Tech 179 - Risk management

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Risk Evaluation

•Once the risk ratings are calculated for all TVA triples, the organization needs to decide whether it can live with the analyzed level of risk. •If residual risk is greater than risk, look for treatment strategies to further reduce the risk. •If residual risk is less than risk appetite, document the results and proceed to the latter stages of risk management.

Managing Risk

•The goal of InfoSec is to bring residual risk in line with an organization's risk appetite, not to bring risk to zero. •Rules of thumb for selecting a strategy: −When a vulnerability exists in an important asset—Implement security controls to reduce likelihood. −When a vulnerability can be exploited—Apply controls to minimize the risk or prevent the occurrence of an attack. −When the attacker's potential gain is greater than the costs of attack—Apply protections to increase the attacker's cost or reduce the attacker's gain. −When the potential loss is substantial—Apply protections to limit the extent of the attack, reducing the potential for loss.

Framework Implementation

•The implementation of the RM plan, specifically including the RM process, is likely to be influenced by the organization's risk appetite. •Implementation methods could include: −Desk check −Pilot-test −Phased approach −Direct cutover (cold-turkey conversion)

Risk Mitigation

•The mitigation risk treatment strategy, sometimes referred to as risk defense or simply risk mitigation, attempts to prevent the exploitation of the vulnerability. •This is the preferred approach, and it is accomplished by means of countering threats, removing vulnerabilities in assets, limiting access to assets, and adding protective safeguards. In essence, the organization is attempting to improve the security of an information asset by reducing the likelihood or probability of a successful attack

Applying controls and safeguards that eliminate or reduce the remaining uncontrolled risks is known as _____. a.acceptance b.termination c.transference mitigation

Applying controls and safeguards that eliminate or reduce the remaining uncontrolled risks is known as _____. Answer: d. mitigation Transference is the shifting risks to other areas or to outside entities; acceptance is understanding the consequences of choosing to leave an information asset's vulnerability facing the current level of risk, but only after a formal evaluation and intentional acknowledgment of this decision; and termination is the removal of the information asset from the organization's operating environment.

When performing risk identification, which of these steps is performed last? a.classifying b.identifying c.prioritizing categorizing

When performing risk identification, which of these steps is performed last? Answer: c. prioritizing You cannot assess the relative importance and assign priority until all assets are known, given a value, and classified and placed into categories

Framework Monitoring and Review

•After the initial implementation and as the RM effort proceeds, the framework team continues to monitor the conduct of the RM process while simultaneously reviewing the utility and relative success of the framework planning function itself. •Once the RM process is implemented and operating, the framework team is primarily concerned with the monitoring and review of the overall RM process cycle.

Risk Treatment/Risk Response (1 of 2)

•After the risk management (RM) process team has identified, analyzed, and evaluated the level of risk currently inherent in its information assets (risk assessment), it then must treat the risk that is deemed unacceptable when it exceeds its risk appetite. •This process is also known as risk response or risk control. •As risk treatment begins, the organization has a list of information assets with currently unacceptable levels of risk; the appropriate strategy must be selected and then applied for each asset. •Once the project team for InfoSec development has identified the information assets with unacceptable levels of risk, the team must choose one of four basic strategies to treat the risks for those assets: −Mitigation −Transference −Acceptance Termination

Assessing the Value of Information Assets

•As each information asset is identified, categorized, and classified, a relative value must be assigned to it to ensure that the most valuable information assets are given the highest priority when managing risk. •Which information asset: −Is most critical to the organization's success? −Generates the most revenue? −Generates the highest profitability? −Is the most expensive to replace? −Is the most expensive to protect? −Would be the most embarrassing or cause the greatest liability if lost or compromised?

RM Process Preparation—Establishing the Context

•As the RM process team convenes, it is initially briefed by representatives of the framework team and possibly by the governance group. •These groups seek to provide executive guidance for the work to be performed by the RM process team, and to ensure that the team's efforts are in alignment with managerial intent, as documented in the RM policy. •The context in this phase is the understanding of the external and internal environments the RM team will be interacting with as it conducts the RM process.•NIST's Special Publication (SP) 800-30, Rev. 1, "Guide for Conducting Risk Assessments," recommends preparing for the risk process by performing the following tasks: −Identify the purpose of the assessment; −Identify the scope of the assessment; −Identify the assumptions and constraints associated with the assessment; −Identify the sources of information to be used as inputs to the assessment; and −Identify the risk model and analytic approaches.

Process Communications, Monitoring, and Review

•As the process team works through the various RM activities, it needs to continually provide feedback to the framework team about the relative success and challenges of its RM activities, to improve not only the process but the framework as well. •Process communications involve requesting and providing information as direct feedback about issues that arise in the implementation and operation of each stage of the process. •Process monitoring and review involves establishing and collecting formal performance measures and assessment methods to determine the relative success of the RM program.

Asset Valuation

•Asset valuation involves estimating real/perceived costs associated with design, development, installation, maintenance, protection, recovery, and defense against loss/litigation. •Process result is the estimate of potential loss per risk. •Expected loss per risk stated in the following equation: −Annualized loss expectancy (ALE) = single loss expectancy (SLE) × annualized rate of occurrence (ARO)‏ −SLE = asset value × exposure factor (EF)‏ •CBA determines if an alternative being evaluated is worth the cost incurred to control the vulnerability. −The CBA is most easily calculated using the ALE from earlier assessments, before implementation of the proposed control: §CBA = ALE(prior) - ALE(post) - ACS −ALE(prior) is the annualized loss expectancy of risk before implementation of the control. −ALE(post) is the estimated ALE based on control being in place for a period of time. −ACS is the annualized cost of the safeguard.

Feasibility and Cost-Benefit Analysis

•Before implementing one of the control strategies for a specific vulnerability, the organization must explore all consequences of vulnerability to information assets. •There are several ways to determine the advantages/disadvantages of a specific control. •Items that affect the cost of a control or safeguard include cost of development or acquisition, training fees, implementation cost, service costs, and cost of maintenance. •Common sense dictates that an organization should not spend more to protect an asset than it is worth; this decision-making process is called a cost-benefit analysis (CBA) or an economic feasibility study.

Selecting the Best RM Model

•For organizations that have no risk management process in place, a recommended approach is to begin by studying the models presented earlier in this module and identifying what each offers to the envisioned process. •Other organizations may hire a consulting firm to provide or even develop a proprietary model. •When faced with the daunting task of building a risk management program from scratch, it may be best to talk with other security professionals, perhaps through professional security organizations like ISSA, to find out how others in the field have approached this problem. •No two organizations are identical, so what works well for one organization may not work well for others.

Aggregation and Uncertainty

•If the RM process begins to overwhelm an organization, the RM team can begin merging or aggregating groups of assets, threats, and their associated risks into more general categories. •It is not possible to know everything about every vulnerability, such as the likelihood of an attack against an asset or how great an impact a successful attack would have on the organization. •The degree to which a current control can reduce risk is also subject to estimation error. A factor that accounts for uncertainty must always be considered; it consists of an estimate made by the manager using good judgment and experience

Sun Tzu and the Art of Risk Management

•If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. —Sun Tzu •Know yourself: identify, examine, and understand the information assets and systems currently in place, and their vulnerabilities. •Know the enemy: identify, examine, and understand the threats facing the organization's information assets

Framework Design

•In this stage, the framework team begins designing the RM process by which the organization will understand its current levels of risk and determine what, if anything, it needs to do to bring those levels down to an acceptable level in alignment with the risk appetite specified earlier in the process. •In addition to coordinating with the governance group on the tasks outlined in the previous section, the framework team must also formally document and define the organization's risk appetite and draft the risk management (RM) plan.

Determining the Likelihood of a Threat Event

•Likelihood is the overall rating—a numerical value on a defined scale—of the probability that a specific vulnerability will be exploited or attacked, commonly referred to as a threat event. •The likelihood of occurrence is a weighted risk factor based on an analysis of the probability that a given threat is capable of exploiting a given vulnerability (or set of vulnerabilities). The likelihood risk factor combines an estimate of the likelihood that the threat event will be initiated with an estimate of the likelihood of impact (i.e., the likelihood that the threat event results in adverse impacts). For adversarial threats, an assessment of likelihood of occurrence is typically based on: (i) adversary intent; (ii) adversary capability; and (iii) adversary targeting. For other than adversarial threat events, the likelihood of occurrence is estimated using historical evidence, empirical data, or other factors (NIST SP 800-30, r. 1).

Risk Determination

•Once the likelihood and impact are known, the organization can perform risk determination using a formula that seeks to quantify certain risk elements. In this formula, risk equals likelihood of threat event (attack) occurrence multiplied by impact (or consequence), plus or minus an element of uncertain

Assessing Potential Impact on Asset Value

•Once the probability of an attack by a threat has been evaluated, the organization typically looks at the possible impact or consequences of a successful attack. •The level of impact from a threat event is the magnitude of harm that can be expected to result from the consequences of unauthorized disclosure of information, unauthorized modification of information, unauthorized destruction of information, or loss of information or information system availability... •Organizations make explicit: (i) the process used to conduct impact determinations; (ii) assumptions related to impact determinations; (iii) sources and methods for obtaining impact information; and (iv) the rationale for conclusions reached with regard to impact determinations (NIST SP 800-30, r. 1).

Threat Assessment

•Realistic threats need investigation; unimportant threats are set aside. •Weighted tables can assist in assessing threats. •Threat assessment: −Which threats present an actual danger to our information assets? −Which threats are internal, and which are external? −Which threats have the highest probability of occurrence? −Which threats have the highest probability of success? −Which threats could result in the greatest loss if successful? −Which threats can the organization handle least effectively? −Which threats cost the most to protect against? Which threats cost the most to recover from?

Risk Assessment: Risk Analysis

•Risk analysis assesses the relative risk for each vulnerability and assigns a risk rating or score to each information asset. •The goal is to develop a repeatable method to evaluate the relative risk of each vulnerability that has been identified and added to the list. •If a vulnerability is fully managed by an existing control, it can be set aside. •If it is partially controlled, you can estimate what percentage of the vulnerability has been controlled.

Defining the Organization's Risk Tolerance and Risk Appetite

•Risk appetite: the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility. •Residual risk: the risk to information assets that remains even after current controls have been applied. •Risk tolerance (risk threshold): the assessment of the amount of risk an organization is willing to accept for a particular information asset. •The goal of information security is to bring residual risk in alignment with risk appetite.

The Risk Management Framework

•Risk management involves discovering and understanding answers to some key questions about the risk associated with an organization's information assets: 1.Where and what is the risk (risk identification)? 2.How severe is the current level of risk (risk analysis)? 3.Is the current level of risk acceptable (risk evaluation)? 4.What do I need to do to bring the risk to an acceptable level (risk treatment)? •Risk management: the process of identifying risk, assessing its relative magnitude, and taking steps to reduce it to an acceptable level. •Risk identification: the recognition, enumeration, and documentation of risks to an organization's information assets. •Risk assessment: a determination of the extent to which an organization's information assets are exposed to risk. Risk treatment (risk control): the application of safeguards or controls that reduce the risks to an organization's information assets to an acceptable level •Risk management (RM) is a complex operation that requires a formal methodology. •Risk management involves two key areas: the RM framework and the RM process. •The RM framework is the overall structure of the strategic planning and design for the entirety of the organization's RM efforts. •The RM process is the implementation of risk management, as specified in the framework. •In other words, the RM framework (planning) guides the RM process (doing), which conducts the processes of risk evaluation and remediation. •Risk management (RM) is a complex operation that requires a formal methodology. •Risk management involves two key areas: the RM framework and the RM process. •The RM framework is the overall structure of the strategic planning and design for the entirety of the organization's RM efforts. •The RM process is the implementation of risk management, as specified in the framework. In other words, the RM framework (planning) guides the RM proce

Vulnerability Assessment

•Specific avenues threat agents can exploit to attack an information asset are called vulnerabilities. •Examine how each threat could be perpetrated and list the organization's assets and vulnerabilities. •The process works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions. •At the end of the risk identification process, a prioritized list of assets with their vulnerabilities is achieved. −Can be combined with weighted list of threats to form threats-vulnerabilities-assets (TVA) worksheet

ISO and NIST RMF

•The International Organization for Standardization (ISO) has several standards related to information security and two that specifically focus on risk management: −ISO 27005 information technology — security techniques — information security risk management −ISO 31000 risk management - guidelines •The National Institute of Standards and Technology (NIST) has modified its fundamental approach to systems management and certification/accreditation to one that follows the industry standard of effective risk management. •Two key documents describe the RMF: −SP 800-37, Rev. 2 Risk Management Framework for Information Systems and Organizations −SP 800-39 Managing Information Security Risk: Organization, Mission, and Information System View

Alternate Risk Management Methodologies

•The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Method was a risk evaluation methodology promoted by Carnegie Mellon University's Software Engineering Institute (SEI), and it had three versions: −The original OCTAVE Method, for large organizations −OCTAVE-S, for smaller organizations of about 100 users −OCTAVE-Allegro, a streamlined approach for InfoSec assessment and assurance •Factor Analysis of Information Risk (FAIR), by Jack A. Jones, became CXOWARE, which built FAIR into an analytical software suite called RiskCalibrator. FAIR was adopted by the Open Group as an international standard for risk management and rebranded as Open FAIR™. Later, CXOWARE became RiskLens, and the FAIR Institute was established.

The Risk Management Process

•The RM plan guides the implementation of the RM process, in which risk evaluation and remediation is conducted. •This process uses the following tasks: −Establishing the context −Identifying risk −Analyzing risk −Evaluating the risk and comparing uncontrolled risks against the risk appetite −Treating the unacceptable risk Summarizing the findings

Risk Acceptance

•The acceptance risk treatment strategy, or simply risk acceptance, is the decision to do nothing beyond the current level of protection to shield an information asset from risk and to accept the outcome from any resulting exploitation. •Acceptance is a valid strategy only when the organization has: −Determined the level of risk to the information asset −Assessed the probability and likelihood −Estimated the potential impact of a successful attack −Evaluated potential controls −Performed a thorough risk assessment −Determined that the costs to treat the risk do not justify the cost of the controls

Documenting the Results of Risk Assessment

•The final summarized document is the ranked vulnerability risk worksheet. •The worksheet describes asset, asset relative value, vulnerability, loss frequency, and loss magnitude. •The ranked vulnerability risk worksheet is the initial working document for the next step in the risk management process: assessing and controlling risk.

Risk Assessment: Risk Identification

•The first operational phase of the RM process is the identification of risk. •At this stage, managers must: 1.Identify the organization's information assets 2.Classify them 3.Categorize them into useful groups 4.Prioritize them by overall importance

Risk Termination

•The termination risk treatment strategy, also known as risk avoidance or simply risk termination, is based on the organization's intentional choice not to protect an asset. •The organization does not want the information asset to remain at risk and removes it from the operating environment by shutting it down or disabling its connectivity to potential threats. •Sometimes the cost of protecting an asset outweighs its value. •In any case, termination must be a conscious business decision, not simply the abandonment of an asset.

Risk Transference

•The transference risk treatment strategy, sometimes known as risk sharing or simply risk transfer, attempts to shift risk to another entity. •This goal may be accomplished by rethinking how services are offered, revising deployment models, outsourcing to other organizations, purchasing insurance, or implementing service contracts with providers. •The key to an effective transference risk treatment strategy is the implementation of an effective service level agreement (SLA).

Introduction to Risk Management

•The upper management of an organization is responsible for overseeing, enabling, and supporting the structuring of IT and information security functions to defend its information assets. •Part of upper management's information security governance requirement is the establishment and support of an effective risk management (RM) program. •To keep up with the competition, organizations must design and create safe environments in which their business processes and procedures can function. •These environments must maintain confidentiality and privacy and assure the integrity of an organization's data—objectives that are met by applying the principles of risk management.

The Risk Management Policy (1 of 2)

•This policy converts the instructions and perspectives provided to the RM framework team by the governance group into cohesive guidance that structures and directs all subsequent risk management efforts within the organization. The RM policy, much like the enterprise information security policy (EISP), is a strategic document that formalizes much of the intent of the governance group. •Most RM policies include the following sections: −Purpose and scope −RM intent and objectives −Roles and responsibilities −Resource requirements −Risk appetite and tolerances −RM program development guidelines −Special instructions and revision information −References to other key policies, plans, standards, and guidelines

The Roles of the Communities of Interest

•Information security, information technology, and business management and users all must work together. •Communities of interest are responsible for: −Evaluating current and proposed risk controls −Determining which control options are cost-effective for the organization −Acquiring or installing the needed controls −Ensuring that the controls remain effective

The Risk Management Framework

•The RM framework consists of five key stages: 1.Executive governance and support 2.Framework design 3.Framework implementation 4.Framework monitoring and review 5.Continuous improvement

Prioritizing (Rank-Ordering) Information Assets

•The final step in the risk identification process is to prioritize, or rank-order, the assets. •This goal can be achieved by using a weighted table analysis. −List information assets −Select criteria −Specify criteria weights −Assess each asset −Calculate weighted averages Rank order by score

The identification, analysis, and evaluation of risk as initial parts of risk management is known as risk _____. a.control b.assessment c.treatment enforcement

The identification, analysis, and evaluation of risk as initial parts of risk management is known as risk _____. Answer: b. assessment Risk treatment is the application of safeguards or controls to reduce the risks to an organization's information assets to an acceptable level, and risk control is a synonym for risk treatment. Risk enforcement is not defined in the module


संबंधित स्टडी सेट्स

B.S. Chapters 2 & 3 Culture and Socialization

View Set

Fundamentals of Programming Chapter 1 & 2 Notes

View Set

Muscles that Move the Forearm and Hand

View Set