5.3 Explain risk management processes and concepts. Flashcards

1
Q

Threat Assessment

A

Threat assessment is actually part of risk assessment, where you identify the different threats to an asset. As mentioned, you will have many different threats for a single asset, and part of risk assessment is to prioritize those threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Assessment - Environmental

A

An environmental threat results from the environment, or location, in which your business operates. Environmental threats include, among others, floods, tsunamis, earthquakes, volcanic eruptions, tornados, blizzards, lightning storms, and hurricanes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Assessment - Manmade

A

A manmade threat is a threat that does not exist naturally but is a result of human actions, whether intentional or unintentional. Examples of manmade threats would be a virus, fire, theft, vandalism, or sabotage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Assessment - Internal vs. External

A

It is important to note that threats can be either internal or external. An internal threat comes from someone inside the organization. This could be a threat such as a disgruntled employee intentionally deleting customer data, or an employee accidentally deleting a file. You need to protect from both types of threats. An external threat comes from outside the organization and could be, for example, someone on the Internet trying to hack into your mail server or your web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risk Assessment

A

A risk assessment is a popular type of assessment used by many aspects of security such as business continuity planning. Risk assessment is also known as risk analysis and deals with identifying the risks to assets within the organization and then finding solutions to minimize those risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risk Assessment - SLE

A

Single loss expectancy (SLE), which is a dollar figure representing how much money the company will lose each time the threat occurs. The following is the formula for single loss expectancy:

SLE = Asset Value ($) × EF (%)

For example, let’s say that you decide the e-commerce web site has a value of $200,000, and each time the web server has a hard drive failure, you lose 8 percent of the asset value. This means that your single loss expectancy is $200,000 × .08, which is $16,000. Therefore, every time the hard drive fails in the server, your business loses $16,000!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Assessment - ALE

A

Once you have calculated the single loss expectancy, you can work on calculating the annual loss expectancy (ALE), which is a calculation of how much money you will lose per year with each of the threats. The formula to calculate the annual loss expectancy is to take the single loss expectancy and multiply it by the annual rate of occurrence (ARO). The annual rate of occurrence is how many times a year you expect the threat to occur.

ALE = SLE × ARO

For example, you may expect a threat to occur three times a year or to occur once every five years. The following example calculates the ALE for our hard drive failure threat if it were to occur three times a year:

ALE = $16,000 × 3

This means that the ALE based on the hard drive failing three times a year would cost the company $48,000. You need to make sure that the solution you implement to protect from hard drive failure does not cost more than $48,000 a year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Risk Assessment - ARO

A

The annual rate of occurrence is how many times a year you expect the threat to occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk Assessment - Asset Value

Bonus: Exposure Factor (EF)

A

The asset value identifies the worth of the asset to the organization. It can be a specific monetary value or subjective value, such as Low, Medium, and High. The asset value helps an organization focus on the high-value assets and avoid wasting time on low-value assets.

One of the ways to assess the value of the asset is to determine, e.g, that your e-commerce web site brings in
thousands of dollars a day of revenue—this will help you calculate the value of the asset.

Once you know the value of the asset, you then must determine the impact that each threat to the asset would have. With quantitative analysis, the impact is specified as an exposure factor (EF)—which is the percentage of the asset’s value you expect to lose if the threat occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk Assessment - Risk Register

A

A risk register is a tool that is used to plot description of the different threats, along with their impact and probability. The tool could be something as simple as a spreadsheet listing the details of the risk along with the impact and probability, or it could be a third-party software application. The risk register typically plots the category the risk applies to, a description of the threat, the impact (maybe a number from 1 to 5), the probability (again, maybe a number from 1 to 5), the risk score (impact multiplied by probability), and the mitigation steps. The risk score helps you prioritize the threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk Assessment - Likelihood of Occurrence

A

Once you have identified all of the threats that could occur against each asset, you must prioritize the threats based on their impact and probability of occurring (also known as the likelihood of occurrence) so that you can deal with the more serious threats first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk Assessment - Supply Chain Assessment

A

Supply chain encompasses the resources and processes that are needed to get a company’s product or service from its parts suppliers, through manufacturing, to its customer’s doorstep. Numerous components are involved in the supply chain, from obtaining the raw materials, to the manufacturing process, to the personnel to package and deliver the product. Supply chain assessment involves identifying any risks within this supply chain and mitigating those risks. For example, the assessment might evaluate what to do if there is a shortage of raw materials or if there is a fire at the manufacturing plant. All such threats could present a risk to your business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk Assessment - Impact

A

The goal of impact analysis is to identify what the result of the threat occurring would be on the business. For example, if the company’s e-commerce web site has a denial of service attack performed against it, then the impact is that the server could be down for days, resulting in lost revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk Assessment - Quantitative

A

Quantitative is associating a cost in dollars and cents with each risk. With quantitative analysis, the resulting cost of the threat helps determine how much you should invest in a security solution to protect the asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Risk Assessment - Qualitative

A

Qualitative is assigning a value based on a scale to the threat and not worrying about calculating the dollar figure associated with the risk

Qualitative risk analysis has the benefit of being a very quick assessment type because you are not bogged down with figuring out financial figures—you are simply applying values based on a scale you create.

The formula is that risk is equal to the probability multiplied by the loss (also known as the impact):

Risk = Probability × Loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Risk Assessment - Testing

A

When assessing threats against your organization’s assets, it is important to perform different types of tests

17
Q

Risk Assessment - Testing - Penetration Testing Authorization

A

You could perform a more active type of test known as penetration testing, where the tester tries to bypass security controls and gain access to a system.

18
Q

Risk Assessment - Testing - Vulnerability Testing Authorization

A

You could perform a vulnerability test, also known as a vulnerability scan, to test whether your systems are vulnerable to different exploits and weaknesses.

19
Q

Risk Assessment - Risk Response Techniques

A

Once you have identified all of the threats against the assets and have determined the critical threats either through qualitative analysis or quantitative analysis, you next need to decide what your risk response technique will be. This is also known as the risk mitigation strategy.

20
Q

Risk Assessment - Risk Response Techniques - Accept

A

Accept the risk (acceptance)
Another way to handle the risk is to accept it. Accepting the risk means that you do not implement any solution to protect against the threat because you are satisfied that the chances of the threat occurring and the impact of the threat do not warrant the cost of implementing a security control.

21
Q

Risk Assessment - Risk Response Techniques - Transfer

A

Transfer the risk (transference)
You can also look at transferring the risk, which means you make the threat somebody else’s problem! For example, you may get the insurance that helps you recover from the security incident.

22
Q

Risk Assessment - Risk Response Techniques - Avoid

A

Avoid the risk (risk avoidance)
Risk avoidance is the idea that whatever the activity is that puts you at risk, you decide not to perform that activity anymore in order to avoid the risk.

For example, having an e-commerce web site to earn revenue puts you at risk of attack from sources on the Internet—you can avoid this by not selling products online (but you also lose the revenue).

23
Q

Risk Assessment - Risk Response Techniques - Mitigate

A

Mitigate the risk (mitigation)
The first way to deal with the risk is by mitigating it. Mitigation involves implementing a security control that protects the asset from the threat. For example, to protect against hard drive failure on the web server, you could purchase a RAID solution.

24
Q

(Bonus) Risk Assessment - Risk Response Techniques - Deter

A

Deter the risk (deterrence)
Not as common an approach to dealing with risk is to deter the risk. An example of deterring a risk is to threaten punishment (typically legal punishment) to anyone who attacks the asset—you are deterring the event from occurring.

25
Q

Change Management

A

After testing your systems with either a vulnerability scan or a penetration test, you may discover that you need to make changes to the configuration of the systems in order to make them more secure. When making changes to the system configuration, be sure to follow the change management process that your organization has set out. This process typically involves applying the change to test systems first, then backing up the production system before making the change, applying the change, and then verifying the proper operation of the system after the change.

The key to change management is documentation. For example, when planning for changes, you should document the desired changes, document what to do if the changes do not go as planned (this is called the rollback plan), and then summarize the results of the change operation.