04. Risk Assessment Analysis Flashcards
Risk Assessment
A process intended to discover and identify threats that, if realised, could resul tin some unwanted event or incident
Risk Assessment
144
Risk Assessment
2 principle portions of risk assessment
- Vulnerability identification
- Threat identification
145
Threat Identification
Defined as an event that, if realised, would bring harm to an asset and the organisation
Threat
- A threat is not a vulnerability, it is the actual action that would cause harm
- A threat actor is the person carrying out the action
- A threat is not an actual weakness, this is the vulnerability
145
Threat identification
Threats are typically classied in 3 ways
- Internal or external
- Intentional or unintentional
- Human-made or natural
145
Internal Threats
A wide range of events can take place that constitute internal threats
Well-Meaning Personnell making errors…:
1. In judgement
2. In haste
3. Because of insufficient knowledge or training
A disgruntled personnel…:
1. Being purposfully negligent
2. Bringing harm to an asset
Also..:
1. Threat actor acting on behalf of a forgien party posing as an internal employee
2. A trusted individual in a trusted third party doing any of the above
External Threats
Threats that originate outside of the organisation can unclude both deliberate and accidental actions. Threats can be…
Human made or associated with naturally occurring events
148
Advanced Persistent Threats
The advanced persistent threat…
- Pursues its objectives repeatedly over an extended period of time
- Adapts to defenders efforst to resist it
- Is determined to maintain the levl of interaction needed to execute its objectives
149
Emerging Threats
Emerging threats will always represents the..
cutting edge of attack techniques and will be difficult to detect
150
Emerging Threats
Security managers need to understand that attack techniques will..
Continuously improve their ability to evade detection
150
Risk Identification
Several considerations are applied in th identification of each risk…
- Threats
- Threat actors
- Vulnerabilities
- Asset Value
- Impact
151
Risk Identification
Impact is considered separately from…
Asset Value
Some threat scenarios have minimal correlation with asset value but relate instead to reputation damage
151
Risk Likelihood and IMpact
Risk = Threats x Vulnerabilities
Risk = Threats x Vulnerabilities x Asset Value
Risk = Threats x Vulnerabilities x Probabilities
151
Likelihood
Likelihood of a serious security incident has less to do with the technical details and more to do with the…
thought process of an adversary
152
Likelihood
Considerations related to risk likelihood include..
- Hygiene
- Visibility
- Velocity
- Motivation
- Skill
- Organisations that do a poor job in areas such as vulnerability management or patching are likely to suffer incidents more than an organisation that does a good job
- How visibility the organisation is within the public eye, its standing
- Relates to timing of threat scenarios - is there any warning or foreknowledge
- Understand the drivers that motivate an adversary to attack an organisation
- If higher skills are required, this doesnt mean an attack is less likely, but the scope of who and why i.e. motivation, comes into play.
152
Impact
The actual or expected result of some action, such as a threat or disaster, being realised
Impact
152
Impact
If a risk manager fails to understand the impact of different scenarios, they are unable to determine..
the level of importance and urgency for risk mitigation from one threat to another
152
Impact
Used to identify the most critical business processes, together with their supporting IT systems and dependencies
Business Impact Analysis
(BIA)
153