Lesson 3 Information Security Risk
Lesson 3 Information Security Risk
Once the risk has been identified and assessed, managing the risk can be
done through one of four techniques:
Risk acceptance: risks not avoided or transferred are retained by the
organization. E.g. sometimes the cost of insurance is greater than the
potential loss. Sometimes the loss is improbable, though catastrophic.
Risk avoidance: not performing an activity that would incur risk.
E.g. disallow remote login.
Risk mitigation: taking actions to reduce the losses due to a risk; many
technical countermeasures fall into this category.
Risk transfer: shift the risk to someone else. E.g.most insurance contracts,
home security systems.
Risk Management
E.g., buying insurance is risk transfer for you, not for the insurance company.
For the insurance company, it’s risk acceptance. But they may require you to
take measures to avoid or mitigate their risk.
There is often a confusion about the difference between risk avoidance and
risk mitigation.
Risk avoidance is about preventing the risk from being actualized. E.g., not
parking in a high crime area.
Risk mitigation is about limiting the damage should the risk be actualized.
E.g., having a LoJack or cheap car stereo.
Note the risk in this case is that your car will be broken into.
Terms:Trust and Assurance
Trust is a generic term that implies a mechanism in place to provide a basis
for confidence in the reliability/security of the system. Failure of the
mechanism may destroy the basis for trust.
Trust mechanisms are the security features of a system that provide
enforcement of a security policy.
The trusted computing base (TCB) is a collection of all the trust mechanisms
of a computer system which collectively enforce the policy.
Assurance is a measure of confidence that the security features, practices,
procedures, and architecture of a system accurately mediates and enforces
the security policy.
Trust Management