Chap 7 Security
Chap 7 Security
risk: the potential that a given threat will exploit vulnerabilities of an asset or
group of assets to cause loss or damage to the assets.
Threat Identification
• to identify threats or risks to assets asK
– who or what could cause it harm?
– how could this occur?
• threats are anything that hinders or prevents
an asset providing appropriate levels of the
key security services:
– confidentiality, integrity, availability,
accountability, authenticity and reliability
• assets may have multiple threats
Threat Identification
• depends on risk assessors experience
• uses variety of sources
– natural threat chance from insurance stats
– lists of potential threats in standards, IT security
surveys, info from governments
– tailored to organization’s environment
– and any vulnerabilities in its IT systems
Vulnerability Identification
• identify exploitable flaws or weaknesses in
organization’s IT systems or processes
• hence determine applicability and significance
of threat to organization
• need combination of threat and vulnerability
to create a risk to an asset
• again can use lists of potential vulnerabilities
in standards etc
Analyze Risks
• specify likelihood of occurrence of each identified
threat to asset given existing controls
– management, operational, technical processes and
procedures to reduce exposure of org to some risks
• specify consequence should threat occur
• hence derive overall risk rating for each threat
risk = probability threat occurs x cost to organization
• in practice very hard to determine exactly
• use qualitative not quantitative, ratings for each
• aim to order resulting risks in order to treat them
Risk Likelihood
Almost E E E E H H
Certain
Likely E E E H H M
Possible E E E H M L
Unlikely E E H M L L
Rare E H H M L L