Risk management is a five-step process that provides a framework for collecting and evaluating information to:
Assets can be assigned to one of five categories:
T or F: The first step in the risk management process is to identify and assess your organization’s assets.
True
T or F: An asset is anything of value or importance to the organization or an adversary, such as people, computers, buildings or strategic advantages.
True
_____ is comprised of communications and the electronic and telemetry collection of information in the non-visible portion of the electromagnetic spectrum.
SIGINT (Signals Intelligence)
_____ is intelligence derived from people through interviews, elicitation, or reports originating from people.
HUMINT (Human Intelligence)
HUMINT insider – information collection techniques:
• Attempting to obtain information without need to know
• Making unusual use of or requests for classified publications
• Attempting to access classified databases
• Removing information without approval
• Placing classified material in a desk or briefcase
• Copying classified material in other offices
• Borrowing or making notes of classified material
• Bringing cameras or recording devices into cleared facilities
• Obtaining or attempting to obtain witness signatures on classified
destruction records
• Stockpiling classified or proprietary documents outside cleared area
HUMINIT insider indicators - personnel who:
• Are disgruntled with management
• Are disgruntled with the U.S. Government
• Are fascinated with and have a strong desire to engage in spy
work
• Suddenly purchase high value items
• Suddenly settle large outstanding debts
• Travel to foreign countries repeatedly
• Make short trips overseas
• Have contact with foreign officials and representatives
• Attempt to conceal contacts with foreigners
• Have relatives or friends residing abroad
• Avoid or decline assignments requiring a counterintelligence-
oriented polygraph
• Work an unusual amount of overtime
• Sudden decline in work quality
_____ involves using various sources, such as satellites, photos, infrared, imaging radar, and electro-optical for collecting image data.
IMINT (Imagery Intelligence)
_____ It excludes signals intelligence and traditional imagery intelligence. When collected, processed, and analyzed, MASINT locates, tracks, identifies, or describes the signatures (distinctive characteristics) of fixed or dynamic target sources. It includes the advanced data processing and exploitation of data from overhead and airborne imagery collection systems. MASINT data can be acquired from a variety of satellite, airborne, or ship borne platforms; remotely piloted vehicles; or from mobile or fixed ground-based collection sites.
MASINT (Measurement and Signatures Intelligence)
_____ includes resources such as newspapers, internet, magazines, international conventions, Freedom of Information Act (FOIA) requests, seminars, and exhibits (e.g., CNN.com, The New York Times, Aviation Week, and Space & Technology).
OSINT (Open Source Intelligence)
The Threat Level Decision Matrix requires assigning a level of critical (C), high (H), medium (M), or low (L) for each asset’s threat/adversary(s).
For example:
“yes + yes + yes” = critical
“no + no + no” = low
Human Vulnerability Areas
Human vulnerability areas include persons who exhibit the following traits/issues:
• A big ego: Persons with a big ego may mishandle or improperly protect critical assets.
• Anger management problems: Persons with anger management problems may damage or destroy critical assets out of anger.
• Are ignorant of technology: Persons who are ignorant of technology fail to learn how to properly operate computers, secure telephones, etc. This may place sensitive
information at risk.
• Behavioral issues: Behavioral issues apply to disgruntled personnel, persons with personality disorders, etc. These persons may represent either a direct or indirect threat to assets.
• Boredom: Persons suffering from boredom may become careless.
• Greedy: Persons who are greedy may compromise or steal critical assets for personal gain.
• Loose lips: Persons with loose lips may compromise sensitive information.
• Mental illness: Persons with mental illness may represent a threat to critical assets or place critical assets in jeopardy either knowingly or unknowingly.
• Overworked: Persons who are overworked may become careless.
• Practice poor security: Persons practicing poor security fail to comply with security requirements and may place critical assets in jeopardy.
• Seek revenge: Persons who seek revenge may attack critical assets to get even for a perceived wrong.
• Substance abusers: Persons who are substance abusers may pose a threat to critical assets by selling them for cash or being careless while under the influence.
Operational Vulnerability Areas
Operational vulnerability areas include the following:
Information Vulnerability Areas
Information vulnerability areas include the following:
Facility Vulnerability Areas
Facility vulnerability areas leave assets in jeopardy. These are some potential issues:
• Location – Areas designated as high crime areas or with a significant potential for natural disasters could be a concern.
• Poor perimeter fencing with holes, gaps, vegetation overgrowth, etc.
• Building design characteristics with floor plans that inhibit access control
measures, ground floor windows along a heavy pedestrian route, etc.
• Tunnels and drains that permit an avenue of approach by an adversary
• Unsecured doors that allow adversary access.
• Parking lots provide adversaries with a venue for observing a facility, perpetrating a crime, detonating mobile explosive devices, etc.
• Vehicle barriers – They must be reinforced and security personnel must be trained to be effective.
• Untrained guard forces may be ineffective in observing, preventing, or responding to an adversary attack. Guard forces must understand their duties and be trained to carry them out.
• Unsecured windows provide adversaries with a potential avenue of approach.
• Insufficient access control allows adversaries a potential means of entry either detected or undetected.
• Gates must be properly operated when in use, locked when not in use, and regularly evaluated to ensure they do not provide adversaries with a potential avenue of approach.
Equipment Vulnerability Areas
Equipment vulnerability areas include the following:
Additional sources that can assist with gathering vulnerability information include the following:
Regressive analysis is a five-step process:
T or F: The overall risk level varies with relation to the values of each item. The larger the risk area shared by assets, threats, and vulnerabilities, the higher the risk level.
True
The three risk factors are incorporated into a formula to determine and assign a more precise risk rating:
Risk = Impact x (Threat x Vulnerability) or (R = I [T x V])
Countermeasure Cost Determination:
The costs of implementing countermeasures must be considered relative to the following:
• Dollars - Consider the purchase price and the life-cycle maintenance costs (e.g.
installation, preventive maintenance, repair/warranty, replacement, and training).
• Inconvenience - Consider whether the inconvenience caused is offset by the
measure of risk reduction gained. If a countermeasure is inconvenient, people will
find a way to circumvent it.
• Time - Include the time to implement and oversee the countermeasure and the time
to prepare for its implementation, as well as any time required for follow-up and
evaluation.
• Personnel - Consider the number of personnel needed to manage the
countermeasure as well as the skills, knowledge, and abilities of the personnel
involved. Also consider personnel training needs and costs.
• Other - Consider the adverse publicity, political repercussions, reduced operational
efficiency, and unfavorable working conditions resulting from countermeasure implementation.
Information Security Program, Volume 3, Enclosure 5: Security Education and Training
Personnel Security Program, Section 9.2: Security Education