Lecture 4 - Risk Management and Data Privacy
Lecture 4 - Risk Management and Data Privacy
Define risk.
Describe strategies for reducing risk.
Explain concerns surrounding data privacy.
List methods for protecting data.
Managing risk is to create a level
of protection that mitigates the
vulnerabilities to the threats and
reduces the potential consequences
It involves the following:
Managing Defining what it is
Risk Understanding risk types
Knowing different methods
of risk analysis
Realizing how to manage
risk
An asset is any item that has a
positive economic value
The asset value is the relative worth
of an asset
Assets are continually under threat,
which is a type of action that has the
potential to cause harm
Defining Risk Risk is defined as a situation that
involves exposure to some type of
danger
Risk can also be described as a
function of threats, the consequences of
those threats, and the resulting
vulnerabilities
Defining Risk
Threat category Description Example
Strategic Action that affects the long-term Theft of intellectual property, not pursuing a new
goals of the organization opportunity,
loss of a major account, competitor entering the market
Compliance Following (or not following) a Breach of contract, not responding to the introduction of
regulation or standard new
laws
Financial Impact of financial decisions or Increase in interest rates, global financial crisis
market factors
Operational Events that impact the daily Fire, hazardous chemical spill, power blackout
business of the organization
Technical Events that affect information Denial of service attack, SQL injection attack, virus
technology systems
Managerial Actions related to the management of Long-term illness of company president, key employee
the organization resigning
Risk types can be grouped
into the following categories:
Internal and external
Risk Types Legacy systems
Multiparty
Intellectual property (IP)
Software compliance and
licensing
Risk analysis is a process to identify and assess the
factors that may jeopardize the success of a project
or reaching a stated goal
Following a methodology for performing a risk
analysis is crucial
Methodology
Identifying risks can be difficult due to the
following:
Risk Analysis
Risks can be elusive
Unconscious human biases
A methodology helps to minimize human
factors in identifying risk by not relying on a
few employees in an organization but involves
many individuals in the process
Risk Control Self-Assessment (RCSA) is an
“empowering” methodology by which
management and staff collectively work to identify
and evaluate risks
There are two approaches to risk
assessment:
Qualitative risk assessment uses an
“educated guess” based on
observation
Typically assigns a numeric
value (1-10) or label (High,
Medium, or Low) that represents
the risk
Risk Analysis Quantitative risk assessment
attempts to create “hard” numbers
associated with the risk of an
element in a system by using
historical data
Can be divided into the
likelihood of a risk and the
impact of a risk being successful
Risk Likelihood
Several quantitative tools can be
used to predict the likelihood of the
risk:
Mean Time Between Failure
(MTBF)
Mean Time To Recovery (MTTR)
Risk Analysis Mean Time To Failure (MTTF)
Failure In Time (FIT)
Historical data can be used to
determine the likelihood of a risk
occurring within a year
Known as Annualized Rate of
Occurrence (ARO)
Risk Analysis
Source Explanation
Law enforcement agencies Crime statistics on the area of facilities to determine the probability of
vandalism, break-ins, or dangers potentially encountered by personnel
Insurance companies Risks faced by other companies and the amounts paid out when these
risks became reality
Computer incident monitoring Data regarding a variety of technology-related risks, failures, and attacks
organizations
Risk Impact
Determining the impact of risk involves
comparing the monetary loss associated with an
Single Loss Expectancy asset in order to determine the amount of money
= Asset Value * Exposure Factor
that would be lost if the risk occurred
Two risk calculation formulas are used to
Annulized Loss Expectancy
calculate expected losses:
= Single Loss Expenctancy * Annulized Rate of Occurance
Single Loss Expectancy (SLE) is the
expected monetary loss every time a risk
Risk Analysis
occurs
Annualized Loss Expectancy (ALE) is the
expected monetary loss that can be expected
for an asset due to risk over a one-year
period
Representing Risks
Risk register is a list of potential threats and
associated risks
Risk matrix/heatmap is a visual color-coded
tool that lists the impact and likelihood of risks
Risk Analysis
Risk Register
Risk Analysis
Risk Matrix/Heatmap
Risk appetite involves reducing risk to
a level that is considered acceptable for
the organization
Managing risk involves using specific
strategies and control types, addressing
third-party risk, and incorporating user
training
Risk Determining a Strategy
Management There are four strategies for dealing
with risks:
Acceptance
Transference
Avoidance
Mitigation
Risk acceptance involves
acknowledging the existence of a risk
and deciding to accept it without taking
any action to reduce its impact or
likelihood.
Example:
An organization may transfer the risk of a
data breach by purchasing cyber liability
insurance that covers the financial losses
associated with a breach.
Risk avoidance involves taking actions to
completely avoid the risk, often by not
engaging in activities that could lead to risk
exposure.
Example:
A company may decide not to store
sensitive customer data on their servers,
thereby avoiding the risk of data breaches.
Risk mitigation involves taking steps to
reduce the impact or likelihood of a risk.
Detective control Identify attack During attack Installing motion detection sensors
Compensating control Alternative to normal During attack Isolating an infected computer on a different
control network
Corrective control Lessen damage from attack After attack Cleaning a virus cleaned from an infected
server
Implement Third-Party Risk Management
There are several risks associated with using third
parties:
It can be difficult to coordinate their diverse activities
with the organization
One of the means by which all parties can reduce risk is to reach an understanding through
interoperability agreements
Interoperability agreements are formal contractual relationships as they related to security policy and
procedures
Agreements that should be regularly reviewed to verify compliance and performance standards
include:
Service Level Agreement (SLA) is a service contract that specifies what services will be provided and
the responsibilities of each party
Business partnership agreement (BPA) is a contract used to establish the rules and responsibilities of
each partner
Memorandum of Understanding (MOU) – describes an agreement between two or more parties
Agreements that should be regularly
reviewed to verify compliance and
performance standards include (continued):
Nondisclosure agreement (NDA) is a legal
contract between parties that specifies how
confidential material will be shared between the
parties but restricted to others
Risk Measurement system analysis (MSA) uses
scientific tools to determine the amount of
Management variation that is added to a process by a
measurement system
End of life (EOL) is a term used by a
manufacturer to indicate that a product has
reached the end of its “useful life”
End of service (EOS) indicates the end of
support
Provide User Training
Training results in risk awareness, which is
the raising of understanding of what risks
exist, their potential impacts, and how they
are managed
Training can make users aware of common
Provide User risks and how they can become a “human
firewall” to help mitigate risks
Training (operational) To view different traits of learners, see Table
15-8 (on the following slide)
Training styles also impact how people learn
To see a list of different approaches to
learning, see Table 15-9 on one of the
following slides)
Risk Management
Student Dependent on teacher for all learning Self-directed and responsible for own learning
Subject matter Defined by what the teacher wants to Learning is organized around situations in life or
give at work
Willingness to Students are informed about what A change triggers a readiness to learn or students
learn they must learn perceive a gap between where they are and where
they want to be
Different techniques employed
for user training:
Risk Computer-based training (CBT)
Management Role-based awareness training
Gamification
Phishing simulations
Risk Management
Privacy is defined as the state or condition of
being free from public attentions, observation,
or interference to the degree that the person
chooses
Data is collected on almost all actions today
Through web surfing, purchases, user
surveys, and questionnaires
As technology devices gather data on user
behavior, users are becoming increasingly
Data Privacy concerned about how their private data is being
collected, used, and stored
Understanding data privacy includes the
following:
Knowing the reasons for user concerns
Understanding the consequences of a
data breach
Identifying data types
User concerns revolve around
the risks associated with the
use of private data and fall
User into three broad categories:
Individual inconveniences and
Concerns identity theft
Association with groups
Statistical inferences
User Concerns
Issue Explanation
The data is gathered Users have no formal rights to find out what private information is being gathered, who gathers it, or how
and kept in secret. it is being used.
The accuracy of the Because users do not have the right to correct or control what personal information is gathered, its
data cannot be verified. accuracy may be suspect. In some cases, inaccurate or incomplete data may lead to erroneous decisions
made about individuals without any verification.
Identity theft can Victims of identity theft often have information added to their profile that was the result of actions by the
impact the accuracy of identity thieves, and even the victims have no right to see or correct the information.
data.
Unknown factors can Ratings are often created from combining thousands of individual factors or data streams, including race,
impact overall ratings. religion, age, gender, household income, zip code, presence of medical conditions, transactional purchase
information from retailers, and hundreds more data points about individual consumers. How these
different factors impact a person’s overall rating is unknown.
Informed consent is Statements in a privacy policy such as “We may share your information for marketing purposes with third
usually missing or is parties” is not clearly informed consent to freely allow the use of personal data. Often users are not even
misunderstood. asked for permission to gather their information.
Data is being used for Private data is being used on an ever-increasing basis to determine eligibility in significant life
increasingly important opportunities, such as jobs, consumer credit, insurance, and identity verification.
decisions.
The consequences to an
organization that has
suffered a data breach
Data Breach include the following:
Consequence Reputation damage
IP theft
Fines
Data Types
Table
Different technologies can be used to enhance the
protection of privacy data including the following:
Data minimization is limiting the collection
of personal information to that which is
directly relevant and necessary to accomplish a
specific task
Data masking involves creating a copy of the
original data but obfuscating (making
Protecting unintelligible) any sensitive elements such as a
user’s name or Social Security number
Data
Also called data anonymization
Data masking is one way to perform data
sanitization, which is the process of
cleaning data to provide privacy protection
Tokenization obfuscates sensitive data
elements into a random string of characters
(token)
Data sovereignty is the country-specific
requirements that apply to data
The information life cycle is the flow of an
information system’s data from data creation to
the time it becomes obsolete
Once data is no longer useful it should be
destroyed
Paper media can be destroyed by burning,
shredding, pulping, or pulverizing
In electronic media, data should never be erased
Data using the OS “delete” command
Destruction Data could still be retrieved by using third-party
tools
Data sanitation tools can be employed to
securely remove data
Wiping can be described as overwriting the disk
space with zeros or random data
Degaussing permanently destroys the entire
magnetic-based drive
By reducing or eliminating the magnetic field
Summary
Privacy is defined as the state or condition of being free from public attention,
observation, or interference to the degree that the person chooses
Once a data breach occurs, an organization must take specific, actionable steps
Different data types require protection besides customer data, financial information, and
government data
Once data is no longer useful, it should be properly destroyed
References
Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of
cloud computing for government adoption: a systematic review. International Journal of
Information Security, 1-17.
Ali, A. S., Zaaba, Z. F., & Singh, M. M. (2024). The rise of “security and privacy”:
bibliometric analysis of computer privacy research. International Journal of Information
Security, 23(2), 863-885.
Farayola, O. A., Olorunfemi, O. L., & Shoetan, P. O. (2024). Data privacy and security in IT: a
review of techniques and challenges. Computer Science & IT Research Journal, 5(3), 606-615.