Risk Assesment
Risk Assesment
Risk Assesment
&
Assessment
Submitted
To : Dr Loai Tawalbeh
From : Muna Ahmed
١٤٤٢/٠٢/١٠ 1
Main topics
What is Risk & Risk management?
Risk Management Cycle
Risk Identification
Primary sources of Risk Items
What is Risk Assessment ?
How to assess the risks ?
Risk Assessment methodologies
Methods of Risk Assessment
Who is responsible in risk assessment?
Two Case Studies
Conclusion
١٤٤٢/٠٢/١٠ 2
What is Risk & Risk
?Management
Risk : The is an object, person or other entity that
represent a danger, harm or loss to an asset
١٤٤٢/٠٢/١٠ 3
Risk Life Cycle
Exploits
Threat Agent
Leads to
Vulnerability
Risk
Exposures
And cause an
Safeguard
Can be
١٤٤٢/٠٢/١٠ countermeasured by a 4
Risk Management Cycle
Risk Assessment
Identify Risks
Risk Control
Implement
Strategy
Monitor
Evaluate and
Adjust
١٤٤٢/٠٢/١٠ 5
١٤٤٢/٠٢/١٠ 6
Risk Identification
What is the purpose of this phase ?
The aims of this phase is to identify , classify and
prioritizing the organization’s information assets
( Know ourselves) and identify all important types
and sources of risk and uncertainty (know our
enemy), associated with each of the investment
objectives.
١٤٤٢/٠٢/١٠ 7
Information Assets
IS
Components
People at
Authorized Sensitive
trusted Process OS Net Work
Staff Procedures
organizations
Security
Other staff Strangers Storage
Component
١٤٤٢/٠٢/١٠ 8
Primary sources network
based attacks
of Risk Items ,virus infection
unauthorized access
Human Threats
floods
Earthquakes
hurricanes
,Power failure
pollution
١٤٤٢/٠٢/١٠ 9
Risk Assessment
١٤٤٢/٠٢/١٠ 10
? What is Risk Assessment
Assessing risk is the process of determining the likelihood of
the threat being exercised against the vulnerability and the
resulting impact from a successful compromise , i.e determine
the relative risk for each of the vulnerabilities
١٤٤٢/٠٢/١٠ 11
Methods of Risk Assessment
There are various methods assessing risk,
١٤٤٢/٠٢/١٠ 12
econd : Qualitative Risk Assessment
١٤٤٢/٠٢/١٠ 13
Third :Quantitative and Qualitative
١٤٤٢/٠٢/١٠ 14
Quantitative risk measurement is the standard way of measuring
risk in many fields, such as insurance, but it is not commonly used
to measure risk in information systems.
Thus, most of the risk assessment tools that are used today for
information systems are measurements of qualitative risk.
١٤٤٢/٠٢/١٠ 15
How to assess the risks
Risk is assessed by following the following
steps :
Identifying threats
Identifying vulnerabilities Evaluate
impact
for each
Relating Threats to Vulnerabilities determining therisk
likeliho
od
determining the likelihood Relating
to Vuln Threats
erabilit
Evaluate impact for each risk Identifying ies
vulner
abilitie
s
Identif
ying th
reats
١٤٤٢/٠٢/١٠ 16
Identifying Risk
١٤٤٢/٠٢/١٠ 17
Identifying Vulnerabilities
Identifying Vulnerabilities : how each of the threats that are
possible or likely could be perpetrated , and list the organization’s
assets and their vulnerabilities
Likelihood is :
the estimation of the probability that a threat will succeed in
achieving an undesirable event
is the overall rating - often a numerical value on a defined scale
(such as 0.1 – 1.0) - of the probability that a specific vulnerability
will be exploited
١٤٤٢/٠٢/١٠ 20
Defining Impact
impact (Value)
Using the information documented during the risk
identification process, assign weighted scores based on
the value of each information asset, i.e.1-100, low-med-
high, etc
١٤٤٢/٠٢/١٠ 21
However, in order the risk assessment to be
meaningful, reusable and easily communicated,
specific ratings should be produced for the entire
organization as below example .
١٤٤٢/٠٢/١٠ 22
Sample Risk Determination Matrix
١٤٤٢/٠٢/١٠ 23
Some Common Risk
Assessment methodologies
The following methodologies and tools were developed for
managing risks in information systems:
١٤٤٢/٠٢/١٠ 24
National Institute of Standards &
Technology
(NIST) Methodology
NIST Special Publication (SP) 800-30, Risk
Management Guide for Information Technology
Systems is the US Federal Government’s standard.
١٤٤٢/٠٢/١٠ 28
Summary of Risk Assessment Practices and
Related Benefits
١٤٤٢/٠٢/١٠ 29
Case Study
Risk Assessment
”Regulatory Organization“
١٤٤٢/٠٢/١٠ 30
Regulatory Organization
The organization’s objectives in its’ risk management plan are : :
To face any risk
concerned with loss of customer confidence, as well as monetary and productivity
losses.
Risk assessments have always been a part of doing business that leads to determine the
level of risk associated with a business function or process in order to determine the
applicable security controls.
regional offices throughout the United States with , who facilitates the process in its
geographic area; and individual business units are responsible for conducting the
assessments.
١٤٤٢/٠٢/١٠ 31
Risk Assessment Process
١٤٤٢/٠٢/١٠ 32
Conducting and Documenting the Assessment
The central office has incorporated these elements into a set of detailed
guidelines for conducting information security risk assessments ,
complementary training manual elaborating on the guidelines and
١٤٤٢/٠٢/١٠ 33
providing more detailed step-by-step procedures.
Determining Risk Level
١٤٤٢/٠٢/١٠
Risk Assessment Table
After completing the matrix, the team summarizes its findings by
assigning a composite risk level to each of the five areas of
vulnerability on the matrix.
١٤٤٢/٠٢/١٠ 36
Identifying Needed Controls Based
on Predetermined Requirements
١٤٤٢/٠٢/١٠ 37
Reporting and Ensuring That
Agreed Actions Are Taken
After determining the minimum set of
controls, the team compares those required
controls with controls already in place and
identifies any gaps.
١٤٤٢/٠٢/١٠ 39
Goals of Security Plan
Main Goal :Protect information and data
Details Goals :
Protect the security and confidentiality of Protected Information;
Protect against anticipated threats or hazards to the security or integrity of
such information
Protect against unauthorized access to or use of Protected Information
Provides for mechanisms to: Identify and assess the risks that may threaten
Protected Information maintained by Arizona State University;
Designate employees responsible for coordinating the program;
Design and implement a safeguards program
Manage the selection of appropriate service providers
Adjust the plan to reflect changes in technology, the sensitivity of Protected
Information, and internal or external threats to information security; and
reference related policies, standards, and guidelines.
١٤٤٢/٠٢/١٠ 40
Identification and Assessment of
Risks to Customer Information
Arizona State University recognizes that it has both internal
and external risks. These risks include, but are not limited to:
١٤٤٢/٠٢/١٠ 42
Who has the responsibility of
assessing the risk
The University Technology Officer, in consultation with an advisory
committee, is responsible for the maintenance of information security
and privacy.
١٤٤٢/٠٢/١٠ 43
Design and Implementation of Safeguards Program
Minimizing risk and safeguarding covered data and information security can be
achieved by Employee Management and Training
Physical Security can be achieved by limiting access to only those employees who
have a business reason to know such information and requiring signed
acknowledgement of the requirement to keep Protected Information private
١٤٤٢/٠٢/١٠ 44
Conclusion
١٤٤٢/٠٢/١٠ 45
Summary notes
The knowledge of the following are important to do the useful risk
assessment
١٤٤٢/٠٢/١٠ 46
Very Important Note
Since risks and threats change over time, it is
important that organizations periodically
reassess risks and reconsider the suitability
and effectiveness of the policies and controls
they have selected.
١٤٤٢/٠٢/١٠ 47