Module 1: Assets, Threats, Vulnerability, and Risk

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Direct costs in determining value

-Financial losses -Increased insurance premiums -Deductible expenses on insurance coverage -Lost business -Labor expenses -Management expenses -Punitive damages

Indirect costs in determining value

-Negative media coverage -Long-term negative consumer perception -Additional public relations expenses to overcome image problems -Lack of insurance coverage due to higher risk -Higher wages to attract future employees -Shareholder derivatives for mismanagement -Poor employee morale

successful

1-Pi must be the probability of the adversary being

Risk analysis

A detailed examination that includes risk assessment, vulnerability evaluation, and risk management alternatives.

The Threat Matrix

A grid or matrix for each asset and threat pair. The impact or consequences are shown on the vertical axis and the likelihood or probability on the horizontal axis.

Loss event profile

A list of the threats affecting the assets to be safeguarded.

Risk Mitigation

A systematic methodology used by senior management to reduce overall operational risk.

CARVER Method

A technique for determining likely targets for an attack. This method uses a five-point scale to rank each asset according to six categories.

Risk Assumption

Accept the potential risk and continue security operations "as is." Alternatively, implement some controls to lower risk to an acceptable level. (no cost)

Threat

An intent to damage or injure; an indication of something impending; associated with humans

10(f+i-3)/3

Annual Loss Expectancy formula

Vulnerability

Any weakness that an aggressor (terrorist or criminal) can exploit to make an asset susceptible to damage from natural hazards or from consequential events.

Asset

Anything you want to protect because of its value, its importance to maintaining business continuity, and/or its ability to be replaced within a required timeline.

tenants

Assessing asset value can be accomplished by interviewing stakeholders, including owners, facility staff, and

risk analysis

Assessing threats and hazards is the second major step in security

intangible

Assets can be either tangible or

Relative Asset Value

Assigning a relative value to assets based on their priority (low, medium, or high)

Risk Avoidance

Avoiding risk by eliminating its cause and/or consequence.(e.g., move assets to another location.)(Some cost)

threats

Before implementing any security program, first identify the assets your are trying to protect, the threats against those assets, and how vulnerable those assets are to the various

allocating resources

Blue (middle) boxes indicate areas where decisions respecting security protections must be based on a cost benefit analysis when

cost of lost income

Ci

consequential event threats

Conducting a due diligence investigation can help protect a company from

C

Consequence Value

indirect

Costs of assets can be direct or

cost of permanent replacement

Cp

related costs such as removal, installation, etc.

Cr

cost of temporary substitute

Ct

Risk assessment

Determining asset value, threats, likelihood, impact, and consequent vulnerability.

Risk management

Determining measures and safeguards, to mitigate threats and reduce vulnerabilities.

asset

Employees are an organization's most critical

-Injuries or deaths related to facility or infrastructure damage. -Replacement cost of assets. -Loss of revenue due to lost functions. -Existence of backups and system redundancy. -Availability of replacements. -Critical support agreements and lifelines in place. -Critical or sensitive information value. -Impact on reputation and loss of revenue..

Factors to consider when valuing and ranking critical assets by priority

Site Hardening

Harden the site against as many threats as possible. (Greatest cost)

available insurance or indemnity

I

1. Natural Disasters 2. Human-made disasters

Identify 2 subcategories of non-crime related threats.

1. Crimes. 2. Non-criminal events such as man-made incidents or natural disasters. 3. Consequential events caused by an organization's relationship with another organization. When the other organization's poor or negative reputation adversely affects the enterprise.

Identify 3 categories of threats.

1. Qualitative 2. Quantitative

Identify the two basic types of risk assessment.

1) the event's probability, and 2) the computed likely loss

Identify two fundamental elements in a quantitative approach to risk analysis.

Asset value assessment

Identifying people and asset values at a facility.

pair-wise comparison

In the CARVER Method, each critical asset is compared against the different threat scenarios using a technique called

security risk rating

In the risk analysis process, we can assign values to the three risk components to provide an overall

Risk Management

It is not possible to completely eliminate risk. Therefore it is important to determine what level of protection is desirable, and which options can help you achieve this level. This is known as

criticality, total cost of loss

K

Cost-of-loss formula

K= [Cp+Ct+Cr+Ci] minus I

Risk Limitation

Limit risk by implementing controls that minimize the adverse impact. (e.g., preventive, detective, and response controls) (Some cost)

1. Define and understand business processes and functions.. 2. Identify site and building infrastructure and systems. 3. Identify critical tangible and intangible assets.

Name 3 steps useful for identifying a company's critical assets.

Criticality Accessibility Recoverability Vulnerability Effects Recognizability

Name the six categories in the CARVER Method.

1. The Army's CARVER Method. 2. The Threat Matrix

Name two methods for quantifying risk.

Risk Analysis

Performed to understand the nature of unwanted, negative consequences to human life, health, property, or the environment.

Pa

Probability of an adversary attack during a period of time.

Pi

Probability of attack interruption by the security force.

in the future

Probability, or likelihood, of loss is an educated guess, based on historical, and socio-environmental data, about the likelihood of a loss risk event occurring

assets need to be protected

Ranking assets by Risk Rating helps put risks in a priority order so you can make decisions about which

decisions based on this value

Ranking events in order of the Annual Loss Expectancy quantifies the risk and facilitates

must be mitigated

Red (upper, right-hand) boxes on the threat matrix indicate threats that

Qualitative

Relating to that which is characteristic of something and makes it what it is.

Quantitative

Relating to, concerning or based on the amount or number of something.

i

Represents the "cost valuation" (impact) of an event in successive values such as i=1 ($10); i=2 ($100); i=3 ($1,000)

f

Represents the estimated frequency of the event in successive values such as f=1 (once in 300yrs); f=2 (once in 30yrs); f=3 (once every 3 years)

R=Pa*[1-(Pi)]*C

Risk Equation

asset

Risk is the potential for loss or damage to an

hazard

Risk takes into account the value of an asset, the threats or hazards that potentially impact the asset, and the vulnerability of the asset to the threat or

R

Risk to the facility of an adversary gaining access to assets.

Vulnerability Rating

Security Risk Rating= Asset Value Rating times Threat Likelihood Rating times

Hazards

Sources of potential danger or adverse condition; associated with nature

Define and understand the company's primary business functions and processes.

Step 1 in identifying a company's critical assets:

Identify site and building infrastructure and systems: - critical components, - life-safety systems and safe haven areas, and - secure areas.

Step 2 in identifying a company's critical assets:

Identify the company's tangible and intangible assets: - people, - information systems and data, - intellectual property, - one-of-a-kind assets, and - high-value assets

Step 3 in identifying a company's critical assets:

Cost-of-loss formula

Taking the worst-case position and analyzing each security loss risk in light of the probable maximum loss for a single occurrence of the risk event.

impact of recovery

The Qualitative approach to risk analysis assigns a relative value to assets based on replacement cost, criticality, or

probability

The Qualitative approach to risk analysis assigns a relative value to threats based on their

Risk=impact times likelihood

The Qualitative approach to risk analysis computes risk to any asset from a particular threat using the following equation:

mitigation measures

The degree of probability of a loss event determines the appropriate solution and

Asset value

The economic replacement cost for equipment and infrastructure.

Cost Benefit Analysis

The final step in a security risk analysis is to conduct a

assessment

The first task of risk analysis is to perform an asset value

probability that it will occur

The more ways a particular event can occur in given circumstances, the greater the

1. Cost-of-loss formula, and 2. Assign a relative value to each asset based on priority (e.g., 1=low, 3=medium, 5=high)

There are basically two ways to establish values for assets:

Adversary Sequence Diagram

This diagram is a useful tool that helps determine the timeline required for an adversary to breach security. Knowing the timeline required can help you implement more measures to deter, delay, and detect the intruder.

Annual Loss Expectancy

Threat probability times the value of the potential loss produces the

Risk Transference

Transfer risk by using other options to compensate for the loss, such as purchasing insurance. (Some cost)

1. the organization's mission, 2. the resources used to perform that mission, 3. how resources interface with each other to accomplish company goals, and 4. how the organization would cope or maintain business continuity if any assets were lost.

Understanding asset criticality requires understanding:

1. Risk Assumption 2. Risk Avoidance 3. Risk Limitation 4. Risk Transference 5. Site Hardening

What are five approaches to risk mitigation?

1. Risk Assessment 2. Vulnerability Evaluation 3. Risk Management

What are three components of the risk analysis process?

1. Injuries/deaths 2. Replacement cost 3. Loss of revenue to lost functionality 4. Existence of backups 5. Availability of replacements 6. Support agreements and lifelines in place 7. Critical or sensitive information value 8. Impact on reputation and loss of revenue

What factors can help in valuing identified assets.

People

What is a company's most critical asset?

mission

When selecting risk mitigation options, give priority to the asset/threat and vulnerability pairs that could significantly impact or harm the organization's

It allows you to develop a priority ranking that can facilitate decisions about which risks to manage first and how to address those risks.

Why is it important to assess vulnerability of assets?

procedural changes

Yellow (lower, left) boxes indicate threats that are acceptable "as is" or that require limited security or


Set pelajaran terkait

Skeletal System (chp 7) assigment

View Set

4th qtr ELD A HS 1/2 dn 9 Bruno Mars Slide Project

View Set

Key terms (Sociology - Families - Couples)

View Set

Chloride Ion (Cl-), Calcium Ion (Ca2+), Phosphate Ion, Magnesium (Mg2+)

View Set

Chapter 12: Moral Reasoning and Moral Development

View Set

System Development Ch13 (quiz from moodle)

View Set

Bio 102 Chapter 43 & 44 Questions

View Set

Организационные мероприятия при выполнении работ в электроустановках

View Set

ATI Nurse Logic: Priority Setting Frameworks

View Set

1-50 c(only question with 3)question for naturalization, 51-100 A question for naturalization

View Set