Risk Management Process
Risk Management Process
Management
Lecture 1 of 2
• RISK?
• Risk is the net negative impact of a vulnerability/weakness.
RISK
• Risk is the potential of losing something of value
Risk
Risk Assessment
Risk Assessment
• Risk is the intersection of assets, threats, and
vulnerabilities
Risk =
Asset + Threat + Vulnerability
• The risk assessment methodology encompasses nine primary steps,
which are described below:
•
• • Step 1: System Characterization
• • Step 2: Threat Identification
• • Step 3: Vulnerability Identification
• • Step 4: Control Analysis
• • Step 5: Likelihood Determination
• • Step 6: Impact Analysis
• • Step 7: Risk Determination
• • Step 8: Control Recommendations
• • Step 9: Results Documentation
Identifying risk for an IT system requires a strong understanding of the system’s processing
environment. The person or persons who conduct the risk assessment must therefore first
collect system-related information, which is usually classified as follows:
• Hardware
• Software
• System interfaces (e.g., internal and external connectivity)
• Data and information
• Persons who support and use the IT system
• System and data criticality (e.g., the system’s value or importance to an organization)
• System and data sensitivity.
STEP 1: SYSTEM
CHARACTERIZATION
• Output from Step 1
STEP 2:
THREAT IDENTIFICATION
• Common Threat-Sources
• Natural Threats—Floods, earthquakes, tornadoes,
landslides, avalanches, electrical storms and other such
events.
• Human Threats—Events that are either enabled by or
caused by human beings, such as unintentional acts
(unintentional data entry) or deliberate actions (network
based attacks, malicious software upload, unauthorized
access to confidential information).
• Environmental Threats—Long-term power failure,
pollution, chemicals, liquid leakage.
STEP 2:
THREAT IDENTIFICATION
Human Threats: Threat-Source, Motivation, and Threat Actions
Terrorist Blackmail
Destruction
Exploitation
IDENTIFICATION
• Output from Step 2
• A list of threat-sources that could exploit system vulnerabilities
STEP 3:
VULNERABILITY IDENTIFICATION
Vulnerability/Threat Pairs
Vulnerability Threat-Source Threat Action
Terminated employees’ system Terminated employees Dialing into the company’s
identifiers (ID) are not removed from network and accessing
the system company proprietary data
Company firewall allows inbound Unauthorized users Using telnet to XYZ server
telnet, and guest ID is enabled on XYZ (e.g. hackers, and browsing system files
server terminated with the guest ID
employees, computer
criminals, terrorists)
Data center uses water sprinklers to Fire, negligent persons Water sprinklers being
suppress fire. turned on in the data center
STEP 3: VULNERABILITY
IDENTIFICATION
• Output from Step 3
• A list of the system vulnerabilities that could be exercised by the potential
threat-sources
STEP 3: VULNERABILITY
IDENTIFICATION
• The goal of this step is to analyze the controls that have
been implemented, or are planned for implementation, by
the organization to minimize or eliminate the likelihood (or
probability) of a threat.
STEP 5: LIKELIHOOD
DETERMINATION
Magnitude of Impact Definition
Impact
High Exercise of the vulnerability
(1) may result in the highly costly loss of major tangible assets or resources;
(2) may significantly violate, harm, or block an organization’s mission,
reputation, or interest;
(3) may result in human death or serious injury.
STEP 8: CONTROL
RECOMMENDATIONS
• Once the risk assessment has been completed (threat-
sources and vulnerabilities identified, risks assessed, and
recommended controls provided), the results should be
documented in an official report or briefing.
Risk Mitigation
• Risk mitigation methodology describes the approach to control
implementation