Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

Museum Presentation Intermuseum Conservation Association.
Donald Hester February 9, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 1: IT Risk.
OCTAVESM Process 4 Create Threat Profiles
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 By the name of the god Risk management Dr. Lo ’ ai Tawalbeh DONE BY: AMNA ISMAIL RASHAN.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Weakness is a better teacher than strength.
Information Systems Security Information Security & Risk Management.
Introducing Computer and Network Security
Dipartimento di Scienze - 19 giugno Pamela Peretti Dottorato di ricerca in Scienze XXI° ciclo scrutinio annuale a.a 2007/2008 Dipartimento di Scienze.
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
Stephen S. Yau CSE , Fall Risk Management.
Lecture 8: Risk Management Controlling Risk
Controlling Risk Welcome to IST-456 Topic 9 – Controlling Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Risk Management Paula Kiernan Ward Solutions.
1 Security Risk Management Liping Cai 02/01/2006.
SEC835 Database and Web application security Information Security Architecture.
PRM 702 Project Risk Management Lecture #28
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
TEL2813/IS2820 Security Management
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
Conostix S.A. Sensible defence.
Security Risk Assessment Applied Risk Management July 2002.
Risk Management and Risk Control
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Information Systems Risk Management
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Security Risk Management
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 32 Risk Management (Cont’d)
SEC’s Cybersecurity Risk Alert Part 2 of 3 How-To: Assessing Cybersecurity Risk Thomas J. DeMayo, CISSP, CIPP, CEH, CPT, MCSE Director, IT Audit and Consulting.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Chapter 11: Project Risk Management
Risk Management: Controlling Risk
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
MANAGEMENT of INFORMATION SECURITY Second Edition.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
Lesson 20-Risk Management. Background  Risk management can be described as a decision-making process.  Effective risk management avoids costly oversights.
Introduction to Information Security
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Certified Protection Officer Program. Chapter 1 Unit 1 Concepts and Theories of Asset Protection Pages 3-11.
Principles of Computer Security, Fourth Edition Copyright © 2016 by McGraw-Hill Education. All rights reserved. Risk Management Chapter 20.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
Chapter 2: Personnel Security and Risk Management Concepts
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
CST 481/598 Many thanks to Jeni Li.  Risk matrix or cube  Cost effectiveness analysis  Annualized Loss Expectancy  Multi-Attribute Risk Assessment.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part II.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
S7-1 © 2001 Carnegie Mellon University OCTAVE SM Process 7 Conduct Risk Analysis Software Engineering Institute Carnegie Mellon University Pittsburgh,
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 9 R ISK M ANAGEMENT : C ONTROLLING R ISK Weakness is a better teacher than strength. Weakness.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Identifying and Assessing Risk
Risk Management.
TOPIC 3 RISK MANAGEMENT.
Security Management Practices
Business Impact Analysis 101
Cybersecurity Threat Assessment
HIPAA Security Risk Assessment (SRA)
Presentation transcript:

Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100

Risk Management Information risk management (IRM) is the process of identifying and assessing risk, reducing it to an acceptable level, and implementing the right mechanisms to maintain that level. There is no such thing as a 100% secure environment.

Types of Risk Page 71 Physical damage Human interaction Equipment malfunction Inside and outside attacks Misuse of data Loss of data Application error

Understanding Risk Management Businesses operate to make money Risks threaten the bottom line There is a finite amount of money to address an almost infinite number of vulnerabilities

Risk Management Team Goal – ensure the company is protected in the most cost-effective manner Page 73 Includes individuals from many or all departments to ensure all threats are identified and addressed

Risk Assessment Method of identifying vulnerabilities and threats and assessing the impact to determine whether to implement security controls. Table 2-5 on page 78

Risk Analysis Cost/benefit Integrate security program with company’s business objectives Must be supported and directed by senior management to be successful

Risk Analysis 1.What events could occur (threats) 2.What could be the potential impact (risk) 3.How often could this happen (frequency) 4.What is the level of confidence do we have in the answers of the first three questions (certainty)

Value of an Asset Cost to repair or replace Loss of productivity Value of data that can be corrupted Value to an adversary Liability, civil suits, loss of market share Assets can be tangible or intangible (reputation, intellectual property)

Use of Value of an Asset Perform cost/benefit calculations Specify countermeasures and safeguards Determine level of insurance to purchase

Risk Probability of a threat agent exploiting a vulnerability to cause harm to an asset and the resulting business impact.

Risk Assessment Methodologies Identify Vulnerabilities, associate threats, calculate risk values NIST SP FRAP OCTAVE

NIST SP U.S Federal Government Standard Figure 2-9 on page 80

FRAP Facilitated Risk Analysis Process Data is gathered and threats to business operations are prioritized based on their criticality. Documents controls that need to put in place to reduce identified risk

OCTAVE Carnegie Mellon University Software Engineering Institute People inside the organization manage and direct the risk evaluation

Risk Analysis Approaches Quantitative – Assigning a numeric value Qualitative – Red, Yellow, Green

Quantitative SLE – Single loss expectancy EF – Exposure Factor (percentage of loss on an asset) SLE = Asset Value * EF SLE =$150,000*25% = $37,500

Quantitative ARO – annual rate of occurrence (0 to 1 or more, 0.1 = once in ten years) ALE – Annual loss expectancy ALE = SLE * ARO ALE = $37,500 * 0.1 = $3,750 See Table on page 88

Qualitative Page 90 Figure 2-11 Page 90 Table 2-8

Delphi Technique Each member give anonymous opinion of a threat Results are compiled and distributed to members Members comment anonymously Result are compiled and distributed to members Process continues until there is a consensus

Cost/Benefit of Safeguard Value of Safeguard to the company = ALE (before safeguard) – ALE (after safeguard) – annual cost of safeguard Example page 93 Value = $12,000 - $3,000 - $650 = $8,350

Cost of Countermeasure Page 93 Page 94 – cost of IDS

Residual Risk Conceptual formulas Threats*vulnerability*asset value = total risk Total risk * control gaps = residual risk Total risk – countermeasures = residual risk

Handling Risk Transfer risk – Insurance Avoid risk – Don’t do it Mitigate risk – Reduce by controls Accept risk – Live with it. Cost of controls exceed benefits

Key Terms Pages 98-99

Outsourcing Cloud Software creation Reducing the risk – Page 100