Podcast
Questions and Answers
When determining security requirements during the risk assessment process, what key question helps to define the scope of protection?
When determining security requirements during the risk assessment process, what key question helps to define the scope of protection?
- What assets do we need to protect? (correct)
- What is the cost of implementing security controls?
- Who is responsible for managing security incidents?
- Which compliance regulations apply to our organization?
What is the primary goal of IT security management in the context of risk assessment?
What is the primary goal of IT security management in the context of risk assessment?
- To determine security objectives and risk profile. (correct)
- To maximize system performance.
- To minimize user inconvenience.
- To ensure compliance with industry standards.
In risk management terminology, what specifically does a 'threat' represent?
In risk management terminology, what specifically does a 'threat' represent?
- The effectiveness of existing security controls.
- The value of an asset to the organization.
- A potential cause of an unwanted incident resulting in harm. (correct)
- A weakness in an asset that could be exploited.
What distinguishes a 'vulnerability' from a 'threat' in the context of risk assessment?
What distinguishes a 'vulnerability' from a 'threat' in the context of risk assessment?
How does the concept of 'risk' relate to threats and vulnerabilities?
How does the concept of 'risk' relate to threats and vulnerabilities?
When identifying assets during a risk assessment, what characteristic defines something as an asset?
When identifying assets during a risk assessment, what characteristic defines something as an asset?
Why is it important to draw on expertise from various areas of an organization when identifying key assets?
Why is it important to draw on expertise from various areas of an organization when identifying key assets?
Which of the following factors should be considered when evaluating the potential for human attackers as a threat source?
Which of the following factors should be considered when evaluating the potential for human attackers as a threat source?
What encompasses 'threats' in the context of assets and security services?
What encompasses 'threats' in the context of assets and security services?
What two elements are required to create a risk to an asset?
What two elements are required to create a risk to an asset?
When analyzing risks, what is the purpose of specifying the likelihood of occurrence for each identified threat?
When analyzing risks, what is the purpose of specifying the likelihood of occurrence for each identified threat?
While determining the impact of a threat, what is the aim of sorting resulting risks?
While determining the impact of a threat, what is the aim of sorting resulting risks?
How would you classify a threat that 'could occur at some time but is not expected given current controls, circumstances, and recent events'?
How would you classify a threat that 'could occur at some time but is not expected given current controls, circumstances, and recent events'?
If a security breach results in an impact that is likely to last less than a week and can be dealt with at the project level without management intervention, how is it classified?
If a security breach results in an impact that is likely to last less than a week and can be dealt with at the project level without management intervention, how is it classified?
In the context of risk management, what characterizes a risk classified as 'Extreme (E)'?
In the context of risk management, what characterizes a risk classified as 'Extreme (E)'?
According to the risk management use case, what existing control is in place for the 'Internet Router' asset?
According to the risk management use case, what existing control is in place for the 'Internet Router' asset?
What is the primary concept behind 'risk treatment' in risk management?
What is the primary concept behind 'risk treatment' in risk management?
When pursuing risk treatment, what does 'risk acceptance' typically imply?
When pursuing risk treatment, what does 'risk acceptance' typically imply?
If an organization decides to stop offering a particular online service due to the high risk of data breaches, which risk treatment alternative are they employing?
If an organization decides to stop offering a particular online service due to the high risk of data breaches, which risk treatment alternative are they employing?
What is exemplified by creating an offsite backup of critical data?
What is exemplified by creating an offsite backup of critical data?
Flashcards
Asset
Asset
Anything that has value to the organization.
Threat
Threat
A potential cause of an unwanted incident resulting in harm.
Vulnerability
Vulnerability
A weakness in an asset that can be exploited by a threat.
Risk
Risk
Signup and view all the flashcards
Natural Threats
Natural Threats
Signup and view all the flashcards
Man-Made Threats
Man-Made Threats
Signup and view all the flashcards
Key Security Services
Key Security Services
Signup and view all the flashcards
Risk Acceptance
Risk Acceptance
Signup and view all the flashcards
Analyze Risks
Analyze Risks
Signup and view all the flashcards
Risk Transfer
Risk Transfer
Signup and view all the flashcards
Reduce Consequence
Reduce Consequence
Signup and view all the flashcards
Reduce Likelihood
Reduce Likelihood
Signup and view all the flashcards
Study Notes
- Security requirements means organizations must ask themselves what assets need protection, how assets are threatened, and what actions can counter those threats.
- IT security management is determining security objectives and risk profiles, performing security risk assessments of assets, and selecting, implementing, and monitoring controls to mitigate risks.
- Assets are anything that holds value for an organization.
- Threats are potential causes of unwanted incidents that may harm a system or organization.
- Vulnerability is a weakness in an asset or group of assets exploitable by a threat.
- Risk is the potential of a given threat exploiting vulnerabilities of an asset group, causing loss or damage.
- Asset identification includes anything that needs protection, value to the organization's objectives, and can be tangible or intangible.
- Expertise from relevant areas should be drawn for identifying key assets.
- Identifying and interviewing personnel as well as referring to checklists in standards are good options.
- Threats can be natural occurrences or man-made from accidental mistakes to deliberate actions.
- Human attackers warrant consideration looking at motivation, capability, resources, probability of attack, and deterrence.
- Previous history of attacks should be considered.
- Identifying threats and risks to assets involve identifying potential causes of harm and how those events can occur.
- Threats hinder or prevent assets from providing appropriate levels of security services, like confidentiality, integrity, availability, accountability, authenticity, and reliability.
- Vulnerability identification identifies exploitable flaws or weaknesses in IT systems/processes, determining the applicability and significance of the threat.
- Risk creation is achieved by combining threats and vulnerabilities.
- Risk analysis specifies the likelihood of occurrence for each threat to an asset, considering existing controls.
- Management, operational, and technical processes all work to reduce exposure for organization to some risks.
- Consequence specification derives an overall risk rating for each threat, calculating risk as the probability of a threat occurring multiplied by the cost to the organization.
- Qualitative ratings rather than quantitative ratings are used, ultimately sorting resulting risks for treatment.
- Risk ratings are determined through likelihood assessment.
- Rare likelihood: events may occur only in exceptional circumstances and "unlucky’ circumstances.
- Unlikely likelihood: events could occur but are not expected with the current controls, circumstances, and recent events.
- Possible likelihood: an event might occur but just as likely as not, and is difficult to control due to external influences.
- Likely likelihood: events will probably occur and should not be surprising if they occur.
- Aimost certain likelihood: events are expected to occur in most circumstances or sooner.
- Determining consequence involves an assessment of impact for security breaches.
- Insignificant consequence: occurs as a result of a minor security breach in a single area; impacts are likely to last less than several days and requires only minor expenditure to rectify
- Minor consequence: a security breach in one or two areas; impact is likely to last less than a week, but can be dealt with at segment of project level without management intervention
- Moderate consequence: limited systematic (and possibly ongoing) security breaches with impact last for up to two weeks. It generally requires management intervention and have ongoing compliance costs
- Major consequence: ongoing systemic security breach. Impact will likely last 4-8 weeks and requires significant management, resources for compliance costs.
- Catastrophic consequence: major systemic security breach. Impact generally lasts for three months or more, requiring senior management intervention and compliance costs
- Doomsday: there are multiple instances of major security breaches. The impact cannot be determined and requires senior management to place the company under voluntary administation or other major restructuring.
- Determining Resultant Risk
- Consequences of risk can be categorized based on likelihood levels with impact rating of extreme needing detailed research and planning with regular reviews at executive/director level.
- High-level risks require management attention, but planning can be left to senior project/team leaders.
- Medium-level risks are capable of being managed with specific monitoring and response procedures, whereas low-level risks can be handled through routine procedures.
- Risk treatment and unavoidable expenses.
- High level: Forego all effort at reducing risk and accept losses
- Low level: Spare no expense to mitigate all possible risks regardless of their likelihood
- Tradeoff between combining the cost of losses and the effort expended to avoid the losses.
Risks Treatment Alternatives
- Risk acceptance involves acknowledging the risks.
- Risk avoidance involves avoiding the activity that leads to risk.
- Risk transfer involves insurance or outsourcing.
- Reduce consequence involves modifying uses of an asset to reduce risk impact.
- Reduce likelihood involves implementing suitable controls.
Risk Analysis Process
- Step 1: System Characterization
- System Boundary
- System Functions
- System and Data Criticality and Sensititivy
- Step 2: Threat Identification
- Threat Statement
- Step 3: Vulnerability Identification
- List of Potential Vulnerabilities
- Step 4: Control Analysis
- List of Current and Planned Controls
- Step 5: Likelihood Determination
- Likelihood Rating
- Step 6: Impact Analysis
- Impact Rating
- Step 7: Risk Determination
- Risks and Associated Risk Levels
- Step 8: Control Recommendations
- Recommended Controls
- Step 9: Resutls Documentation
- Risk Assesment Report
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.