Chapter4
Chapter4
organization’s information assets and infrastructure, and taking steps to reduce this risk to
an acceptable level.
• Risk management involves three major undertakings:
• risk identification
• risk assessment,
• risk control
• Risk identification is the examination and documentation of the security posture of an
organization’s information technology and the risks it faces.
• Risk assessment is the determination of the extent to which the organization’s information
assets are exposed or at risk.
• Risk control is the application of controls to reduce the risks to an organization’s data and
information systems.
3
An Overview of Risk
Management
Know yourself:
identify, examine, and understand the information and systems
currently in place : This is self-evident.
To protect assets, which are defined here as information and the
systems that use, store, and transmit information, you must know
what they are, how they add value to the organization, and to which
vulnerabilities they are susceptible.
Once you know what you have, you can identify what you are
already doing to protect it.
Just because a control is in place does not necessarily mean that
the asset is protected.
Frequently, organizations implement control mechanisms but then
neglect the necessary periodic review, revision, and maintenance.
The policies, education and training programs, and technologies
that protect information must be carefully maintained and
administered to ensure that they remain effective.
4
Principles of Information Security, 4th Edition
Know the enemy:
identify, examine, and understand threats facing
the organization
You must determine which threat aspects most
directly affect the security of the organization and
its information assets, and then use this
information to create a list of threats, each one
ranked according to the importance of the
information assets that it threatens
8
Plan and Organize the
Process
First step in the Risk Identification process is to follow your
project management principles.
You begin by organizing a team, typically consisting of
representatives of all affected groups.
With risk identification, since risk can exist everywhere in the
organization, representatives will come from every
department from users, to managers, to IT and InfoSec
groups.
The process must then be planned out, with periodic
deliverables, reviews, and presentations to management.
Once the project is ready to begin, a meetings can be
conducted
11
As the people, procedures, and data assets are identified, they should
be recorded using a reliable data-handling process.
14
controlling entity
Principles of Information Security, 4th Edition
Principles of Information Security, 4th Edition
Automated Asset
Inventory Tools
Automated tools can sometimes identify the
system elements that make up hardware,
software, and network components.
For example, many organizations use automated
asset inventory systems.
The inventory listing is usually available in a
database or can be exported to a database for
custom information on security assets.
Once stored, the inventory listing
30
31
32
Threat assessment:
33
34
Vulnerability Identification
Specific avenues threat agents can exploit to attack an
information asset are called vulnerabilities
Examine how each threat could be perpetrated and list
organization’s assets and vulnerabilities
Process works best when people with diverse backgrounds within
organization work iteratively in a series of brainstorming sessions
At end of risk identification process, list of assets and their
vulnerabilities is achieved
35
36
39
40
41
48
49
50
Approach
52
57
59
61
63
64
65
66
68
Quantitative versus Qualitative
Risk Control Practices
Metrics-based measures
Process-based measures
70
71
72
73
74