1. Sec and Risk Management / 2. Assets Flashcards
military classification
unclassidied, confidential, secret, top secret
commercial classification
public, sensitive, confidential/private
policy components
procedures, guidelines, baselines, standards, policies
STRIDE
threat categorization scheme focused on application threats
spoofing tampering repudiation information disclosure DoS elevation of privileges
DREAD
threat rating system used for threat priorization
damage potential reproducibility exploitability affected users discoverability
security management planning
strategic: long-term goals, missions
tactical: midterm, how to accomplish goals?
operational: short-term, highly detailed
quantitative risk analysis
Assign Asset Value AV
Calculate Exposure Factor EF
Calculate Single Loss Expectancy SLE=AVEF
Assess annualized rate of occurance ARO
Derive annualized loss expectancy ALE=SLEARO
Perform cost/benefit analysis of countermeasures (ALE1-ALE2-ACS) (annual cost of safeguard)
qualitative risk analysis
brainstorming. delphi, surveys, checklists, interviews, meetings
delphi technique
anonymous feedback-and-response process to reach an anonymous consensus. Gives honest an uninfluenced responses. repeatet until consensus is found
risk assignment
assigning or transferring risk
insurance or outsourcing (SLA)
risk acceptance
management has agreed to accept the consequences because of negative cost/benefit analysis of possible safeguards
risk
threatsvulnerabilitiesasses value= total risk (combination)
residual risk
total risk-controls gap = residual risk
types of controls I
technical: hardware, software
administrative: policies, procedures
physical
types of controls II
deterrent: appeals to human decision not to….
preventive: blocks the action
detective: discovers after occurence
corrective: corrects problems (reboot, restore)
recovery: advanced correction: imaging, clustering…
directive: direct control of actions to force compliance (escape route signs, posted notifications)
risk framework management
RFM
- categorize
- select
- implement
- assess
- authorize
- monitor
BCP steps
- project scope, planning
- business impact analysis
- continuity planning
- approva, implementation
BCP step 1
project scope and planning
- business organization analysis builds foundation for BCP team selection
- BCP team selection (representatives from each operational and support departments
- face legal and regulatory requirements (due diligence, regulations, obligations to clients)
- resource requirements (personal, time)
BCP step 2
business impact analysis BIA
- identify priorities (threats and their relevance, MTD, MTO Maximum Tolerable Outage, RTO Recovery Time Objectve)
- risk identification
- likelihood assessment (ARO)
- impact assessment (EF, SLE, ALE)
- ressource priorization (to identified risks)
BCP step 3
continuity planning
- strategy development ( which risks will be adressed? in accordance to priorization from step 2 and MTD)
- provisions and processes (people first!)
BCP step 4
approval and implementation
- approval by senior management
- training, education
- BCP documentation (written record for everyone affected
What is included in BCP documentation?
goals, statement of importance, statement of priorities and responsibility, risk acceptance/mitigation, emergency response guidelines, maintenance testing)
law
common law:
criminal: murder, robbery
civil: business
administrative: government agencies
copyright
books, poems, songs
70 years after death
work for hire:
95 years after date of publication
120 years after date of creation
trademarks
names, slogans, logos
TM without registration
R after registration