SlideShare a Scribd company logo
1 of 28
Download to read offline
Risks Threats and Vulnerabilities
The Fundamentals of R-T-A
Agenda
• Analysis vs. Assessment
• Risks
• Threats
• Vulnerability
• The Flow of R-T-A
Analysis vs. Assessment
• An assessment is more of a general
comparison of something to a standard,
or between two something; which is
better, more correct, which is closer to
the color teal.
• An analysis requires deep scrutiny and
calculated measuring and recording of
criteria.
• An assessment is not exact, an analysis
is more precise and less general than an
assessment.
HAZARDS
• Existing condition or possible (under
current conditions) situation that has the
potential to generate a disaster
• Natural hazards – naturally occurring
phenomena – weather, topographic,
geological, hydrological, etc.
• Human systems developed – caused by
human activity, infrastructure,
transportation, etc.
• Conflict based – civil war, terrorism,
nuclear war, etc.
HAZARDS - Examples
• Hurricanes and tornadoes during
their seasons
• Earthquakes
• High hazard, poorly maintained
dams
• Airlines with abysmal safety
records
• Power production systems with
either dangerous technologies or
poorly maintained transmission
systems
Disasters
• The Highest DEGREE of any HAZARD…
Risk
• The probability that a particular threat will
exploit a particular vulnerability
• Need to systematically understand risks to a
system and decide how to control them.
• Risk = Probability x Impact
Examples of Risk
• Overreliance on security monitoring software
• Inadequate system logging
• Technology innovations that outpace security
• Outdated operating systems
• Lack of encryption
• Data on user-owned mobile devices
• IT “diplomatic immunity” within your organization
• Lack of management support
• Challenges recruiting and retaining qualified IT staff
• Segregation of duties
Threat
• An expression of intention to inflict
evil injury or damage
• Attacks against key security services
– Confidentiality, integrity, availability
• The operationalization of
vulnerability, expected impact of a
developing hazard, and the
probability that impact will work
against your vulnerabilities
• Threat means something bad is
coming your way – high threat
means it is highly likely to hit you
and it will be very bad
Slide #10
Example Threat List
•T01 Access (Unauthorized to
System - logical)
•T02 Access (Unauthorized to
Area - physical)
•T03 Airborne Particles (Dust)
•T04 Air Conditioning Failure
•T05 Application Program
Change
(Unauthorized)
•T06 Bomb Threat
•T07 Chemical Spill
•T08 Civil Disturbance
•T09 Communications Failure
•T10 Data Alteration (Error)
•T11 Data Alteration
(Deliberate)
•T12 Data Destruction (Error)
•T13 Data Destruction
(Deliberate)
•T14 Data Disclosure
(Unauthorized)
•T15 Disgruntled Employee
•T16 Earthquakes
•T17 Errors (All Types)
•T18 Electro-Magnetic
Interference
•T19 Emanations Detection
•T20 Explosion (Internal)
•T21 Fire, Catastrophic
•T22 Fire, Major
•T23 Fire, Minor
•T24 Floods/Water Damage
•T25 Fraud/Embezzlement
•T26 Hardware
Failure/Malfunction
•T27 Hurricanes
•T28 Injury/Illness (Personal)
•T29 Lightning Storm
•T30 Liquid Leaking (Any)
•T31 Loss of Data/Software
•T32 Marking of Data/Media
Improperly
•T33 Misuse of
Computer/Resource
•T34 Nuclear Mishap
•T35 Operating System
Penetration/Alteration
•T36 Operator Error
•T37 Power Fluctuation
(Brown/Transients)
•T38 Power Loss
•T39 Programming Error/Bug
•T40 Sabotage
•T41 Static Electricity
•T42 Storms (Snow/Ice/Wind)
•T43 System Software
Alteration
•T44 Terrorist Actions
•T45 Theft
(Data/Hardware/Software)
•T46 Tornado
•T47 Tsunami (Pacific area only)
•T48 Vandalism
•T49 Virus/Worm (Computer)
•T50 Volcanic Eruption
Slide #11
Characterize Threat-Sources
Blackmail
Malicious code
Input of falsified data
System bugs
Ego, Revenge,
Monetary gain
Insider
Information warfare
System attack
System tampering
Blackmail,
Destruction, Revenge
Terrorist
Hacking
Social engineering
System intrusion
Unauthorized access
Challenge, ego,
rebellion
Hacker
Threat ActionsMotivationThreat-source
VULNERABILITIES
• If you have a hazard you may or may not be
vulnerable to it
– Live in the flood plain – vulnerable to floods
– Live on high ground – not vulnerable to floods
• Vulnerability is an assessment of how well or
how poorly protected you are against an event
• Vulnerabilities are flaws / weaknesses in any
system which can be utilized to generate
“Threat”
Slide #13
Vulnerabilities
• Flaw or weakness in system that can be
exploited to violate system integrity.
– Security Procedures
– Design
– Implementation
• Threats trigger vulnerabilities
– Accidental
– Malicious
VULNERABILITIES
• Vulnerabilities may be reduced by mitigation
measures (building construction, land use
control, maintenance, etc.)
• Or by the level of preparedness you have
achieved (well trained and equipped
emergency teams, plans, exercises, etc.)
Factors influencing VULNERABILITY
• Three factors may influence the determination
of vulnerability
– Criticality – how important is the asset or function
that is subject to impact
– Exposure – to how much of the force of the event
is the resource exposed
– Time – does vulnerability fluctuate over time of
day, month, season?
Examples of Vulnerabilities
•Physical
•V01 Susceptible to unauthorized
building access
•V02 Computer Room susceptible
to unauthorized
access
•V03 Media Library susceptible to
unauthorized
access
•V04 Inadequate visitor control
procedures
•(and 36 more)
•Administrative
•V41 Lack of management
support for security
•V42 No separation of duties
policy
•V43 Inadequate/no computer
security plan policy
•V47 Inadequate/no emergency
action plan
•(and 7 more)
•Personnel
•V56 Inadequate personnel
screening
•V57 Personnel not adequately
trained in job
•...
•Software
•V62 Inadequate/missing audit
trail capability
•V63 Audit trail log not reviewed
weekly
•V64 Inadequate control over
application/program
changes
Communications
•V87 Inadequate
communications system
•V88 Lack of encryption
•V89 Potential for disruptions
•...
•Hardware
•V92 Lack of hardware inventory
•V93 Inadequate monitoring of
maintenance
personnel
•V94 No preventive
maintenance program
•…
•V100 Susceptible to electronic
emanations
IMPACT
• Assessment of interaction of
hazard effects with your
vulnerabilities
• Scalar based on the two key
variables – hazard strength and
vulnerability level
• Will be hazard specific in
aggregate (hurricane impacts),
but may be functionally common
to a variety of hazards in the
specific (power loss)
IMPACT
HIGH
Strong Hazard
High Vulnerability
MODERATE
Strong Hazard
Low Vulnerability
MODERATE
Weak Hazard
High Vulnerability
LOW
Weak Hazard
Low Vulnerability
Factors influencing IMPACT
• Two other factors are related to impact
–Magnitude – the absolute size and power of
the event
–Intensity – the measurement of the effects
of the event – how it is felt
• All else being equal an event with greater
magnitude will tend to be a more intense
event and generate greater impacts
CONSEQUENCES
• Result of the interaction of the Impact of the
event with other systems
– Political,
– Social and cultural,
– Economic, etc.
• May set the stage for either:
– Future events, or
– Vulnerability reduction through mitigation and
preparedness
CONSEQUENCES
• The border between consequence and impact is
fuzzy, but
– Impacts tend to be directly related to the effects
of the event, consequences more second order
– Impacts tend to be shorter term (hours to
decades), consequences longer term (weeks to
centuries)
– Although coupled to impacts, consequences are
neither automatic nor irreversible
– Consequences tend to be more human-centric,
impacts more event-centric – we make the
consequences, the event makes the impact
PROBABILITY
• A mathematical assessment of how likely it is
that a specific event will occur
• Based on a wide variety of factors – history,
global warming, infrastructure and
demographic changes, new industries,
changes in your activities and processes, etc.
PROBABILITY
• Expressed in a variety of ways:
– This year we expect 14 named tropical storms, 8
hurricanes, 3 great hurricanes … (an assessment
of general level)
– There is a 45% chance of … (a numerical
assessment)
– A 500 year flood … (a statement of cycles)
– And then there is likelihood: “I think it is highly
likely that …” (a qualitative assessment)
LIKELIHOOD
• An inexact, qualitative statement of how one
assesses probability
• Generally expressed in broad bands that cover a
range of probability values
– High – “likely”
– Low – “unlikely”
• Easily understood, but also misleading – likely is
interpreted as “yes, it will,” unlikely as “no, it will
not”
THE FLOW
HAZARD VULNERABILITY
THREAT
IMPACT
PROBABILITY
^
^
RISK
CONSEQUENCE
Here are some important characteristics of
the three components:
• Threats (effects) generally can NOT be controlled.
One can’t stop the efforts of an international terrorist group,
prevent a hurricane, or tame a tsunami in advance. Threats need
to be identified, but they often remain outside of your control.
• Risk CAN be mitigated
Risk can be managed to either lower vulnerability or the overall
impact on the business.
• Vulnerability CAN be treated
Weaknesses should be identified and proactive measures taken
to correct identified vulnerabilities.
Risks threats and vulnerabilities

More Related Content

What's hot

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructureNeha Agarwal
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perceptionzaffar abbasi
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101Srinivasan Vanamali
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
Risk identification
Risk identificationRisk identification
Risk identificationmurukkada
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Operational Security
Operational SecurityOperational Security
Operational SecuritySplunk
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 

What's hot (20)

Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
Protection of critical information infrastructure
Protection of critical information infrastructureProtection of critical information infrastructure
Protection of critical information infrastructure
 
06. security concept
06. security concept06. security concept
06. security concept
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perception
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Cybersecurity risk management 101
Cybersecurity risk management 101Cybersecurity risk management 101
Cybersecurity risk management 101
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Security audit
Security auditSecurity audit
Security audit
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Risk identification
Risk identificationRisk identification
Risk identification
 
12 security policies
12 security policies12 security policies
12 security policies
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 

Viewers also liked

Viewers also liked (6)

Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
Disaster vulnerability, risk and capacity
Disaster vulnerability, risk and capacityDisaster vulnerability, risk and capacity
Disaster vulnerability, risk and capacity
 
Natural hazards and disaster management
Natural hazards and disaster managementNatural hazards and disaster management
Natural hazards and disaster management
 
Hazards & Types Of Disasters
Hazards & Types Of DisastersHazards & Types Of Disasters
Hazards & Types Of Disasters
 
Disaster Mitigation and Management
Disaster Mitigation and ManagementDisaster Mitigation and Management
Disaster Mitigation and Management
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Similar to Risks threats and vulnerabilities

Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)neeraj.sihag
 
Introduction to ERA by arup das
Introduction to ERA by arup dasIntroduction to ERA by arup das
Introduction to ERA by arup dasArup8
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxjustine1simpson78276
 
Objects At Heights Webinar
Objects At Heights WebinarObjects At Heights Webinar
Objects At Heights WebinarTENAQUIP
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...AMIT SAHU
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –AMIT SAHU
 
Post disaster mangement
Post disaster mangementPost disaster mangement
Post disaster mangement9159781447
 
Hazards Risk and Perils, a complete explanation .
Hazards Risk and Perils,  a complete explanation .Hazards Risk and Perils,  a complete explanation .
Hazards Risk and Perils, a complete explanation .Sagar Garg
 
Know4DRR miozzo
Know4DRR miozzoKnow4DRR miozzo
Know4DRR miozzoknow4drr
 
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdf
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdfREACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdf
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdfREACT International, Inc.
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systemsJaap van Ekris
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Jaap van Ekris
 
Business continuity overview
Business continuity overviewBusiness continuity overview
Business continuity overviewRod Davis
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...Lumension
 

Similar to Risks threats and vulnerabilities (20)

Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)
 
Introduction to ERA by arup das
Introduction to ERA by arup dasIntroduction to ERA by arup das
Introduction to ERA by arup das
 
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docxAppendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
Appendix D Hazard Analysis ProcessInstructor GuideAppendix .docx
 
Objects At Heights Webinar
Objects At Heights WebinarObjects At Heights Webinar
Objects At Heights Webinar
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
 
Post disaster mangement
Post disaster mangementPost disaster mangement
Post disaster mangement
 
Hazards Risk and Perils, a complete explanation .
Hazards Risk and Perils,  a complete explanation .Hazards Risk and Perils,  a complete explanation .
Hazards Risk and Perils, a complete explanation .
 
Know4DRR miozzo
Know4DRR miozzoKnow4DRR miozzo
Know4DRR miozzo
 
Topic 3 swiss cheese model
Topic 3 swiss cheese modelTopic 3 swiss cheese model
Topic 3 swiss cheese model
 
Prediction modeling
Prediction modelingPrediction modeling
Prediction modeling
 
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdf
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdfREACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdf
REACT INTERNATIONAL TRAINING - DISASTER BASICS - R.GOSWAMI - 2019-04-28.pdf
 
Cascading Disasters
Cascading DisastersCascading Disasters
Cascading Disasters
 
Network security
Network securityNetwork security
Network security
 
2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems2016-04-28 - VU Amsterdam - testing safety critical systems
2016-04-28 - VU Amsterdam - testing safety critical systems
 
Crowd fencing
Crowd fencingCrowd fencing
Crowd fencing
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)Testing Safety Critical Systems (10-02-2014, VU amsterdam)
Testing Safety Critical Systems (10-02-2014, VU amsterdam)
 
Business continuity overview
Business continuity overviewBusiness continuity overview
Business continuity overview
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 

More from Manish Chaurasia

Top 5 divine pilgrim places to visit in india
Top 5 divine pilgrim places to  visit in indiaTop 5 divine pilgrim places to  visit in india
Top 5 divine pilgrim places to visit in indiaManish Chaurasia
 
Top 5 exotic aquariums in india
Top 5 exotic aquariums in  indiaTop 5 exotic aquariums in  india
Top 5 exotic aquariums in indiaManish Chaurasia
 
Top 5 not to miss museums in india
Top 5 not to miss museums in  indiaTop 5 not to miss museums in  india
Top 5 not to miss museums in indiaManish Chaurasia
 
Top 5 big and famous fairs in india.
Top 5 big and famous fairs in  india.Top 5 big and famous fairs in  india.
Top 5 big and famous fairs in india.Manish Chaurasia
 
Top 5 chilly places to visit in india !
Top 5 chilly places to visit in  india !Top 5 chilly places to visit in  india !
Top 5 chilly places to visit in india !Manish Chaurasia
 
Top 5 less crowded tourist places in india.
Top 5 less crowded tourist places  in india.Top 5 less crowded tourist places  in india.
Top 5 less crowded tourist places in india.Manish Chaurasia
 
Shortcut keys-for-windows-10
Shortcut keys-for-windows-10Shortcut keys-for-windows-10
Shortcut keys-for-windows-10Manish Chaurasia
 
porter Five force analysis
porter Five force analysisporter Five force analysis
porter Five force analysisManish Chaurasia
 
4 E of corporate strategy
4 E of corporate strategy 4 E of corporate strategy
4 E of corporate strategy Manish Chaurasia
 
General Packet Radio Service
General Packet Radio ServiceGeneral Packet Radio Service
General Packet Radio ServiceManish Chaurasia
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standardsManish Chaurasia
 
Synopsis on social networking
Synopsis on social networkingSynopsis on social networking
Synopsis on social networkingManish Chaurasia
 
Cost of-poor-quality - juran institute
Cost of-poor-quality - juran instituteCost of-poor-quality - juran institute
Cost of-poor-quality - juran instituteManish Chaurasia
 
defect tracking and management
defect tracking and management   defect tracking and management
defect tracking and management Manish Chaurasia
 

More from Manish Chaurasia (20)

Top 5 divine pilgrim places to visit in india
Top 5 divine pilgrim places to  visit in indiaTop 5 divine pilgrim places to  visit in india
Top 5 divine pilgrim places to visit in india
 
Top 5 exotic aquariums in india
Top 5 exotic aquariums in  indiaTop 5 exotic aquariums in  india
Top 5 exotic aquariums in india
 
Top 5 not to miss museums in india
Top 5 not to miss museums in  indiaTop 5 not to miss museums in  india
Top 5 not to miss museums in india
 
Top 5 beaches in india
Top 5 beaches in indiaTop 5 beaches in india
Top 5 beaches in india
 
Top 5 big and famous fairs in india.
Top 5 big and famous fairs in  india.Top 5 big and famous fairs in  india.
Top 5 big and famous fairs in india.
 
Top 5 chilly places to visit in india !
Top 5 chilly places to visit in  india !Top 5 chilly places to visit in  india !
Top 5 chilly places to visit in india !
 
Top 5 less crowded tourist places in india.
Top 5 less crowded tourist places  in india.Top 5 less crowded tourist places  in india.
Top 5 less crowded tourist places in india.
 
Shortcut keys-for-windows-10
Shortcut keys-for-windows-10Shortcut keys-for-windows-10
Shortcut keys-for-windows-10
 
It strategy lecture
It strategy lectureIt strategy lecture
It strategy lecture
 
Importance of IT
Importance of ITImportance of IT
Importance of IT
 
porter Five force analysis
porter Five force analysisporter Five force analysis
porter Five force analysis
 
4 E of corporate strategy
4 E of corporate strategy 4 E of corporate strategy
4 E of corporate strategy
 
Campus recruitmen book
Campus recruitmen bookCampus recruitmen book
Campus recruitmen book
 
General Packet Radio Service
General Packet Radio ServiceGeneral Packet Radio Service
General Packet Radio Service
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
 
Synopsis on social networking
Synopsis on social networkingSynopsis on social networking
Synopsis on social networking
 
Case study olx
Case study olxCase study olx
Case study olx
 
Cost of-poor-quality - juran institute
Cost of-poor-quality - juran instituteCost of-poor-quality - juran institute
Cost of-poor-quality - juran institute
 
introduction to quality
 introduction to quality introduction to quality
introduction to quality
 
defect tracking and management
defect tracking and management   defect tracking and management
defect tracking and management
 

Recently uploaded

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 

Recently uploaded (20)

What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 

Risks threats and vulnerabilities

  • 1. Risks Threats and Vulnerabilities The Fundamentals of R-T-A
  • 2. Agenda • Analysis vs. Assessment • Risks • Threats • Vulnerability • The Flow of R-T-A
  • 3. Analysis vs. Assessment • An assessment is more of a general comparison of something to a standard, or between two something; which is better, more correct, which is closer to the color teal. • An analysis requires deep scrutiny and calculated measuring and recording of criteria. • An assessment is not exact, an analysis is more precise and less general than an assessment.
  • 4. HAZARDS • Existing condition or possible (under current conditions) situation that has the potential to generate a disaster • Natural hazards – naturally occurring phenomena – weather, topographic, geological, hydrological, etc. • Human systems developed – caused by human activity, infrastructure, transportation, etc. • Conflict based – civil war, terrorism, nuclear war, etc.
  • 5. HAZARDS - Examples • Hurricanes and tornadoes during their seasons • Earthquakes • High hazard, poorly maintained dams • Airlines with abysmal safety records • Power production systems with either dangerous technologies or poorly maintained transmission systems
  • 6. Disasters • The Highest DEGREE of any HAZARD…
  • 7. Risk • The probability that a particular threat will exploit a particular vulnerability • Need to systematically understand risks to a system and decide how to control them. • Risk = Probability x Impact
  • 8. Examples of Risk • Overreliance on security monitoring software • Inadequate system logging • Technology innovations that outpace security • Outdated operating systems • Lack of encryption • Data on user-owned mobile devices • IT “diplomatic immunity” within your organization • Lack of management support • Challenges recruiting and retaining qualified IT staff • Segregation of duties
  • 9. Threat • An expression of intention to inflict evil injury or damage • Attacks against key security services – Confidentiality, integrity, availability • The operationalization of vulnerability, expected impact of a developing hazard, and the probability that impact will work against your vulnerabilities • Threat means something bad is coming your way – high threat means it is highly likely to hit you and it will be very bad
  • 10. Slide #10 Example Threat List •T01 Access (Unauthorized to System - logical) •T02 Access (Unauthorized to Area - physical) •T03 Airborne Particles (Dust) •T04 Air Conditioning Failure •T05 Application Program Change (Unauthorized) •T06 Bomb Threat •T07 Chemical Spill •T08 Civil Disturbance •T09 Communications Failure •T10 Data Alteration (Error) •T11 Data Alteration (Deliberate) •T12 Data Destruction (Error) •T13 Data Destruction (Deliberate) •T14 Data Disclosure (Unauthorized) •T15 Disgruntled Employee •T16 Earthquakes •T17 Errors (All Types) •T18 Electro-Magnetic Interference •T19 Emanations Detection •T20 Explosion (Internal) •T21 Fire, Catastrophic •T22 Fire, Major •T23 Fire, Minor •T24 Floods/Water Damage •T25 Fraud/Embezzlement •T26 Hardware Failure/Malfunction •T27 Hurricanes •T28 Injury/Illness (Personal) •T29 Lightning Storm •T30 Liquid Leaking (Any) •T31 Loss of Data/Software •T32 Marking of Data/Media Improperly •T33 Misuse of Computer/Resource •T34 Nuclear Mishap •T35 Operating System Penetration/Alteration •T36 Operator Error •T37 Power Fluctuation (Brown/Transients) •T38 Power Loss •T39 Programming Error/Bug •T40 Sabotage •T41 Static Electricity •T42 Storms (Snow/Ice/Wind) •T43 System Software Alteration •T44 Terrorist Actions •T45 Theft (Data/Hardware/Software) •T46 Tornado •T47 Tsunami (Pacific area only) •T48 Vandalism •T49 Virus/Worm (Computer) •T50 Volcanic Eruption
  • 11. Slide #11 Characterize Threat-Sources Blackmail Malicious code Input of falsified data System bugs Ego, Revenge, Monetary gain Insider Information warfare System attack System tampering Blackmail, Destruction, Revenge Terrorist Hacking Social engineering System intrusion Unauthorized access Challenge, ego, rebellion Hacker Threat ActionsMotivationThreat-source
  • 12. VULNERABILITIES • If you have a hazard you may or may not be vulnerable to it – Live in the flood plain – vulnerable to floods – Live on high ground – not vulnerable to floods • Vulnerability is an assessment of how well or how poorly protected you are against an event • Vulnerabilities are flaws / weaknesses in any system which can be utilized to generate “Threat”
  • 13. Slide #13 Vulnerabilities • Flaw or weakness in system that can be exploited to violate system integrity. – Security Procedures – Design – Implementation • Threats trigger vulnerabilities – Accidental – Malicious
  • 14. VULNERABILITIES • Vulnerabilities may be reduced by mitigation measures (building construction, land use control, maintenance, etc.) • Or by the level of preparedness you have achieved (well trained and equipped emergency teams, plans, exercises, etc.)
  • 15. Factors influencing VULNERABILITY • Three factors may influence the determination of vulnerability – Criticality – how important is the asset or function that is subject to impact – Exposure – to how much of the force of the event is the resource exposed – Time – does vulnerability fluctuate over time of day, month, season?
  • 16. Examples of Vulnerabilities •Physical •V01 Susceptible to unauthorized building access •V02 Computer Room susceptible to unauthorized access •V03 Media Library susceptible to unauthorized access •V04 Inadequate visitor control procedures •(and 36 more) •Administrative •V41 Lack of management support for security •V42 No separation of duties policy •V43 Inadequate/no computer security plan policy •V47 Inadequate/no emergency action plan •(and 7 more) •Personnel •V56 Inadequate personnel screening •V57 Personnel not adequately trained in job •... •Software •V62 Inadequate/missing audit trail capability •V63 Audit trail log not reviewed weekly •V64 Inadequate control over application/program changes Communications •V87 Inadequate communications system •V88 Lack of encryption •V89 Potential for disruptions •... •Hardware •V92 Lack of hardware inventory •V93 Inadequate monitoring of maintenance personnel •V94 No preventive maintenance program •… •V100 Susceptible to electronic emanations
  • 17. IMPACT • Assessment of interaction of hazard effects with your vulnerabilities • Scalar based on the two key variables – hazard strength and vulnerability level • Will be hazard specific in aggregate (hurricane impacts), but may be functionally common to a variety of hazards in the specific (power loss)
  • 18. IMPACT HIGH Strong Hazard High Vulnerability MODERATE Strong Hazard Low Vulnerability MODERATE Weak Hazard High Vulnerability LOW Weak Hazard Low Vulnerability
  • 19. Factors influencing IMPACT • Two other factors are related to impact –Magnitude – the absolute size and power of the event –Intensity – the measurement of the effects of the event – how it is felt • All else being equal an event with greater magnitude will tend to be a more intense event and generate greater impacts
  • 20. CONSEQUENCES • Result of the interaction of the Impact of the event with other systems – Political, – Social and cultural, – Economic, etc. • May set the stage for either: – Future events, or – Vulnerability reduction through mitigation and preparedness
  • 21. CONSEQUENCES • The border between consequence and impact is fuzzy, but – Impacts tend to be directly related to the effects of the event, consequences more second order – Impacts tend to be shorter term (hours to decades), consequences longer term (weeks to centuries) – Although coupled to impacts, consequences are neither automatic nor irreversible – Consequences tend to be more human-centric, impacts more event-centric – we make the consequences, the event makes the impact
  • 22. PROBABILITY • A mathematical assessment of how likely it is that a specific event will occur • Based on a wide variety of factors – history, global warming, infrastructure and demographic changes, new industries, changes in your activities and processes, etc.
  • 23. PROBABILITY • Expressed in a variety of ways: – This year we expect 14 named tropical storms, 8 hurricanes, 3 great hurricanes … (an assessment of general level) – There is a 45% chance of … (a numerical assessment) – A 500 year flood … (a statement of cycles) – And then there is likelihood: “I think it is highly likely that …” (a qualitative assessment)
  • 24. LIKELIHOOD • An inexact, qualitative statement of how one assesses probability • Generally expressed in broad bands that cover a range of probability values – High – “likely” – Low – “unlikely” • Easily understood, but also misleading – likely is interpreted as “yes, it will,” unlikely as “no, it will not”
  • 26.
  • 27. Here are some important characteristics of the three components: • Threats (effects) generally can NOT be controlled. One can’t stop the efforts of an international terrorist group, prevent a hurricane, or tame a tsunami in advance. Threats need to be identified, but they often remain outside of your control. • Risk CAN be mitigated Risk can be managed to either lower vulnerability or the overall impact on the business. • Vulnerability CAN be treated Weaknesses should be identified and proactive measures taken to correct identified vulnerabilities.