Administering Security
Administering Security
02/15/20 7
25
Live Chat 5
2. Risk Analysis
Organization: Date:
Probability Impact
Threat Description High Medium Low High Medium Low
02/15/20 9
25
Live Chat 5
Risk Analysis
Assets: what are we trying to protect?
Threats and Vulnerabilities: potential harmful occurrences
(power loss, hackers, virus, earthquake).
Vulnerability: a weakness that allows a threat to cause harm.
Risk = Threat * Vulnerability.
Risk = Threat * Vulnerability * Impact($).
Risk Analysis Matrix
Consequences
EVENT: Insignifica Mino Modera Majo Catastrop
nt r te r hic
Almost H H E E E
Likelihood
Certain
Likely M H H E E
Possible L M H E E
Unlikely L L M H E
Rare L L M H H
E-Extreme
H-High
M-Medium
L-Low
Risk Choices
Identify assets
Determine vulnerabilities
Estimate likelihood of exploitation
Compute expected annual loss
Survey applicable controls and their costs
Project annual savings of control
Identify Assets
Hardware
Software
Data
People
Procedures (policies, training)
Documentation
Supplies
Infrastructure (building, power, water,
…)
Determine Vulnerabilities
Software
Data
People
procedures
Determine Vulnerabilities
Assessment is subjective
and time consuming.
Arguments Against Risk
Analysis
Immutability
Users
Owners
Beneficiaries
Balance Among All Parties
Contents
Purpose
Environmental
Electrical
Theft
Internal, external
Physical Security
Shredding: shred documents.
Overwrite magnetic media or shred
it.
Degaussing: use magnetic field to
destroy.
TEMPEST: protect against
electromagnetic signal emission.
Certify emission free
Enclose device or modify emanations.
Business Continuity Plan
(BCP)
Long Term Strategic
Business Oriented Plan
for Continued Operation.
BCP Goal
Ensure that business continues to operate before,
during and after a disaster
Ensure critical services can be delivered in the wake
of a disruption and after it is over.
Disaster Recovery Plan
02/15/20 33
25