to detect it.

Cloud risk

is the same as risk for any other outsourcing initiative

Incident management starts with

preparation and planning that build an incident response plan (IRP).

Detective control triggers

preventative control

Goal of a BCP

provide a reduced but sufficient level of functionality in the business operations immediately after encountering an interruption and while recovery is taking place

Deterrent control and Compensating control

reduce likelihood of threat

Risk Assessment Technique - Cause and consequence analysis

Combines techniques of a fault tree analysis and allows for time delays to be considered.

Risk Assessment Technique - Markov analysis

Used to analyze systems that can exist in multiple states. Assumes that future events are independent of past events. Tendency of one event to follow another. Brand switching.

IT system risk is often measured by

the impact of an IT related problem on the business services that the IT system supports

preventative control protects against

vulnerability


संबंधित स्टडी सेट्स

4.1 Learning Through Classical Conditioning

View Set

BIOLOGY CH. 17 Gene Expression: From Gene to Protein

View Set

Exam 3 Lymphatic system & immunity

View Set

Tutorial 1 Getting started with excel ex 24 -29

View Set

Anatomy and Physiology - Blood : White Blood Cells

View Set

Nurse Leadership and Management Final

View Set

Executive ap gov test multiple choice

View Set