Risk Management
Risk Management
Security
J Kasiroori
Introduction
Risk management is a core component of information security and establishes how risk
assessments are to be conducted.
It involves identifying, assessing, and treating risks to the confidentiality, integrity, and
availability of an organization's assets.
This program must be managed at the senior leader level of the organization and
implemented by everyone (not just the technical staff).
• The CIA Triad or Parkerian Hexad as frameworks for discussing the nature of
threats
• For instance, if we apply this to examining the threats that we might face against an
application that processes credit card payments:
• Confidentiality—if we expose data inappropriately, we have a potential breach
• Integrity—if data becomes corrupt, we may incorrectly process payments
• Availability—if the system or application goes down, we cannot process payments
• Possession—if we lose backup media, we have a potential breach
• Authenticity—if we do not have authentic customer information, we may process a
fraudulent transaction
• Utility—if we collect invalid or incorrect data, it has limited utility to us
Assess
vulnerabilitie
s
Vulnerability Assesment
• Look at assess vulnerabilities in the context of
potential threats.
• Vulnerability is a weakness which allows an attacker
to reduce a system's information assurance.
• For instance, a specific operating system or
application that we are running, a physical location
where we have chosen to place our office building, a
data centre that is populated over the capacity of its
air-conditioning system, a lack of backup generators,
or other factors.
Assess risks
Once we have identified the
threats and vulnerabilities for a
given asset, we can assess the
overall risk.
risks
threat and a vulnerability.
mitigati
on
Physical : those controls that protect the physical
environment in which our systems sit, or where our data is
stored
Interruption
Interruption
Integrity Modification
Categories Fabrication
Interruption
Availability Modification
Fabrication