SlideShare a Scribd company logo
1 of 30
Principles of Information Security,
Fifth Edition
Chapter 5
Risk Management
Lesson 3 – Fair Approach
to Risk Management
Learning Objectives
• Upon completion of this material, you should be
able to:
– Define risk management, risk identification, and risk
control
– Describe how risk is identified and assessed
– Assess risk based on probability of occurrence and
likely impact
– Explain the fundamental aspects of documenting risk
via the process of risk assessment
Principles of Information Security, Fifth Edition 2
Learning Objectives (cont’d)
– Describe the various risk mitigation strategy options
– Identify the categories that can be used to classify
controls
– Discuss conceptual frameworks for evaluating risk
controls and formulate a cost-benefit analysis
Principles of Information Security, Fifth Edition 3
The FAIR Approach to Risk
Assessment
• Identify scenario components
• Evaluate loss event frequency
• Evaluate probable loss magnitude
• Derive and articulate risk
Principles of Information Security, Fifth Edition 4
Risk Control
• Involves selection of control strategies, justification of
strategies to upper management, and
implementation/monitoring/ongoing assessment of
adopted controls
• Once the ranked vulnerability risk worksheet is
complete, the organization must choose one of five
strategies to control each risk:
– Defense
– Transfer
– Mitigation
– Acceptance
– Termination
Principles of Information Security, Fifth Edition 5
Defense
• Attempts to prevent exploitation of the vulnerability
• Preferred approach
• Accomplished through countering threats,
removing asset vulnerabilities, limiting asset
access, and adding protective safeguards
• Three common methods of risk avoidance:
– Application of policy
– Education and training
– Applying technology
Principles of Information Security, Fifth Edition 6
Transfer
• Attempts to shift risk to other assets, processes, or
organizations
• If lacking, the organization should hire
individuals/firms that provide security management
and administration expertise.
• The organization may then transfer the risk
associated with management of complex systems
to another organization experienced in dealing with
those risks.
Principles of Information Security, Fifth Edition 7
Mitigate
• Attempts to reduce impact of attack rather than
reduce success of attack itself
• Approach includes three types of plans:
– Incident response (IR) plan: define the actions to
take while incident is in progress
– Disaster recovery (DR) plan: the most common
mitigation procedure; preparations for the recovery
process
– Business continuity (BC) plan: encompasses the
continuation of business activities if a catastrophic
event occurs
Principles of Information Security, Fifth Edition 8
Acceptance and Termination
• Acceptance
– Doing nothing to protect a vulnerability and
accepting the outcome of its exploitation
– Valid only when the particular function, service,
information, or asset does not justify the cost of
protection
• Termination
– Directs the organization to avoid business activities
that introduce uncontrollable risks
– May seek an alternate mechanism to meet the
customer needs
Principles of Information Security, Fifth Edition 9
Principles of Information Security, Fifth Edition 10
Selecting a Risk Control Strategy
• Level of threat and value of asset should play a
major role in the selection of strategy.
• Rules of thumb on strategy selection can be
applied:
– When a vulnerability exists
– When a vulnerability can be exploited
– When attacker’s cost is less than the potential gain
– When potential loss is substantial
Principles of Information Security, Fifth Edition 11
Principles of Information Security, Fifth Edition 12
Justifying Controls
• Before implementing one of the control strategies
for a specific vulnerability, the organization must
explore all consequences of vulnerability to
information asset.
• Several ways to determine the
advantages/disadvantages of a specific control
• Items that affect cost of a control or safeguard
include cost of development or acquisition, training
fees, implementation cost, service costs, and cost
of maintenance.
Principles of Information Security, Fifth Edition 13
Justifying Controls (cont’d)
• Asset valuation involves estimating real/perceived
costs associated with design, development,
installation, maintenance, protection, recovery, and
defense against loss/litigation.
• Process result is the estimate of potential loss per risk.
• Expected loss per risk stated in the following equation:
– Annualized loss expectancy (ALE) =
single loss expectancy (SLE) Ă—
annualized rate of occurrence (ARO)
• SLE = asset value × exposure factor (EF)
Principles of Information Security, Fifth Edition 14
The Cost-Benefit Analysis (CBA)
Formula
• CBA determines if an alternative being evaluated is
worth the cost incurred to control vulnerability.
– The CBA is most easily calculated using the ALE
from earlier assessments, before implementation of
the proposed control:
• CBA = ALE(prior) – ALE(post) – ACS
– ALE(prior) is the annualized loss expectancy of risk
before implementation of control.
– ALE(post) is the estimated ALE based on control
being in place for a period of time.
– ACS is the annualized cost of the safeguard.
Principles of Information Security, Fifth Edition 15
Implementation, Monitoring, and
Assessment of Risk Controls
• The selection of the control strategy is not the end
of a process.
• Strategy and accompanying controls must be
implemented and monitored on ongoing basis to
determine effectiveness and accurately calculate
the estimated residual risk.
• Process continues as long as the organization
continues to function.
Principles of Information Security, Fifth Edition 16
Principles of Information Security, Fifth Edition 17
Quantitative Versus Qualitative Risk
Control Practices
• Performing the previous steps using actual values
or estimates is known as quantitative assessment.
• Possible to complete steps using an evaluation
process based on characteristics using
nonnumerical measures, called qualitative
assessment
• Utilizing scales rather than specific estimates
relieves the organization from the difficulty of
determining exact values.
Principles of Information Security, Fifth Edition 18
Benchmarking and Best Practices
• An alternative approach to risk management
• Benchmarking: process of seeking out and
studying practices in other organizations that one’s
own organization desires to duplicate
• One of two measures typically used to compare
practices:
– Metrics-based measures, based on numerical
standards
– Process-based measures, more strategic and less
focused on numbers
Principles of Information Security, Fifth Edition 19
Benchmarking and Best Practices
(cont’d)
• Standard of due care: when adopting levels of
security for a legal defense, the organization shows
it has done what any prudent organization would
do in similar circumstances.
• The application of controls at or above prescribed
levels and the maintenance of standards of due
care show due diligence on the organization’s part.
• Failure to support standard of due care or due
diligence can leave the organization open to legal
liability.
Principles of Information Security, Fifth Edition 20
Benchmarking and Best Practices
(cont’d)
• Best business practices: security efforts that
provide a superior level of information protection
• When considering best practices for adoption in an
organization, consider:
– Does organization resemble identified target
organization with best practice?
– Are expendable resources similar?
– Is organization in a similar threat environment?
Principles of Information Security, Fifth Edition 21
Benchmarking and Best Practices
(cont’d)
• Problems with the application of benchmarking and
best practices
– Organizations don’t talk to each other (biggest
problem).
– No two organizations are identical.
– Best practices are a moving target.
– Researching information security benchmarks
doesn’t necessarily prepare a practitioner for what to
do next.
Principles of Information Security, Fifth Edition 22
Benchmarking and Best Practices
(cont’d)
• Baselining
– Performance value or metric used to compare
changes in the object being measured.
– In information security, baselining is the comparison
of past security activities and events against an
organization’s future performance.
– Useful during baselining to have a guide to the
overall process
Principles of Information Security, Fifth Edition 23
Other Feasibility Studies
• Organizational: Assesses how well the proposed IS
alternatives will contribute to an organization’s
efficiency, effectiveness, and overall operation
• Operational: Assesses user and management
acceptance and support, and the overall requirements
of the organization’s stakeholders
• Technical: Assesses if organization has or can acquire
the technology necessary to implement and support
proposed control
• Political: Defines what can/cannot occur based on the
consensus and relationships among communities of
interest
Principles of Information Security, Fifth Edition 24
Recommended Risk Control Practices
• Convince budget authorities to spend up to value of
asset to protect from identified threat.
• Chosen controls may be a balanced mixture that
provides greatest value to as many asset-threat
pairs as possible.
• Organizations looking to implement controls that
don’t involve such complex, inexact, and dynamic
calculations.
Principles of Information Security, Fifth Edition 25
Documenting Results
• At minimum, each information asset-threat pair
should have documented control strategy clearly
identifying any remaining residual risk.
• Another option: Document the outcome of the
control strategy for each information asset-
vulnerability pair as an action plan.
• Risk assessment may be documented in a topic-
specific report.
Principles of Information Security, Fifth Edition 26
The NIST Risk Management
Framework
• Describes risk management as a comprehensive
process requiring organizations to:
– Frame risk
– Assess risk
– Respond to determined risk
– Monitor risk on ongoing basis
Principles of Information Security, Fifth Edition 27
Principles of Information Security, Fifth Edition 28
Summary
• Risk identification: formal process of examining and
documenting risk in information systems
• Risk control: process of taking carefully reasoned
steps to ensure the confidentiality, integrity, and
availability of the components of an information system
• Risk identification
– A risk management strategy enables identification,
classification, and prioritization of organization’s
information assets.
– Residual risk: risk remaining to the information asset
even after the existing control is applied
Principles of Information Security, Fifth Edition 29
Summary (cont’d)
• Risk control: Five strategies are used to control
risks that result from vulnerabilities:
– Defend
– Transfer
– Mitigate
– Accept
– Terminate
Principles of Information Security, Fifth Edition 30

More Related Content

What's hot

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3MLG College of Learning, Inc
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2MLG College of Learning, Inc
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Security policy
Security policySecurity policy
Security policyDhani Ahmad
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSChristina33713
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Risk management ii
Risk management iiRisk management ii
Risk management iiDhani Ahmad
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementMaganathin Veeraragaloo
 

What's hot (20)

Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Information Security
Information SecurityInformation Security
Information Security
 
Security policy
Security policySecurity policy
Security policy
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Risk management ii
Risk management iiRisk management ii
Risk management ii
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 

Similar to Lesson 3

crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptxdotco
 
CompTIA Security+.pptx
CompTIA Security+.pptxCompTIA Security+.pptx
CompTIA Security+.pptxKiranKumar24546
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk ManagementKarthikeyan Dhayalan
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileVijayananda Mohire
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security programabdulkhalid murady
 
ch14.ppt
ch14.pptch14.ppt
ch14.pptFizZaShYkh
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsToño Herrera
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesManoj Agarwal
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessmentGeorge Delikouras
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Security risk management
Security risk managementSecurity risk management
Security risk managementbrijesh singh
 

Similar to Lesson 3 (20)

Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
crisc_wk_2a.pptx
crisc_wk_2a.pptxcrisc_wk_2a.pptx
crisc_wk_2a.pptx
 
CompTIA Security+.pptx
CompTIA Security+.pptxCompTIA Security+.pptx
CompTIA Security+.pptx
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Microsoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobileMicrosoft InfoSec for cloud and mobile
Microsoft InfoSec for cloud and mobile
 
Managing an enterprise cyber security program
Managing an enterprise cyber security programManaging an enterprise cyber security program
Managing an enterprise cyber security program
 
ch14.ppt
ch14.pptch14.ppt
ch14.ppt
 
Introduction to Risk Management Fundamentals
Introduction to Risk Management FundamentalsIntroduction to Risk Management Fundamentals
Introduction to Risk Management Fundamentals
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Risk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling TechniquesRisk Based Internal Audit and Sampling Techniques
Risk Based Internal Audit and Sampling Techniques
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Chapter003
Chapter003Chapter003
Chapter003
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 

More from MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Lesson 3

  • 1. Principles of Information Security, Fifth Edition Chapter 5 Risk Management Lesson 3 – Fair Approach to Risk Management
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Define risk management, risk identification, and risk control – Describe how risk is identified and assessed – Assess risk based on probability of occurrence and likely impact – Explain the fundamental aspects of documenting risk via the process of risk assessment Principles of Information Security, Fifth Edition 2
  • 3. Learning Objectives (cont’d) – Describe the various risk mitigation strategy options – Identify the categories that can be used to classify controls – Discuss conceptual frameworks for evaluating risk controls and formulate a cost-benefit analysis Principles of Information Security, Fifth Edition 3
  • 4. The FAIR Approach to Risk Assessment • Identify scenario components • Evaluate loss event frequency • Evaluate probable loss magnitude • Derive and articulate risk Principles of Information Security, Fifth Edition 4
  • 5. Risk Control • Involves selection of control strategies, justification of strategies to upper management, and implementation/monitoring/ongoing assessment of adopted controls • Once the ranked vulnerability risk worksheet is complete, the organization must choose one of five strategies to control each risk: – Defense – Transfer – Mitigation – Acceptance – Termination Principles of Information Security, Fifth Edition 5
  • 6. Defense • Attempts to prevent exploitation of the vulnerability • Preferred approach • Accomplished through countering threats, removing asset vulnerabilities, limiting asset access, and adding protective safeguards • Three common methods of risk avoidance: – Application of policy – Education and training – Applying technology Principles of Information Security, Fifth Edition 6
  • 7. Transfer • Attempts to shift risk to other assets, processes, or organizations • If lacking, the organization should hire individuals/firms that provide security management and administration expertise. • The organization may then transfer the risk associated with management of complex systems to another organization experienced in dealing with those risks. Principles of Information Security, Fifth Edition 7
  • 8. Mitigate • Attempts to reduce impact of attack rather than reduce success of attack itself • Approach includes three types of plans: – Incident response (IR) plan: define the actions to take while incident is in progress – Disaster recovery (DR) plan: the most common mitigation procedure; preparations for the recovery process – Business continuity (BC) plan: encompasses the continuation of business activities if a catastrophic event occurs Principles of Information Security, Fifth Edition 8
  • 9. Acceptance and Termination • Acceptance – Doing nothing to protect a vulnerability and accepting the outcome of its exploitation – Valid only when the particular function, service, information, or asset does not justify the cost of protection • Termination – Directs the organization to avoid business activities that introduce uncontrollable risks – May seek an alternate mechanism to meet the customer needs Principles of Information Security, Fifth Edition 9
  • 10. Principles of Information Security, Fifth Edition 10
  • 11. Selecting a Risk Control Strategy • Level of threat and value of asset should play a major role in the selection of strategy. • Rules of thumb on strategy selection can be applied: – When a vulnerability exists – When a vulnerability can be exploited – When attacker’s cost is less than the potential gain – When potential loss is substantial Principles of Information Security, Fifth Edition 11
  • 12. Principles of Information Security, Fifth Edition 12
  • 13. Justifying Controls • Before implementing one of the control strategies for a specific vulnerability, the organization must explore all consequences of vulnerability to information asset. • Several ways to determine the advantages/disadvantages of a specific control • Items that affect cost of a control or safeguard include cost of development or acquisition, training fees, implementation cost, service costs, and cost of maintenance. Principles of Information Security, Fifth Edition 13
  • 14. Justifying Controls (cont’d) • Asset valuation involves estimating real/perceived costs associated with design, development, installation, maintenance, protection, recovery, and defense against loss/litigation. • Process result is the estimate of potential loss per risk. • Expected loss per risk stated in the following equation: – Annualized loss expectancy (ALE) = single loss expectancy (SLE) Ă— annualized rate of occurrence (ARO) • SLE = asset value Ă— exposure factor (EF) Principles of Information Security, Fifth Edition 14
  • 15. The Cost-Benefit Analysis (CBA) Formula • CBA determines if an alternative being evaluated is worth the cost incurred to control vulnerability. – The CBA is most easily calculated using the ALE from earlier assessments, before implementation of the proposed control: • CBA = ALE(prior) – ALE(post) – ACS – ALE(prior) is the annualized loss expectancy of risk before implementation of control. – ALE(post) is the estimated ALE based on control being in place for a period of time. – ACS is the annualized cost of the safeguard. Principles of Information Security, Fifth Edition 15
  • 16. Implementation, Monitoring, and Assessment of Risk Controls • The selection of the control strategy is not the end of a process. • Strategy and accompanying controls must be implemented and monitored on ongoing basis to determine effectiveness and accurately calculate the estimated residual risk. • Process continues as long as the organization continues to function. Principles of Information Security, Fifth Edition 16
  • 17. Principles of Information Security, Fifth Edition 17
  • 18. Quantitative Versus Qualitative Risk Control Practices • Performing the previous steps using actual values or estimates is known as quantitative assessment. • Possible to complete steps using an evaluation process based on characteristics using nonnumerical measures, called qualitative assessment • Utilizing scales rather than specific estimates relieves the organization from the difficulty of determining exact values. Principles of Information Security, Fifth Edition 18
  • 19. Benchmarking and Best Practices • An alternative approach to risk management • Benchmarking: process of seeking out and studying practices in other organizations that one’s own organization desires to duplicate • One of two measures typically used to compare practices: – Metrics-based measures, based on numerical standards – Process-based measures, more strategic and less focused on numbers Principles of Information Security, Fifth Edition 19
  • 20. Benchmarking and Best Practices (cont’d) • Standard of due care: when adopting levels of security for a legal defense, the organization shows it has done what any prudent organization would do in similar circumstances. • The application of controls at or above prescribed levels and the maintenance of standards of due care show due diligence on the organization’s part. • Failure to support standard of due care or due diligence can leave the organization open to legal liability. Principles of Information Security, Fifth Edition 20
  • 21. Benchmarking and Best Practices (cont’d) • Best business practices: security efforts that provide a superior level of information protection • When considering best practices for adoption in an organization, consider: – Does organization resemble identified target organization with best practice? – Are expendable resources similar? – Is organization in a similar threat environment? Principles of Information Security, Fifth Edition 21
  • 22. Benchmarking and Best Practices (cont’d) • Problems with the application of benchmarking and best practices – Organizations don’t talk to each other (biggest problem). – No two organizations are identical. – Best practices are a moving target. – Researching information security benchmarks doesn’t necessarily prepare a practitioner for what to do next. Principles of Information Security, Fifth Edition 22
  • 23. Benchmarking and Best Practices (cont’d) • Baselining – Performance value or metric used to compare changes in the object being measured. – In information security, baselining is the comparison of past security activities and events against an organization’s future performance. – Useful during baselining to have a guide to the overall process Principles of Information Security, Fifth Edition 23
  • 24. Other Feasibility Studies • Organizational: Assesses how well the proposed IS alternatives will contribute to an organization’s efficiency, effectiveness, and overall operation • Operational: Assesses user and management acceptance and support, and the overall requirements of the organization’s stakeholders • Technical: Assesses if organization has or can acquire the technology necessary to implement and support proposed control • Political: Defines what can/cannot occur based on the consensus and relationships among communities of interest Principles of Information Security, Fifth Edition 24
  • 25. Recommended Risk Control Practices • Convince budget authorities to spend up to value of asset to protect from identified threat. • Chosen controls may be a balanced mixture that provides greatest value to as many asset-threat pairs as possible. • Organizations looking to implement controls that don’t involve such complex, inexact, and dynamic calculations. Principles of Information Security, Fifth Edition 25
  • 26. Documenting Results • At minimum, each information asset-threat pair should have documented control strategy clearly identifying any remaining residual risk. • Another option: Document the outcome of the control strategy for each information asset- vulnerability pair as an action plan. • Risk assessment may be documented in a topic- specific report. Principles of Information Security, Fifth Edition 26
  • 27. The NIST Risk Management Framework • Describes risk management as a comprehensive process requiring organizations to: – Frame risk – Assess risk – Respond to determined risk – Monitor risk on ongoing basis Principles of Information Security, Fifth Edition 27
  • 28. Principles of Information Security, Fifth Edition 28
  • 29. Summary • Risk identification: formal process of examining and documenting risk in information systems • Risk control: process of taking carefully reasoned steps to ensure the confidentiality, integrity, and availability of the components of an information system • Risk identification – A risk management strategy enables identification, classification, and prioritization of organization’s information assets. – Residual risk: risk remaining to the information asset even after the existing control is applied Principles of Information Security, Fifth Edition 29
  • 30. Summary (cont’d) • Risk control: Five strategies are used to control risks that result from vulnerabilities: – Defend – Transfer – Mitigate – Accept – Terminate Principles of Information Security, Fifth Edition 30