Case Study: Information Security Risk Assessment
In this case study assignment, you will perform a quantitative risk assessment (risk analysis) for the company network shown below. Use the “Case Study Information Security Risk Assessment Answer Sheet” for your answers.
Assets are shown in the diagram. Feel free to suggest vulnerabilities and threats that might be applicable to these assets.
The following risk analysis formula will guide you through the process:
Risk = Probability of the exploitation of a vulnerability by a threat * Impact of the exploitation
There are six steps in the risk analysis process.
Step 1) Specify three assets by using the network topology and the explanations.[footnoteRef:2] [2: An asset is anything that has value for the company. It can be software, hardware, storage media, documents, or even employees. One of the most critical assets is information. Note that one of the essential duties of the other assets (software, hardware, etc.) is to process information. Therefore, the value of software, for example, is directly proportional to the value of the information it processes.]
Step 2) For each of the assets, determine one vulnerability.[footnoteRef:3] [3: A vulnerability is a weakness in an asset's design, development, structure, properties, or configurations. An asset's weakness could allow it to be exploited and harmed by one or more threats.]
Step 3) For each vulnerability, determine one threat that may exploit the vulnerability.[footnoteRef:4] [4: A threat is an active agent with the intent and potential of exploiting vulnerabilities and causing harm. There are many threat agents that fall into broad categories of deliberate or accidental actions of humans (internal or external to the organization) and acts of nature. ]
Fill out the first three columns of Table-1 for the three assets you choose from the diagram.
Table-1
Assets
Vulnerabilities
Threats
Probability (the numerical value)
Impact
(the numerical value)
Risk
(the numerical value)
Risk = Probability x Impact
Step 4) For each asset, choose a numerical value from the table below for the probability of the exploitation of the vulnerability by the threat. While selecting a numerical value, you should consider factors like “is the threat agent external or internal? Is the vulnerability remotely exploitable? and to what extent does the asset value draw the attention of attackers?”
Type the numerical value into the fourth column of Table-1.
Probability
Numerical value
Frequency of exploitation
Very Low
1
Once per year
Low
2
Once every six months
Medium
3
Once per month
High
4
Once per week
Very High
5
Once per day
Type your justifications here:
Probability (the numerical value)
Your Justification (Why you assigned that value for the probability)
Step 5) For each asset, appraise the impact once the asset is compromised. For this estimation, use the following reference table. While choosing a numeri ...