Risk Assessment
Risk Assessment
evaluate potential risks that could compromise a system's security. The goal is
to prioritise these risks based on their potential impact, then establish
measures to manage or mitigate them.
Types of Cyber security Risk Assessments
1. Risk Assessment: This is the broadest type of cyber security risk
assessment. It involves identifying, quantifying, and prioritising the risks
associated with an organisation's digital infrastructure. The process
considers various factors such as the likelihood of a risk occurring, its
potential impact, and the effectiveness of the current security measures.
2. Vulnerability Assessment: This type of assessment focuses on
identifying weaknesses in a system that could be exploited by a potential
attacker. Vulnerability assessments are typically automated, using
software tools to scan systems and networks for known vulnerabilities.
They offer a snapshot of the potential holes in your security at a given
moment.
3. Penetration Testing: Also known as ethical hacking, penetration
testing is a proactive approach to finding security vulnerabilities. In this
method, a cyber security expert, akin to a hacker, attempts to breach a
system’s security using the same techniques as cybercriminals. This
hands-on approach provides a real-world view of your system's
vulnerabilities and how they might be exploited.
4. Red Teaming: Red teaming is an advanced type of penetration testing. A
red team is a group of cyber security experts who simulate full-scale
cyber-attacks on an organisation's network to test its security measures.
This exercise is comprehensive and mimics real-world attacks as closely
as possible, providing a rigorous test of an organisation's cyber security
readiness.
5. Security Audits: A security audit is a systematic, measurable technical
assessment of a system or application. Security audits compare the
current security measures against a set of standards to determine if they
are up to par. The result is a detailed report outlining compliance and
any necessary changes.
6. Compliance Assessment: This assessment measures an organisation's
adherence to a given set of security standards or regulations. It is crucial
for organisations that handle sensitive data like financial information or
personal health data, which are governed by strict compliance
regulations like GDPR, PCI DSS, or DORA.
Cyber security frameworks are sets of documents describing guidelines,
standards, and best practices designed for cyber security risk management.
The frameworks exist to reduce an organization's exposure to weaknesses and
vulnerabilities that hackers and other cyber criminals may exploit.
Risk frameworks focus on identifying, assessing, and managing potential risks
and vulnerabilities within an organization. They help prioritize resources and
efforts based on the likelihood and impact of potential threats. Risk
frameworks are essential because they promote a proactive approach to
security, allowing organizations to stay ahead of emerging threats and adjust
their defences accordingly.
1. ISO 27001 – The leading international standard for protecting and managing
information security within an organization. This framework includes a
combination of policies and procedures which revolve around three objectives;
1. confidentiality (only authorized entities are granted access to sensitive
information), 2. integrity (only enabling authorized users to modify sensitive
information) and 3. availability (sensitive information is accessible to
authorized entities only)
4. HIPAA – The Health Insurance Portability and Accountability Act was created
to protect patient’s personal information in the United States. Organizations
that are compliant with HIPAA agree to safeguard PHI from unwarranted
disclosure and give patients rights to access their documentation
Risk is
The likelihood that the threats to an asset will result in an adverse impact
Multiplied by
The consequences (or level of impact) on the value of an asset as a results of
a successful attack.
Less
The percentage of risk mitigated by current controls
Plus
The degree of uncertainty of current knowledge of the threat/asset
environment
.
Likelihood is the overall rating—a numerical value on a defined scale—of the
probability that a
specific vulnerability will be exploited. NIST’s “Special Publication 800-30
Rev. 1, Guide for
Conducting Risk Assessments,” recommends that vulnerabilities be assigned a
likelihood rating
between 0.1 (low) and 1.0 (high). For example, the likelihood of an employee
or system being
struck by a meteorite while indoors would be rated 0.1, while the likelihood of
receiving at least
one e-mail that contains a virus or worm in the next year would be rated 1.0.
You could also
choose to use a number between 1 and 100, but not 0, because vulnerabilities
with a 0 likelihood
should have already been removed from the asset/vulnerability list. Whatever
rating system you
employ for assigning likelihood, use professionalism, experience, and judgment
to determine the
rating—and use it consistently.
Human-Centric Vulnerabilities:
Other Signs:
1. Frequent malware infections:
Repeated malware infections can
indicate a larger security issue.
2. Unexplained system changes:
Unexplained changes to system
configurations or files.
3. Suspicious network activity: Unusual
network traffic patterns or
unauthorized access attempts.
4. Reports from customers or partners:
Complaints or warnings from
customers or partners about potential
security issues.
What to do:
3. Malware risk
4. Phishing risk
5. Ransomware risk
Firewalls
Anti-virus
Penetration testing
Staff Training