Risk Management
Risk Management
Risk Assessment
Overview
risk: the potential that a given threat will exploit vulnerabilities of an asset or
group of assets to cause loss or damage to the assets.
Asset Identification
identify assets
“anything which needs to be protected”
of value to organization to meet its objectives
tangible or intangible
in practice try to identify significant assets
draw on expertise of people in relevant areas of organization to identify
key assets
identify and interview such personnel
see checklists in various standards
Threat Identification
to identify threats or risks to assets asK
who or what could cause it harm?
how could this occur?
threats are anything that hinders or prevents an asset providing
appropriate levels of the key security services:
confidentiality, integrity, availability, accountability, authenticity and
reliability
assets may have multiple threats
Threat Sources
threats may be
natural “acts of god”
man-made and either accidental or deliberate
should consider human attackers
motivation
capability
resources
probability of attack
deterrence
any previous history of attack on org
Threat Identification
depends on risk assessors experience
uses variety of sources
natural threat chance from insurance stats
lists of potential threats in standards, IT security surveys, info from
governments
tailored to organization’s environment
and any vulnerabilities in its IT systems
Vulnerability Identification
18
Analyze Risks
20
Another formula
21
In words…
22
Risk Determination Example
Asset A has a value of 50 and has one vulnerability, which has
a likelihood of 1.0 with no current controls. Your assumptions
and data are 90% accurate
Asset B has a value of 100 and has two vulnerabilities:
vulnerability #2 has a likelihood of 0.5 with a current control
that addresses 50% of its risk; vulnerability # 3 has a
likelihood of 0.1 with no current controls. Your assumptions
and data are 80% accurate
The resulting ranked list of risk ratings for the three
vulnerabilities is as follows:
Asset A: Vulnerability 1 rated as 55 = (50 × 1.0) – 0% + 10%
Asset B: Vulnerability 2 rated as 35 = (100 × 0.5) – 50% +
20%
Asset B: Vulnerability 3 rated as 12 = (100 × 0.1) – 0 % +
20%
Management of Information Security, 3rd ed.
23
Documenting the Results
of Risk Assessment
Goals of the risk management process
To identify information assets and their
vulnerabilities
To rank them according to the need for protection
In preparing this list, a wealth of factual
information about the assets and the threats
they face is collected
Information about the controls that are already
in place is also collected
The final summarized document is the ranked
vulnerability risk worksheet
Management of Information Security, 3rd ed.
24
Determine Likelihood
Almost E E E E H H
Certain
Likely E E E H H M
Possible E E E H M L
Unlikely E E H M L L
Rare E H H M L L