Risk Management and Security
Risk Management and Security
1. Telecommunications
2. Electrical Power Systems
3. Gas and Oil Storage and Transportation
4. Banking and Finance
5. Transportation
6. Water Supply Systems
7. Emergency Services (medical., fire, police, rescue)
8. Continuity of Government
SURVEY QUESTIONS
Asking good questions is the very heart of the risk assessment and also forms the core of the vulnerability
assessment. Questions should always be compliance-based and directly linked to a control standard or control
objective. If you ask questions that are not linked to standards, and discover major problems, the path will not ex
to force compliance. Limiting the number of questions to ask is one of the most difficult aspects of the analysis.
Employees may be nervous when they are asked to answer questions related to how they perform their jo
It is important to make sure that these individuals understand that the risk assessment is a scientific process, and
that any data gathered in the risk assessment will be seen by only one individual (the risk analysis manager), and
that their comments will not be reviewed by their supervisor, nor will they end up in their personnel file.
Random surveys are often used to predict election results, from local precincts in a particular city, to fede
elections, where the network news teams are able to predict the final results from a profile of only a few key state
In these examples, random samples are usually less than 1%. In a risk assessment, a random sample is not
desirable. Instead, the objective should be to question as many people as possible. The more individuals you
question, the better the chances that you will discover vulnerabilities.
It is unrealistic to think that people will answer more than fifty to one hundred questions. To avoid
individuals having to answer questions that do not relate to their area, in a risk assessment, questions are
divided into job categories, or what is called 'functional areas'. Functional areas are pieces of a job. By
dividing up questions into these categories, for example, Michael Smith may answer 20 questions for
network users, 20 questions for personnel management (which is his area), and 15 general organization
questions. More specialized personnel, such as facilities managers, the physical security officer, or a
database administrator will answer questions that relate only to his/her particular area.
Questions start as control standards. The standard might be: "Passwords should be changed every
month". You might cite a reference representing where this standard originated, for example, "Telecom
Security Directive 3, p. 4, paragraph 5". The question statement asks the user how well they comply with
this standard on a percentage scale from 0 to 100. The zero answer means the user never complies with the
standard. Answer of 100 means the user complies with the standard one hundred percent of the time; and
the user is encouraged to answer with any percentage in between.
In addition, users should be allowed two additional options in answering. The first is the
opportunity to answer 'not applicable', if the question doesn't apply to them; and secondly, to answer, "I
don't know", if they don't know the answer. This question process also serves as a training exercise, and a
security awareness process.
Administration (6.0%)
ROI
10
Application Controls
9
Security Staff
7
Property Management
6
Visitor Control
5
Life Cycle Management
5
Contract Specifications
5
Risk Analysis
4
Organizational Structure
3
Personnel Clearances
2
Security Policy
1 2 3 4 5 6 7 8 9 10
Return On Investment(ROI). Calculated in order of the 10 highest ROIs.
AUTOMATING THE RISK MANAGEMENT PROCESS
The new emphasis on the need for risk management is causing a renewed interest in automated risk
analysis software tools, which can reduce the time involved in a large risk assessment project by more than
sixty percent.
A manual risk assessment on a major computer network , including the personnel, the facilities, any
remote sites, 1000 users tied to a mainframe, may take from six months to one year to analyze using a
manual method. Using an automated software program can cut the time from 6 months to 6 weeks. The
risk analysis manager will spend most of his time on this analysis, enlisting help from other departments,
facilities managers (to provide some threat data); from accounting (to help establish asset values), and from
all the departments which will be included in the review.
In risk management of facilities and sites, additional considerations include the technical
competence of the manager conducting the analysis. For large, multinational security companies, expertise
in conducting risk management activities may vary from someone with 2 years experience, to a security
professional with over thirty years experience. Obviously, the difference in experience will make a big
difference in the analysis results, unless an automated tool is used, which can create a standard set of
questions, and standardize the asset and threat data. Standardized data will allow large, distributed
companies to establish a baseline over many sites and normalize the experience differences between many
analysts.