Successfully reported this slideshow.
Your SlideShare is downloading. ×

CNIT 160: Ch 3b: The Risk Management Life Cycle

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 38 Ad

More Related Content

Slideshows for you (20)

Similar to CNIT 160: Ch 3b: The Risk Management Life Cycle (20)

Advertisement

Recently uploaded (20)

Advertisement

CNIT 160: Ch 3b: The Risk Management Life Cycle

  1. 1. CNIT 160: Cybersecurity Responsibilities 3. Information Risk Management Part 2 Pages 114 - 126
  2. 2. Topics • Part 1 (p. 102 - 115) • Risk Management Concepts • Implementing a Risk Management Program • Part 2 (p. 114 - 125) • The Risk Management Life Cycle • Part 3 (p. 125 - 158) • The Risk Management Life Cycle • Part 4 (p. 158 - 182) • Operational Risk Management
  3. 3. The Risk Management Life Cycle • Cyclical, iterative process to • Acquire, analyze, and treat risks • Formally defined in policy and process documents • Defining scope, roles and responsibilities, workflow, business rules, and business records
  4. 4. The Risk Management Life Cycle • Several frameworks and standards • Risk assessments
  5. 5. The Risk Management Life Cycle
  6. 6. The Risk Management Process • Scope definition • Asset identification and valuation • Risk appetite • Risk identification • Risk assessment • Vulnerability assessment • Threat advisory • Risk analysis
  7. 7. The Risk Management Process • Risk analysis • Probability of event occurrence • Impact of event occurrence • Mitigation • Recommendation
  8. 8. The Risk Management Process • Risk treatment • Accept • Mitigate • Transfer • Avoid • Risk communication
  9. 9. Risk Avoidance
  10. 10. Risk Register • List of identified risks, with • Description • Level and type • Risk treatment decisions • Also called a risk ledger
  11. 11. Ch 3b-1
  12. 12. Risk Management Methodologies • NIST SP 800-39 "Managing Information Security Risk: Organization, Mission, and Information, System View" • NIST SP 800-30 "Guide for Conducting Risk Assessments" • ISO/IEC 27005 • Factor Analysis of Information Risk (FAIR)
  13. 13. NIST SP 800-39 "Managing Information Security Risk: Organization, Mission, and Information, System View"
  14. 14. NIST SP 800-39 • Multilevel risk management • Information systems level • Mission/business process level • Overall organization level • Risks are communicated upward • Risk awareness and risk decisions are communicated downward
  15. 15. NIST SP 800-39
  16. 16. NIST SP 800-39
  17. 17. • Risk management process • Step 1: Risk framing • Step 2: Risk assessment • Step 3: Risk response • Step 4: Risk monitoring NIST SP 800-39
  18. 18. NIST SP 800-30 "Guide for Conducting Risk Assessments"
  19. 19. NIST SP 800-30 • Standard methodology for conducting a risk assessment • Quite structured • A number of worksheets recording • Threats and vulnerabilities • Probability of occurrence • Impact
  20. 20. NIST SP 800-30 • Steps for conducting a risk assessment • Step 1: Prepare for assessment • Determine purpose, scope, and • Source of threat, vulnerability, and impact information • MIST 800-30 has example lists
  21. 21. NIST SP 800-30 • Step 2: Conduct assessment • A. Identify threat sources and events
  22. 22. NIST SP 800-30 • B. Identify vulnerabilities and predisposing conditions
  23. 23. NIST SP 800-30 • C. Determine likelihood of occurrence
  24. 24. NIST SP 800-30 • D. Determine magnitude of impact
  25. 25. NIST SP 800-30 • E. Determine risk
  26. 26. NIST SP 800-30 • Step 3: Communicate results • Step 4: Maintain assessment • Monitor risk factors
  27. 27. ISO/IEC 27005
  28. 28. ISO/IEC 27005 • International standard • Defines a structured approach • To risk assessments and risk management
  29. 29. ISO/IEC 27005 • Step 1: Establish context • Scope, purpose • Criteria for evaluating risk, impact • Risk acceptance criteria • Logistical plan
  30. 30. ISO/IEC 27005 • Step 2: Risk assessment • Asset identification • Threat identification • Control identification • Vulnerability identification • Consequences identification
  31. 31. ISO/IEC 27005 • Step 3: Risk evaluation • Step 4: Risk treatment • Risk reduction (also called mitigation) • Risk retention (also called acceptance) • Risk avoidance • Risk transfer • Residual risk remains
  32. 32. ISO/IEC 27005 Step 5: Risk communication
  33. 33. ISO/IEC 27005 Step 6: Risk monitoring and review
  34. 34. Factor Analysis of Information Risk (FAIR)
  35. 35. FAIR • An analysis method for • Factors that contribute to risk • Probability of threat occurrence • Estimation of loss
  36. 36. FAIR • Six types of loss • Productivity • Response • Replacement • Fines and judgments • Competitive advantage • Reputation
  37. 37. FAIR • Ways a threat agent acts upon an asset • Access • Misuse • Disclose • Modify • Deny use
  38. 38. Ch 3b-2

×