Risk Analysis vs Security Controls. Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security.

Slides:



Advertisements
Similar presentations
Risk Analysis Fundamentals and Application Robert L. Griffin International Plant Protection Convention Food and Agriculture Organization of the UN.
Advertisements

Performance Management
PROJECT RISK MANAGEMENT
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Control and Accounting Information Systems
Control and Accounting Information Systems
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
Auditing Concepts.
PHCL 472 Nouf Aloudah 1.  Mark Pillar story 2  Change Is Necessary  Pharmacy managers and pharmacists are grappling with the many forces affecting.
COMP427 Business Ethics. Objectives 1.To understand ethics and why its important in ways that are consistent with a code of principles. 2.Understand why.
Chapter 1 An Overview of Ethics
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
IT Planning.
By: Ashwin Vignesh Madhu
Principles of Information Security, 2nd Edition1 Risk Management.
Chapter Extension 22 Managing Computer Security Risk © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Purpose of the Standards
Information Systems Controls for System Reliability -Information Security-
Security Risk Management Paula Kiernan Ward Solutions.
Internal Auditing and Outsourcing
ISO Quality management International Organization for Standardization International Organization for Standardization It addresses various aspects.
Lecture 23.
SEC835 Database and Web application security Information Security Architecture.
Software Project Management Lecture # 8. Outline Chapter 25 – Risk Management  What is Risk Management  Risk Management Strategies  Software Risks.
 Control ◦ Any process that directs the activities of individuals toward the achievement of organizational goals.
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Security Risk Management
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Managerial Control Chapter 16 Copyright © 2011 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Project Management : Techniques and Tools (60-499) Fall 2014 / Winter 2015.
INTRODUCTION Why AIS threats are increasing
Oper. Decisions - 1 OPERATING DECISIONS. UNCOLLECTIBLE ACCOUNTS RECEIVABLE n When credit is extended, some amount of uncollectible receivables is generally.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
CSCE 522 Secure Software Development Best Practices.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
EVALUATION OF HRD PROGRAMS Jayendra Rimal. The Purpose of HRD Evaluation HRD Evaluation – the systematic collection of descriptive and judgmental information.
Presentation made by 3D High School G.B. Bodoni.  What is it? Business Plan is a planning document that describe in detail the business project and allows.
Establishing Credibility
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
Child Safety Framework: Analyzing and Planning for Child Safety.
Chapter 1: Fundamental of Testing Systems Testing & Evaluation (MNN1063)
CSCE 201 Secure Software Development Best Practices.
Establishing Credibility
Copyright © 2015 Scott Borg/U.S. Cyber Consequences Unit. All rights reserved. Making Economics a Cyber-Security Weapon Scott Borg Director (CEO) and Chief.
Information and Decision Making
Stakeholders Definition of stakeholders Theoretical model: 1.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
MODULE 9 MANAGERS AS DECISION MAKERS “Decide first, then act” How do managers use information to make decisions and solve problems? What are the steps.
Continual Service Improvement Methods & Techniques.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Risk Assessment: A Practical Guide to Assessing Operational Risk
true potential An Introduction to the First Line Manager Programme’s CMI Qualifications.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Auditing Concepts.

MKTG 450 Selected Topic in Marketing: Distribution Management Spring 2009, Dr. Stefan Wuyts Vertical integration.
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
A New Concept for Laboratory Quality Management Systems
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Risk Analysis vs Security Controls

Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security risk assessment with business risk assessment. Taking a business risk is voluntary with the objective of a positive return on investment (ROI) with potential loss limited to the assets invested.

Security Controls Risk Management: A holistic management process that encompasses activities that lead to cost-effective security solutions to protect Information Systems. Risk Analysis: A process to determine a measurable expectancy of loss, expressed in terms of frequency over a given time, and the amount of potential loss to the identified assets. A subset of Risk Management. Asset: Any resource, item, information of value to an organization which, if compromised in some manner, would result in a loss. Loss: The undesirable product of a threat that has occurred, resulting in one or any combination of: delay, disclosure, destruction or modification. Threat: A person, thing or event that manifests itself as a potential danger to an asset. Safeguard: A protective countermeasure to one or more threats or vulnerabilities designed to reduce the likelihood or degree of loss of an asset.

Security Controls One of the major problems is that security risk assessment and the benefits of using the results of risk assessment cannot be measured in any sufficiently accurate to provable way. Security risk is difficult to manage since you don’t know and can’t control the often irrational people who cause the risk and their plans. You cannot measure manage what you cannot measure. These differences suggest that the negative objectives of reducing security risk and the methods of risk assessment are not sufficient to justify security expenditures in a rational way.

Security Controls Like many of our stakeholders, we have wrongly assumed that business risk and security risk are the same. They are fundamentally different. Therefore, the validity and success of business risk assessment does not prove that security risk assessment would be successful, and the failings of security assessment does not imply anything about business risk.

Differences Between Security and Business Risks Involuntary risk of unknown value cannot be avoided Explicit adversaries are not identifiable Adversaries are unknown ROI is negative, unknown, and not provable Positive benefit is absence of unknown possible loss Voluntary discretionary investment decision can be made Competitors are known Competitor’s are known Competitors normally follow ethical practices ROI is positive and can be easily demonstrated *SKRAM - Skills, Knowledge, Resources, Authority, and Motives Security Risk Business Risk

Differences Between Security and Business Risks Negative result is unlimited, unknown loss Risk assessment is not verifiable because results are obscure Amateurs perform risk assessment Limited resources are allocate to risk assessment Positive benefit is measurable profit Loss is limited to investment only Risk assessment is verifiable by obvious results Professional risk managers perform risk assessment Generous resources are allocated for risk assessment Security Risk Business Risk

Changing Objectives For the past 30 years, the objectives of information security has been to reduce risk by applying security controls. This objective has kept us tied to the flawed effort to perform security risk assessments. If the objective of adopting a security safeguard is to reduce a security risk, the expenditure for the safeguard can only be justified by demonstrating that the cost of the safeguard is lower than the cost of dealing with the possible negative consequences of failing to implement the safeguard.

Changing Objectives Today, with 30 years of security advances and loss experience, we have used more than 300 generally accepted safeguards. We have: – recorded loss experience, –identified vulnerabilities and treats, – developed and used safeguards, and – established due care and good practice in the process

Changing Objectives These efforts have been documented extensively in: –The Common Body of Knowledge –British Standard (BS 7799) –International Standards (ISO 17799) –CoBit –Generally Accepted System Security Principles (GASSP) –NIST Common Criteria –CERT

Changing Objectives In most cases, it is no longer necessary to conduct reviews and plan security budgets by repeating threat, vulnerability and risk analysis. The standards of due care have already been established. The only analysis needed is the evaluation of the threats and vulnerabilities related to the newest technologies and applications to find and devise safeguards that are not yet accepted as being due care.

Changing Objectives Given the existing knowledge base and experience, we should rely on due care and good practices for most of our needs to gain management support for security plans and help choose safeguards. By benchmarking the practices of other organizations and gathering information on the sales and evaluations of purchasable security products, we can measure the extent to which our safeguards reflect the strength of due care and good practices.

Changing Objectives When benchmarking, if you discover that four of your competitors have installed firewalls, no risk assessment is necessary to support a “good practices” conclusion. Good security management (not risk management) requires that you plan an overall structure and system architecture of your security infrastructure.

Controls Conclusion We should rely on due care and good practices and methods for selecting safeguards. BS 7799, ISO have 350 controls to choose from. Use benchmarking, peer communications, security product advertisements and evaluations and security product demonstrations in selecting safeguards.

Controls Conclusion If you take these steps, over time you can replace negative objectives of reducing risk with achieving business enablement, due care and good practices as the stated positive security objective.