Tutorial 5 For Science Compuer CyberSecurity
Tutorial 5 For Science Compuer CyberSecurity
Threat agents will try to abuse and/or damage the assets owned by the asset
owners. Threat agents will pose threats to the assets, and the threats will be
evaluated as a risk. The asset owners which have monetary values on the assets
want to reduce the risk pose by the threat agents, asset owners will try to impose
some countermeasures in-place to reduce the risk. This is because they wish to
minimize the risk.
8. Explain the flow and cycle of risk control in organization as Figure 5.3
1. We need to identify the information assets.
2. Then, prepare the ranked vulnerability risk worksheet.
3. Proceeding later, we need to develop the control strategy and plan.
4. We implement the controls.
5. We later assess the controls implemented.
6. We ask the question of “Is the control adequate ?”.
7. If no, we need to go back to develop control strategy and planning. Vice
versa.
8. If yes, we can proceed for planning on maintenance.
9. We would then have to measure the risks to information asset.
10. We then later be prompted a question, “Is the risk acceptable ?”.
11. If no, we would have to go back to develop control strategy and planning.
Vice versa.
12. If yes, we will have to proceed to measure the risks to information asset.
9. Read the example given (attachment-cybersecurity risk assessment). Summary
the activities on identifying and assessing risk and suggestion of control to
overcome the risk.
- This assessment addresses the three most important factors in determining
“information risk” that affects the confidentiality, integrity and availability of
systems and data :
o An evaluation of natural & man-made threats;
o The existence and operational state of reasonably-expected
cybersecurity controls; and
o The overall maturity of the IT security program that focuses on the
current capabilities of people processes and technologies relied upon
to protect ACME.
Assessment of Natural & Man-Made Threats
When taking compensating factors into account, ACME’s exposure to natural &
man-made earn a MODERATE risk rating
Assessment of Cybersecurity Controls
When taking compensating factors into account, ACME’s implementation of
reasonably-expected cybersecurity controls would earn a MODERATE risk
rating.
Assessment of IT Security Program Maturity
ACME would earn a technology capability maturity rating of level 2, based on the
composite score for maturity of the assessed cybersecurity controls utilized in
this assessment.
In summary, taking into account the assessed factors that are covered in this
report, ACME’s overall IT security capabilities are in the early stages of maturity,
which exposes ACME to a moderate level of risk. This is based on the existing
people, processes and technologies in place to protect the confidentiality,
integrity and availability of ACME’s data and systems.