Lecture 08 Chapter 4 Risk Assessment
Lecture 08 Chapter 4 Risk Assessment
RISK
MANAGEMENT
Information Security
2
Why to know and learn? ISRM
The average cost of data breaches is increasing every year. In 2022, businesses
$4.35 million
lost $4.35 million, $0.11 million more than in 2021, and 12.7% higher than in 2020.
Data breaches are at a historic high, with approximately 15 million records exposed
during 2022's third quarter.
$3 billion
3
Threat & Vulnerability
If you're trying to protect an asset, then you'll be shielding it from a threat. The
term refers to anything that can accidentally or intentionally exploit a vulnerability
and damage, destroy, or obtain an asset. (Intentional, Unintentional, Natural)
Online, your company website and data are the assets. A hacker and their tools
(like malicious code) would be a cyber threat. The criminal can install the code on
your site, which can infiltrate your platform and shut it down or install viruses.
4
Risk
• Where vulnerabilities and threats
intersect.
• At its core, risk refers to the possible
implication of the damage or loss of
business assets and data.
• Cyber risk is a function of threats
leveraging system vulnerabilities to
access and compromise or steal assets.
• It's best summed up with this formula
5
Risk (Conti…)
6
Organizations must design and create
safe environments in which business
processes and procedures can function
Information
Security Risk Risk management: process of identifying
Management and controlling risks facing an
organization
7
“If you know the enemy and know yourself,
you need not fear the result of a hundred
battles. If you know yourself but not the
enemy, for every victory gained you will also
suffer a defeat. If you know neither the
enemy nor yourself, you will succumb in
every battle.”
8
An Overview of Risk Management Remember
Sec-SDLC
before proceeding
next(for better
understanding)
Risk Management
9
Figure 4-1 Components of Risk Management
10
11
12
The Roles of the
Communities of Interest
13
Identifying
Risk Risk management Classifying
Identification involves
•Software •Network topologyPrioritizing an
organization’s assets
•Hardware •Information storage
•Data protection
•Interfaces •Information flow
A threat assessment process identifies
•Users quantifies security
•Technical
and the risks facing each asset
•Support personnel controls
•Criticality •Physical security
•Functional environment People
requirements •Environmental
Components of risk
Procedures
architecture Hardware
14
Plan and Organize the Process
15
Figure 4-2 Components of Risk Identification
16
Iterative process; begins with
identification of assets, including all
elements of an organization’s system
(people, procedures, data and
information, software, hardware,
networking)
Asset
Identification
and Inventory
17
Table 4-1 Categorizing the Components of an Information System
18
People, Procedures, and Data Asset
Identification
Human resources, People: position
documentation, and data name/number/ID; supervisor;
information assets are more security clearance level;
difficult to identify special skills
Procedures: description;
intended purpose; what
Important asset attributes: elements it is tied to; storage
location for reference; storage
location for update
Data: classification;
owner/creator/ manager; data
structure size; data structure
used; online/offline; location;
backup procedures employed19
Hardware, Software, and
Network Asset Identification
20
Data Classification
and Management
21
Data Classification and Management (cont’d.)
Each data user assigned a single level of authorization
indicating classification level
Security Clearance Structure Before accessing specific set of data, employee must meet
need-to-know requirement
22
Classifying and Prioritizing
Information Assets
• Many organizations have data classification schemes
(e.g., confidential, internal, public data)
• Classification of components must be specific to allow
determination of priority levels
• Categories must be comprehensive and mutually
exclusive
23
Information Asset
Valuation
• Questions help develop criteria for
asset valuation
• Which information asset:
• Is most critical to organization’s
success?
• Generates the most
revenue/profitability?
• Would be most expensive to
replace or protect?
• Would be the most
embarrassing or cause greatest
liability if revealed?
24
Figure 4-5 Sample Inventory Worksheet
25
Information Asset Valuation
(cont’d.)
• Information asset prioritization
• Create weighting for each category based on the
answers to questions
• Calculate relative importance of each asset using
weighted factor analysis
• List the assets in order of importance using a
weighted factor analysis worksheet
26
27
Identifying and Prioritizing Threats
28
29
Vulnerability Identification
30
31
RISK ASSESSMENT
ISRM…
32
Risk Assessment
• Risk assessment evaluates the
relative risk for each vulnerability
• Assigns a risk rating or score to
each information asset
• The goal at this point: create a
method for evaluating the
relative risk of each listed
vulnerability
33
• A prioritized list of assets
• A prioritized list of threats facing those assets
34
T1V1A1—Vulnerability 1 that exists between
Threat 1 and Asset 1
T2V1A1—Vulnerability 1 that exists between
Threat 2 and Asset 1
35
• The probability that a specific vulnerability will
be the object of a successful attack
36
37
Clearwater IRM risk rating matrix
38
Risk Determination
40
Risk Rating Worksheet
41
Identify Possible Controls
Policies
There are three general Programs
categories of controls:
Technologies
42
Documenting the Results of Risk Assessment
43
Risk Control
Strategies
46
• Attempts to prevent exploitation of the
vulnerability
• Preferred approach
• Accomplished through countering threats,
removing asset vulnerabilities, limiting
asset access, and adding protective
Defend safeguards
• Three common methods of risk avoidance:
• Application of policy
• Training and education
• Applying technology
47
Transfer
48
Mitigate
Attempts to reduce impact of
vulnerability exploitation through
planning and preparation
49
Accept
50
Terminate
51
Selecting a Risk Control Strategy
• Level of threat and value of asset play major role in
selection of strategy
• Rules of thumb on strategy selection can be
applied:
• When a vulnerability exists, implement assurance
techniques to reduce the likelihood of a vulnerability
being exercised.
• When a vulnerability can be exploited, apply layered
protections, architectural designs, and administrative
controls to minimize the risk or prevent this occurrence.
• When the attacker’s cost is less than his or her potential
gain, apply protections to increase the attacker’s cost.
• When potential loss is substantial, apply design
principles, architectural designs, and technical and
nontechnical protections to limit the extent of the attack,
thereby reducing the potential for loss. 52
Thank You
53