INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Bridging the gap between software developers and auditors.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Once we know our weaknesses, they cease to do us any harm.
Risk Management: Identifying and Assessing Risk Chapter 4 Once we know our weaknesses, they cease to do us any harm. -- G.C. (GEORG CHRISTOPH) LICHTENBERG.
Project Risk Management
Principles of Information Security, 2nd Edition1 Risk Management.
Lecture 8: Risk Management Controlling Risk
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Risk Management.
Risk Management Identifying and Assessing Risk
CMPS 319 Risk Management: Identifying and Assessing Risk Chapter 4
Risk Management Chapter 4.
Introduction to Network Defense
Learning Objectives Upon completion of this material, you should be able to:
Principles of Information Security, Fifth Edition
Risk Management - Security
ITC358 ICT Management and Information Security
Management of Information Security, 4th Edition
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
An Overview of Risk Management
Chapter 11: Project Risk Management
Principals of Information Security, Fourth Edition
Risk Management (Risk Identification)
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Security Risk Management
Lecture 32 Risk Management (Cont’d)
TEL2813/IS2820 Security Management Risk Management: Identifying and Assessing Risk Lecture 7 Feb 17, 2005.
MANAGEMENT of INFORMATION SECURITY Second Edition.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Slide 1 Risk Management: Identifying and Assessing Risk  “ Once we know our weakness, they cease to do us an harm” Greg Lichen.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
MANAGEMENT of INFORMATION SECURITY Third Edition CHAPTER 8 RISK MANAGEMENT: IDENTIFYING AND ASSESSING RISK Once we know our weaknesses, they cease to do.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Alaa Mubaied Risk Management Alaa Mubaied
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
Lesson 20-Risk Management. Background  Risk management can be described as a decision-making process.  Effective risk management avoids costly oversights.
Project Risk Management Planning Stage
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Identification and Risk Assessment
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
MANAGEMENT of INFORMATION SECURITY Second Edition.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Management Issues in Information Security Amanda Kershishnik COSC April 2007.
MANAGEMENT of INFORMATION SECURITY Second Edition.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Principles of Information Security, Fourth Edition
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Managing Project Risk – A simplified approach Presented by : Damian Leonard.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Identifying and Assessing Risk
Principles of Information Security, Fifth Edition
INFORMATION RISK MANAGEMENT
Identifying and Assessing Risk
OSG Computer Security Plans
Principles of Information Security
Risk Management: Principles of risk, Types of risk and Risk strategies
Principles of Information Security, Fifth Edition
Information Security Risks; All-in-One Terminology
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Introduction Information security departments are created primarily to manage IT risk In any well-developed risk management program, two formal processes are at work – Risk identification and assessment – Risk control

Risk Management “The process of determining the maximum acceptable level of overall risk to and from a proposed activity, then using risk assessment techniques to determine the initial level of risk and, if this is excessive, developing a strategy to ameliorate appropriate individual risks until the overall level of risk is reduced to an acceptable level.”

Knowing Yourself & The Enemy Identifying, examining and understanding the information and how it is processed, stored, and transmitted Identifying, examining, and understanding the threats facing the organization’s information assets

Communities of Interest: All Play a role Information Security Information Technology Management and Users

Risk Terminology Asset & Asset valuation Threat Vulnerability Exposure Risk

Risk Terminology

Asset Identification Identify organization’s information assets Inventory: software/hardware, and networking elements More easily tracked (automated inventory system) People, procedures, data and info May take more time / ongoing

Creating an Inventory of Information Assets Determine which attributes of each information asset should be tracked Potential asset attributes – Name, IP address – MAC address, asset type – Physical location, logical location – Controlling entity

Creating an Inventory of Information Assets (cont’d.) Identifying people, procedures and data assets Sample attributes – People - Position name/number/ID – Procedures – Description/Intended purpose – Data – Classification & Owner/creator/manager

Asset: Classifying and Categorizing Determine whether the asset categories are meaningful Inventory should also reflect each asset’s sensitivity and security priority Classification categories must be comprehensive and mutually exclusive Not one schema for all assets

Asset Valuation Assign a relative value: – As each information asset is identified, categorized, and classified Goal: assign value to encompass both tangible and intangible costs

Importance of Assets List the assets in order of importance Achieved by using a weighted factor analysis worksheet

Risk Terminology

Threat Identification Any organization typically faces a wide variety of threats

Threat Assessment Each threat presents a unique challenge to information security Each must be further examined to determine its potential to affect the targeted information asset

Threat Identification (cont’d.) Source: Adapted from M. E. Whitman. Enemy at the gates: Threats to information security. Communications of the ACM, August Reprinted with permission Weighted ranks of threats to information security

Vulnerability Assessment – Review every information asset for each threat – Leads to the creation of a list of vulnerabilities that remain potential risks to the organization Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset

Vulnerability Assessment Management of Information Security, 3rd ed. Table 8-4 Vulnerability assessment of a DMZ router Source: Course Technology/Cengage Learning

The TVA Worksheet (cont’d.) Table 8-5 Sample TVA spreadsheet Source: Course Technology/Cengage Learning

Introduction to Risk Assessment The goal is to create a method to evaluate the relative risk of each listed vulnerability Figure 8-3 Risk identification estimate factors Source: Course Technology/Cengage Learning

Likelihood The overall rating of the probability that a specific vulnerability will be exploited Using the information documented during the risk identification process, you can assign weighted scores based on the value of each information asset

Percentage of Risk Mitigated by Current Controls If a vulnerability is fully managed by an existing control, it can be set aside If it is partially controlled, estimate what percentage of the vulnerability has been controlled

Uncertainty It is not possible to know everything about every vulnerability The degree to which a current control can reduce risk is also subject to estimation error Uncertainty is an estimate made by the manager using judgment and experience

Risk Determination – Example 1 Asset A has a value of 50 and has one vulnerability, which has a likelihood of 1.0 with no current controls. Your assumptions and data are 90% accurate

Risk Determination – Example 2 Asset B has a value of 100 and has two vulnerabilities: vulnerability #1 has a likelihood of 0.5 with a current control that addresses 50% of its risk vulnerability # 2 has a likelihood of 0.1 with no current controls. Your assumptions and data are 80% accurate

Example of Qualitative Risk Assessment ThreatImpactInitial Probability Counter- measure Residual Probability Flood damage HLWater alarmsL TheftHLKey cards, surveillance, guards L Logical intrusion HMIntrusion prevention system L

Quantitative Risk Assessment Extension of a qualitative risk assessment. Metrics for each risk are: Asset value: replacement cost and/or income derived through the use of an asset Exposure Factor (EF): portion of asset's value lost through a threat (also called impact) Single Loss Expectancy (SLE) = Asset ($) x EF (%)

Quantitative Risk Assessment Metrics (cont.) Annualized Rate of Occurrence (ARO) Probability of loss in a year, % Annual Loss Expectancy (ALE) = SLE x ARO

Example of Quantitative Risk Assesment Theft of a laptop computer, with the data encrypted Asset value: $4,000 Exposure factor ? SLE, ARO, ALE ?

Example of Quantitative Risk Assesment Dropping a laptop computer and breaking the screen Asset value: $4,000 Exposure factor ? SLE, ARO, ALE ?