Risk Identification and Risk Assessment

Slides:



Advertisements
Similar presentations
CIP Cyber Security – Security Management Controls
Advertisements

WEEK 3 Risk Management.
Chapter 5: Asset Classification
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Once we know our weaknesses, they cease to do us any harm.
Risk Management: Identifying and Assessing Risk Chapter 4 Once we know our weaknesses, they cease to do us any harm. -- G.C. (GEORG CHRISTOPH) LICHTENBERG.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Principles of Information Security, 2nd Edition1 Risk Management.
Computer Security: Principles and Practice
Risk Management.
Stephen S. Yau CSE , Fall Security Strategies.
Risk Management Identifying and Assessing Risk
Risk Management Vs Risk avoidance William Gillette.
CMPS 319 Risk Management: Identifying and Assessing Risk Chapter 4
Risk Management Chapter 4.
Session 3 – Information Security Policies
Network security policy: best practices
Introduction to Network Defense
Learning Objectives Upon completion of this material, you should be able to:
Principles of Information Security, Fifth Edition
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
ITC358 ICT Management and Information Security
SEC835 Database and Web application security Information Security Architecture.
Management of Information Security, 4th Edition
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
An Overview of Risk Management
Principals of Information Security, Fourth Edition
Audit objectives, Planning The Audit
Risk Management (Risk Identification)
Lecture 32 Risk Management (Cont’d)
Switch off your Mobiles Phones or Change Profile to Silent Mode.
TEL2813/IS2820 Security Management Risk Management: Identifying and Assessing Risk Lecture 7 Feb 17, 2005.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 6 of the Executive Guide manual Technology.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Information Systems Security Operational Control for Information Security.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Slide 1 Risk Management: Identifying and Assessing Risk  “ Once we know our weakness, they cease to do us an harm” Greg Lichen.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
MANAGEMENT of INFORMATION SECURITY Third Edition CHAPTER 8 RISK MANAGEMENT: IDENTIFYING AND ASSESSING RISK Once we know our weaknesses, they cease to do.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Alaa Mubaied Risk Management Alaa Mubaied
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
SecSDLC Chapter 2.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
MANAGEMENT of INFORMATION SECURITY Second Edition.
The NIST Special Publications for Security Management By: Waylon Coulter.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
Disaster Recovery Planning (DRP) DRP: The definition of business processes, their infrastructure supports and tolerances to interruptions, and formulation.
MANAGEMENT of INFORMATION SECURITY Second Edition.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
CS457 Introduction to Information Security Systems
Chapter 7. Identifying Assets and Activities to Be Protected
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Introduction to the Federal Defense Acquisition Regulation
Risk Management Principles of Information Security, 2nd Edition
Risk Management: Principles of risk, Types of risk and Risk strategies
Security Essentials for Small Businesses
Presentation transcript:

Risk Identification and Risk Assessment Bikash Bhattarai

Risk Management Risk management is the process of dentifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. Risk management involves three major undertakings Risk identification Risk assessment Risk control

Cont… Risk identification is the examination and documentation of the security posture of an organization’s information technology and the risks it faces. Risk assessment is the determination of the extent to which the organization’s information assets are exposed or at risk. Risk control is the application of controls to reduce the risks to an organization’s data and information systems.

Know Yourself To protect assets, which are defined here as information and the systems that use, store, and transmit information, you must know what they are, how they add value to the organization, and to which vulnerabilities they are susceptible. Once you know what you have, you can identify what you are already doing to protect it.

Know the Enemy This means identifying, examining, and understanding the threats facing the organization. You must determine which threat aspects most directly affect the security of the organization and its information assets, and then use this information to create a list of threats, each one ranked according to the importance of the information assets that it threatens.

The Roles of the Communities of Interest IT community in organization take leadership Management and users, when properly trained and kept aware of the threats the organization faces, play a part in the early detection and response process. Management must also ensure that sufficient resources (money and personnel) are allocated

Risk Identification A risk management strategy requires that information security professionals know their organizations’ information assets—that is, identify, classify, and prioritize them.

Organizational Assets People Employee Trusted(Greater authority and accountability) Other (Without special privileges ) Non-Employee (contractors and consultants, partner and strangers. Procedures IT and business standard procedures IT and business sensitive procedures. threat agent to craft an attack against the organization or that have some other content or feature that may introduce risk to the organization.

Hardware and Networking Components Data At all states (Storage, Transmit, Process) Software Applications Operating systems Security Components Hardware and Networking Components Router, Switch, Firewall, UTM, IPS/IDS etc

Attributes for People, Procedures, and Data Assets Position name/number/ID Supervisor name/number/ID Security clearance level Special skills Procedures Description Intended purpose Software/hardware/networking elements to which it is tied Location where it is stored for reference Location where it is stored for update purposes

Cont… Data Classification Owner/creator/manager Size of data structure Data structure used Online or offline Location Backup procedures

Cont… Networking Assets Name IP address MAC address Asset type Serial number Manufacturer name Manufacturer’s model or part number Software version or update revision Physical location Logical location Controlling entity

Data Classification Example

Assessing Values for Information Assets As each information asset is identified, categorized, and classified, assign a relative value. Relative values are comparative judgments made to ensure that the most valuable information assets are given the highest priority, for example: Which information asset is the most critical to the success of the organization? Which information asset generates the most revenue? Which information asset generates the highest profitability? Which information asset is the most expensive to replace? Which information asset is the most expensive to protect? Which information asset’s loss or compromise would be the most embarrassing or cause the greatest liability?

Information Asset Prioritization Critical Factor

Threat Identification Any organization typically faces a wide variety of threats. If you assume that every threat can and will attack every information asset, then the project scope becomes too complex. To make the process less cumbersome, each step in the threat identification and vulnerability identification process is managed separately and then coordinated at the end.

Identify and Prioritize Threats and Threat Agents Each threat presents an unique challenge to information security and must be handled with specific controls that directly address the particular threat and the threat agent’s attack strategy. Before threats can be assessed in the risk identification process, however, each threat must be further examined to determine its potential to affect the targeted information asset . In general, this process is referred to as a threat assessment.

Threat to Information Security

Threat Assessment Not all threats have the potential to affect every organization. (12th floor building and flood ?) Which threats represent the most danger to the organization’s information? Cost to recover Which of the threats would require the greatest expenditure to prevent ?

CIO Survey Report (1000)

Vulnerability Assessment Once you have identified the information assets of the organization and documented some threat assessment criteria, you can begin to review every information asset for each threat. This review leads to the creation of a list of vulnerabilities that remain potential risks to the organization. Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset. At the end of the risk identification process, a list of assets and their vulnerabilities has been developed. This list serves as the starting point for the next step in the risk management process: risk assessment.

Vulnerability Assessment of DMZ Router