IA 2 - UNIT 2 Flashcards
different types of assets
- Tangible
- Intangible
Three Controls Assigning Responsibility
- Inventory
- Ownership
- Acceptable Use
Responsibilities of Assets
- provides adequate levels of security
- assigned to identified entities
- risk management and security responsibilities
- provides accountability for asset protection
Organization’s Assets
- Data / Information
- Hardware
- Intangible
- People
- Service
- Software
- Identify and record information about the
assets - Movements and changes are documented and updated
Inventory
- Assets have established owners
- Responsibility of security of assets
- Review of Classification and use authorisation
Ownership
- Develop policies and guidelines
- Similar categories covered under the same policy
- Disclosure and release of information are cited
Acceptable Use
Organising information by sensitivity and loss disclosure, modification and unavailability.
Classification and Handling
Two controls in place
- Classification Guidelines
- Information labeling and handling
- Organised by information needs and impact in case of breach
- Originator is responsible for classifying and protecting information based on policies and procedures
Classification Guidelines
Classification is based on value and impact
determines the level of
- confidentiality
- integrity
- availability
Classification Guidelines Considers
- Security classification
- Information assurance
- Information owners Business,
- Industry, and Legal requirements
- Organisation Culture
Classification Process
- Creation ->
- access control implementation ->
- method of process ->
- information disposal
- Organisations must develop information handling protocols based on the policy on classification
- This preserves information assets
Labeling and Handling
Risk Management Process
- Background Planning
- Asset Analysis
- Threat Analysis
- Vulnerability Analysis
- Risk Identification
- Risk Analysis
- Risk Treatment
Organisations must develop information handling protocols based on the policy on classification This preserves information assets
Labeling and Handling
Background Planning Critical Elements
- Establish the Aim, Scope and Boundary
- Establish the risk evaluation criteria
process of managing the risks involved in Information Technology systems. These include identifying, assessing, and acting on risks to data confidentiality or integrity.
Risk Management
- The measure or the extent of which an entity is threatened by circumstance or event
- The likelihood of a threat event occuring
Risks
Using the CIA Triad
- Confidentiality: What happens if people could see this?
- Integrity: What happens if people could change this?
- Accessibility: What happens if authorized users can’t use this?
- Analyze your assets based on their type (Hardware, Software, People, Services, Platforms)
- Determine their owner, the value and their impact to the organization using the CIA triad
Asset Analysis
conducted while referring to a database of known major threats.
threat analysis
Human threats are divided into three dimensions
- The Motive
- The Opportunity
- The Means
are typically weather-related phenomena.
Natural Threats
- Identify the vulnerabilities for which threat events.
- The goal is to identify flaws or weaknesses that the threat can exploit.
Vulnerability Analysis
- Risks should be identified as early as possible.
- A good practice is to brainstorm with the risk management team. If the team lacks the expertise, outside help should be brought in.
Risk Identification
- A qualitative approach to risk analysis using the “quadrants” method.
- Risk in the “Low” category may be ignored or lowered in priority
Risk Matrix
- Periodical Risk Assessment should be conducted. Risk reviews should occur when there are changes to the I.T. infrastructure.
- Organizations should develop “risk dashboards”. This ensures that the risks are monitored in accordance to their priority.
Monitoring Risks
identify what methods are in place to control the risk, and the strengths/weaknesses of the system.
Risk Analysis
Basing off of the risk assessment:
Avoid risk: If the activity causes risk, don’t do it.
Reduce Likelihood of Occurrence
Reduce the consequences
Transfer Risk: Insurances, partnerships, etc.
Accept Risk: Just let it happen.
Integration w/ Other Management Practices
- Budgeting
- Business Planning
- Internal Audit
- Periodic Reporting
Risk management requires resources that may otherwise be used in other areas of the organization.
Budgeting
Organization may have a busin s plan. Certain exercise such as SWOT & PEST may be u n risk analysis
Business Planning