Lecture 4 Flashcards
?
process of identifying and controlling risks facing an organization
Risk Management
Risk Management
?
process of examining an organization’s current information technology security situation
Risk Management
Risk Identification
?
applying controls to reduce risks to an organizations data and information systems
Risk Management
Risk Control
?
Began as a advantage
Competitiveness
Risk Management
Information Technology Role
?
Now falling behind is a disadvantage
Competitiveness
Risk Management
Information Technology Role
?
is a necessity
Competitiveness
Risk Management
Availability
?
Understand the technology and systems in your organization
An Overview of Risk Management
Risk Management
Know yourself
?
Identify, examine, understand threats
An Overview of Risk Management
Risk Management
Know the enemy
(3) Role of Communities of Interest
An Overview of Risk Management | Enumerate
Risk Management
- Information Security
- Management and Users
- Information Technology
Verify ? of asset inventory
The Roles of Communities of Interest - Management Review
Risk Management
completeness/accuracy
Review and verify threats as well as ? strategies
The Roles of Communities of Interest - Management Review
Risk Management
controls and mitigation
Review ? of each control
The Roles of Communities of Interest - Management Review
Risk Management
cost effectiveness
? of controls deployed
The Roles of Communities of Interest - Management Review
Risk Management
Verify effectiveness
Risk management involves identifying ? and identifying ??
Risk Identification
Risk Management
- organization’s assets
- threats/vulnerabilities
?
begins with identification of assets, including all elements of an organization’s system (people, procedures, data and information, software, hardware, networking)
Asset Identification and Valuation
Risk Management
Iterative Process
?
are then classified and categorized
Asset Identification and Valuation
Risk Management
Assets
Human resources, documentation, and data information assets are more difficult to ?
People, Procedures, and Data Asset Identification
Risk Management
identify
People with knowledge, experience, and good judgment should be assigned this ?
People, Procedures, and Data Asset Identification
Risk Management
task
These assets should be recorded using reliable ? process
People, Procedures, and Data Asset Identification
Risk Management
data-handling
Asset attributes for ?: position name/number/ID; supervisor; security clearance level; special skills
* Try to avoid names
People, Procedures, and Data Asset Identification
Risk Management
people
Asset attributes for ?
* Intended purpose
* Relationship to software, hardware, network elements
* Storage location
People, Procedures, and Data Asset Identification
Risk Management
procedures
Asset attributes for ?
* classification; owner/creator/manager; data structure size; data structure used; online/offline; location; backup procedures employed
People, Procedures, and Data Asset Identification
Risk Management
data
(4) Asset attributes to be considered are:
Hardware, Software, and Network Asset Identification
Risk Management
- Name (device or program name)
- IP address
- Media access control (MAC) address
- Element type – server, desktop, etc. Device Class, Device OS, Device Capacity
Where on network
Hardware, Software, and Network Asset Identification
Risk Management
Logical Location
Organization unit to which it belongs
Hardware, Software, and Network Asset Identification
Risk Management
Controlling entity
Many organizations have ? schemes (e.g., confidential, internal, public data)
Information Asset Classification
Risk Management
data classification
?
must be specific enough to allow determination
of priority
Information Asset Classification
Risk Management
Classification
?
all info fits in list somewhere
Information Asset Classification
Risk Management
Comprehensive
?
fits in one place
Information Asset Classification
Risk Management
Mutually exclusive
?
help develop criteria for asset valuation: which information asset
Information Asset Valuation
Risk Management
Questions
?
(4) Questions help develop criteria for asset valuation: which information asset
Information Asset Valuation | Enumerate Example
Risk Management
- is most critical to organization’s success?
- generates the most revenue?
- generates the most profit?
- would be most expensive to replace?
?
help develop criteria for asset valuation: which information asset
Information Asset Valuation
Risk Management
Questions
?
(2) Questions help develop criteria for asset valuation: which information asset
Information Asset Valuation | Enumerate Example
Risk Management
- would be most expensive to protect?
- would be most embarrassing or cause the greatest liability is revealed?
?
Calculate the relative importance of each asset
Listing Assets in Order of Importance
Risk Management
Weighted factor analysis
(3) Each info asset assigned score for each critical factor (0.1 to
1.0)
Listing Assets in Order of Importance | Enumerate
Risk Management
- Impact to revenue
- Impact to profitability
- Impact to public image
Each critical factor is assigned a weight ?
Listing Assets in Order of Importance | Enumerate
Risk Management
(1-100)
(2) Variety of classification schemes used by corporate and military organizations
Data Classification and Management | Enumerate
Risk Management
- Georgia-Pacific Corporation (G-P) scheme
- U.S. military classification scheme
?
Confidential, sensitive or proprietary
Data Classification and Management
Risk Management
Georgia-Pacific Corporation (G-P) scheme
?
Internal, G-P employee, authorized contractors
Data Classification and Management
Risk Management
Georgia-Pacific Corporation (G-P) scheme
?
External, public
Data Classification and Management
Risk Management
Georgia-Pacific Corporation (G-P) scheme
(5) U.S. military classification scheme
Data Classification and Management | Enumerate Example
Risk Management
- Unclassified Data
- Sensitive by unclassified data
- Confidential data
- Secret data
- Top secret data
?
responsible for classifying their information assets
Data Classification and Management
Risk Management
Information owners
?
must be reviewed periodically
Data Classification and Management
Risk Management
Information classifications
Most organizations do not need detailed level of classification used by ? or ?? agencies.
Data Classification and Management
Risk Management
- military
- federal
(4) Organizations may need to classify data to provide protection
Data Classification and Management | Enumerate
Risk Management
- Public
- For official use only
- Sensitive
- classified
Assign classification to all ?
Data Classification and Management
Risk Management
data
Grant access to data based on ?
Data Classification and Management
Risk Management
classification and need
Devise some method of managing data relative to ?
Data Classification and Management
Risk Management
classification
?
: each data user assigned a single level of authorization indicating classification level
Security Clearances
Risk Management
Security clearance structure
Before accessing specific set of data, employee must meet ? requirement
Security Clearances
Risk Management
need-to-know
Extra level of protection ensures information confidentiality is ?
Security Clearances
Risk Management
maintained