Risk Management: "Once We Know Our Weaknesses, They Cease To Do Us Any Harm"
Risk Management: "Once We Know Our Weaknesses, They Cease To Do Us Any Harm"
• Data – management of information in all its states: Transmission, Processing and Storage.
Categorize System Components
• Software – May be assigned to one of these three categories: Applications, Operating System,
and Security Components.
• Hardware – Composed of two categories: Usual systems devices and their peripherals, and
devices that are part of information security control systems.
Asset Identification
People, Procedures, and Data
Identification
• People
• Position Name / Id Numbers (Avoid names and stick to identifying positions, roles, or functions).
• Examples: Supervisor, Security clearance level (Level 1, Level 2, etc)
• Procedures
• Description; Intended Purpose; relationship to software, hardware, and networking elements; Storage
location for reference; Storage location for update.
• Examples: Billing procedure – Bills the client…. Etc. paypal, cherry credits;
• Data
• Classification; Owner, creator, and manager; Size of data structure; data structure used, online or
offline, location, etc.
Hardware, Software and Network Asset
Identification
• Name – Use the common device or program name. Naming should not convey critical info to
attackers. Example: A server with a name of “CASH1” or “DB _FINANCE” would be a bad name.
• Asset Tag – unique number assigned during acquisition process
• Media Access Control (MAC) Address – sometimes called electronic serial numbers. The MAC
address number is used by the network operating system to identify a specific network device
• Software Version
• Serial Number – Unique identifier of a specific device.
• Manufacturer Name
• Manufacturer model or Part number
Classify and Prioritize
Assets
Data Classification
Data can be classified into 4 levels:
• Public – Information for general public dissemination, such as an advertisement or public release.
• For Official Use Only – Information that is not particularly sensitive, but not for public release, such as
internal communications.
• Sensitive – Information important to the business that could embarrass the company or cause loss to
market share if revealed.
• Classified – Information of the utmost secrecy to the organization, disclosure of which could severly
impact the well-being of the organization
Asset Ranking
• Assets should be ranked so that most valuable assets gets high priority when managing risks.
These questions help us consider when determining asset value / rank.
1. Which information asset is most critical to overall success of organization?
Example: Web servers vs Regular Desktop Computers
Web servers – critical
Regular Desktop computers – not critical
2. Which information asset generates the most revenue?
3. Which information asset generates the highest profitability?
Example: A company which sells books and beauty products
4. Which information asset is most expensive to replace?
5. Which information asset’s loss or comprise would be most embarrassing or cause greatest
liability?
Weighted Factor Analysis Worksheet
Activity
• You are assigned to be a team leader of the Risk Reduction and Management Team. You are tasked
to Categorize, Classify and Prioritize the company's assets. The following are the list of the
company's assets:
Trash Cans Water Treatment Facility Cisco Router Employee 0132 System Administrator
Finance Officer Server 1(Financial) Server 2(Backup) `Computer 5 Microsoft Office
Guest 01 Customer Billing (inbound) Help Service employee (table in database)
After categorizing these assets, create a weighted factor analysis worksheet with the following criteria
Impact to Revenue (30) Impact to Operations (30) Impact to Public Image (20)
Impact to Environment (10)
Identifying and
Prioritizing Threats
Threat identification and prioritization
• Any organization faces a wide variety of threats
• To keep risk management ‘manageable’ …
• realistic threats must be identified and further investigated, while unimportant
threats should be set aside
Question used to prioritize threats
• Which threats present a danger to organization’s assets in its
current environment
• Goal: reduce the risk management’s scope and cost.
• Which threats represent the most danger … ?
• Goal: provide a rough assessment of each threat’s potential impact
given current level of organization’s preparedness.
• ‘Danger’ might be a measured of:
1. Severity – Overall damage that the threat could create
2. Probability – of the threat attacking this particular organization
Question used to prioritize threats
• How much would it cost to recover from a successful attack?
• Which threats would require greatest expenditure to prevent?
• Once threats are prioritized, each asset should be reviewed against each threat to
create a specific list of vulnerabilities.
Example
• An organization that is located in a fault line. It has no internet connectivity. Most of
it’s employees lacks proper training in using technology. What could be the top 3
threats that this organization face?
• Forces of nature
• Human error / failure
• Technological obsolescence
Vulnerability Analysis
Vulnerability Analysis
• Vulnerability - flaw or weakness in an info asset in its design, control or security
procedure that can be exploited accidentally or deliberately.
- sheer existence of a vulnerability does not mean harm will be
caused – threat agent is required
- vulnerabilities are characterized by the level of tech. skill
required to exploit them
Vulnerability Analysis
TVA Worksheet - at the end of risk identification procedure, organization should
derive threats-vulnerabilities- assets (TVA) workshet
- this worksheet is a starting point for risk assessment phase.
- combines prioritized lists of assets and threats
> Prioritized list of assets is placed along x-axis, with most important
assets on the left
> Prioritized list of threats is placed along y-axis, with most
dangerous threats at the top
> Resulting grid enables a simplistic vulnerability assessment
TVA Worksheet
If one or more vulnerabilities exist
between T1 and A1, they can be
categorized as:
T1V1A1 – Vulnerability 1 that exists
between Threat 1 and Asset 1
T1V2A1 – Vulnerability 2 that exists
between Threat 1 and Asset 1
Risk Assessment
Summary of Vulnerability Analysis
Risk Assessment
Risk Assessment – provides relative numerical risk ratings (scores) to each specific vulnerabity
- in risk management, it is not the presence of a of a vulnerability that really
matters, but the associated risk!
Likelihood - the probability that a specific vulnerability will be the object of a successful
attack.
- in risk assessment, you assign a specific numeric value to likelihood ranging from
0.1 – 1.0.
Risk Formula
Risk Formula
𝑹=( 𝑷 ∗ 𝑽 ) − ( ( 𝑷 ∗ 𝑽 ) ∗ 𝑪𝑪 ) +( ( 𝑷 ∗ 𝑽 ) ∗ 𝑼𝑲 )
Vulnerability 1