Vulnerability
flaw or weakness in a
that could be exercised (accidentally triggered or intentionally exploited) by a threat and result in a security breach or violations of the system’s security
Behavioral: unscured computers or memory sticks, unlocked filing cabinets (computer left unlocked) (password on sticky note)
system related: software bugs, insecure communication channels (outdated software)
organizational: untrained workforce (social engineering), it Misuse (visiting problematic websites)
threats
and threat analysis
are a potential cause for undesired incidents with negative consequences for a system or an organization
types of threats
threat analysis:
risk and risk mgmt
risk is an insecurity concerning the goal achievement of an organization and is often seen as the combination of the probability of occurence and the consequences of an event
Risk mgmt process
C Monitoring/review o m 1 risk identification m u n 2 risk analysis i c a 3 risk evaluation. risk assessment t i I o v n
Context Establishment
Goal: understand the organization’s internal and external operating context that plays a role and affects the risk management process
external context:
internal context:
-internal stakeholders (who needs to be informed)
-culture
-exisiting information
security program (what is there already
-experience (where there some issues in the past, what has been learned)
Risk Identification
goal to identify threats facing the organization’s information assets and understand the significance of these threats
-Identification of information assets that collect store process or transmit information (people, networks)
Threat analysis: identification of threats associated with the information assets
Risk Analysis
R = L x I
-Must be reviewed continually as risks can change
Risk evaluation
determine if risk treatment is needed based on the results of risk analysis ant the organizations risk appetite
risk evaluation:
Decision criteria:
risk treatment
choose strategies that counteract the risks identified during the risk assessment phase
Strategy:
Defense: Applying controls and safeguards that reduce the risk (clean desk policies)
Transference: Shifting risks to other areas or to outside entities (insurance against risk or outsource risk treatment: dependency )
Mitgiation: Reducing the impact in case of a possible attack (data backup, store data on mirror server)
acceptance: Stating willingness to live with the risk (too expensive to reduce the remaining risk)
termination: remove an information asset from all operations (shutting down old Webserver which is not maintained)
Critical Reflection
Applying the risk management process conveys the impression of having used a rigorous method to protect an organization’s information assets
Any issues with the process?