1 CH3 Formulating Risk Exposure CLO3 STD
1 CH3 Formulating Risk Exposure CLO3 STD
1
Learning Objectives
Upon completion of this material, you should be able to:
Find risk and break down risk to its components
Envision the consequences of risk
Explain who or what the threat is?
Discuss qualitative risk measures
Discuss quantitative risk measures
2
Introduction
A risk assessment needs to have more elements than just a
list of all the worst-case scenarios that you can imagine.
Your job as a Risk Analyst is to educate the organization
about the top risk exposures and help them to set priorities.
Therefore, you must break risk into its individual components
and accurately assess the level of risk exposure.
3
Risk Components
We will start by defining some terms to describe the key
components of a risk, and then we will use these terms as we
analyze some simple risk scenarios. The end goal is a model
that will accurately articulate, categorize, and rate risk
exposure.
Consider this assessment finding:
“Network administrators use Telnet to manage network
devices and their passwords never expire.”
4
Risk Components (cont.)
As a security manager identified this finding, how would you
break down this scenario into risk components?
What is described in the previous statement is certainly a
finding, but does it accurately describe the risk?
For example, you should be able to answer the following
questions from a well-written risk statement:
Who is the threat we are worried about?
Why is the vulnerability causing the exposure?
What is the potential impact on the organization?
5
Risk Components (cont.)
Think of the risk as a description of the consequences.
To break down the risk to its components, we need to define:
Sensitivity of the resource: importance or criticality to the
organization.
Threats, and threat countermeasures.
Vulnerabilities, and vulnerability countermeasures.
Inherent Risk: amount of risk that exists in absence of controls.
Compensating Controls: controls currently in place that
reduce the exploitability.
Residual Risk: remaining risk after implementing controls. 6
Risk Components (cont.)
In simple terms, an information security risk exposure should
describe the outcome of a successful exploit of the
vulnerability by the threat.
A simple way of remembering the differences between the risk
terminologies is that:
- Threat describes the “Who”
- Vulnerability explains the “Why”
- Risk represents the “What” consequences the business
will
experience.
7
Imagine The Consequences
Your risk description should answer:
What would the organization lose upon a successful exploit?
customer; money; reputation; etc.
Would the organization go out of business?
This is an extreme scenario
Can the organization recover from the breach?
How easy and how fast?
Would the organization need to inform customers?
Example: unauthorized disclosure of information occurred
8
How to Describe A Risk
As a result of <issue>, <consequence> may occur, which
would lead to/cause/require <effect>
Example 1:
As a result of a DDoS, a server shutdown may occur, which
would cause disruption in all intranet services
Example 2:
As a result of lost backup tapes, an unauthorized disclosure of
customer data may occur, which would require notification to
regulators and affected clients
9
Risk Formulating Example
Rewrite the following example into a correct risk description:
10
Threat Examples
External mass attacks (e.g. viruses)
External targeted attacks (e.g. Attackers)
Internal (e.g. disgruntled employee)
Accidental damage
Internal abuse
Infrastructure failure
Natural disaster
11
Threat vs Risk
Of the following, which do you think describe a threat source or
activity?
1. Disgruntled employee: Threat
2. Password cracking: Threat
3. Internet-facing router: an asset
4. Internet-facing server: vulnerability
5. Clear text passwords being sent over the Internet:
vulnerability
12
Activity (Threat, Vulnerability, Impact)
Which of these could be considered a threat source?
15
Simple Quantitative Risk Calculation
The following is a common calculation formula:
Annualized Loss Expectancy (ALE) = Single Loss
Expectancy (SLE) × Average Rate of Occurrence (ARO)
For example, if you expect to lose 9 laptops this year, and the
cost to replace one laptop is 1000 AED , then
ALE = 1000 × 9 = AED 9000
If you only lost one laptop every 3 years,
ALE = 1000 × (1/3) = AED 333.33 16
Simple Quantitative Risk Calculation (cont.)
Class activity 1: the ALE is estimated at AED 600 and the
cost to replace a laptop is 200. Find how many laptops lost
this year?
ALE = SLE x ARO 600 = 200 x ARO ARO = 600/200 = 3
18
Risk Variables
Severity
It is a measure of the degree of damage or how universal the
exploit is.
Example: A DDoS may result in a full loss of service availability.
Likelihood
The probability that a specific risk occurs. It includes the
probability of a successful exploit and the frequency of the exploit.
Sensitivity:
A measurement of the resource’s tolerance for risk exposures.
Example: Disruption of connectivity to the data center may result
in revenue loss of 1,000,000 per hour 19
Estimating Severity
Some questions that can help estimate severity:
1. What is the scope after exploitation (full, users,
departments, etc.)?
2. How much data will be disclosed?
3. Will the breach allow for modification/destruction or just
viewing of data?
4. Can the attacker execute any code or are they limited to
certain functionality?
20
Qualitative Severity Scale
Level Description
24
Qualitative Severity Example (cont.)
Example 3: The hosting company does not employ an
independent third-party audit function to evaluate their
information security program.
It doesn’t present a direct opportunity to compromise the
customer portal, nor will the absence of such a function
hinder the operations of the security team. The organization
may have a strong internal audit function. So, it is rated as
Low.
25
Qualitative Severity Example (cont.)
Example 4: Default administrator passwords are being
used on a system that is used to manage server
configuration.
The use of default administrator passwords may allow for full
administrator access to the management server and, likely,
privileged access to the servers that it manages. In most cases,
this would also include access to any sensitive data on the
servers. So, it is rated as Critical.
26
Qualitative Severity Example (cont.)
Example 5: The client support staff at the bank set up
customer accounts for portal access manually, and
human error sometimes results in data disclosures
between customers.
High The threat source highly motivated and very capable, and controls to
prevent the exploitation of the vulnerability are ineffective.
Very High Exposure is apparent through casual use or with publicly available
information, and the weakness is accessible publicly on the internet.
29
Estimating Likelihood
Some questions that can help estimate likelihood:
30
Qualitative Likelihood Example
A skilled attacker is planning to hack the information
system of HBL institution. The implemented controls are
strong to impede the successful exploitation of any
vulnerability. What likelihood scale you rate this case?
31
Defining Risk Sensitivity
Not all resources are created equal, meaning you may want
to patch your domain controllers before you patch the
workstation in the mail room. Thus, risk sensitivity comes
back into calculations.
There are two ways to include the sensitivity of the resource
in the qualitative assessment of risk exposure:
Sensitivity factors can either be included in the definition of
severity (difficult since we mix two independent conditions)
Mapping table can be expanded to include all three
variables. 32
Estimating Risk Exposure
33