120x Filetype PPTX File size 1.54 MB Source: bahan-ajar.esaunggul.ac.id
The purpose of risk management Ensure overall business and business assets are safe Protect against competitive disadvantage Compliance with laws and best business practices Maintain a good public reputation Steps of a risk management plan Step 1: Identify Risk Step 2: Assess Risk Step 3: Control Risk Steps are similar regardless of context (InfoSec, Physical Security, Financial, etc.) This presentation will focus on controlling risk within an InfoSec context Risk Identification The steps to risk identification are: Asset Asset Type Asset Priority Level and Function (Low, Identify your organization’s Subcategory Medium, High, information assets Critical) Bob Worker Personnel: • Secure Low Classify and categorize said assets InfoSec Networks into useful groups • Penetrati on Rank assets necessity to the Testing organization • Make coffee To the right is a simplified example of Cisco UCS Hardware: • Database High how a company may identify risks B460 M4 Networking Server Blade Server Customer Data: • Provide Critical Personally Confidential informatio Identifiable Information n for all Information business (PII) transactio ns Windows 7 Software: • Employee Medium Operating access to System enterprise software Risk Assessment Threat Targeted Threat Possible Risk Agent Asset Level Exploits (Scale of The steps to risk and 1-5) assessment are: Threat Identify threats and threat agents Prioritize threats and threat agents Disgruntle Company High Access 4.16 d Insider: data (i.e. control Assess vulnerabilities in current Steal Customer credentials InfoSec plan company PII) , informatio knowledge Determine risk of each threat n of InfoSec to sell policies, R = P * V – M + U etc. R = Risk Fire: Burn Company Critical Mishandle 2.78 P = Probability of threat attack the facility Facility, d down or Personnel, equipment V = Value of Information Asset cause Equipment major M = Mitigation by current controls damage U = Uncertainty of vulnerability Hacktivists Company Low Lack of 1.39 The table to the right combines elements of : Quality of Hardware/ effective service Software filtering all of these in a highly simplified format deviation Risk control The steps to risk control are: • Cost-Benefit Analysis (CBA) • Single Loss Expectancy (SLE) • Annualized Rate of Occurrence (ARO) • Annual Loss Expectancy (ALE) • Annual Cost of the Safeguard (ASG) • Feasibility Analysis • Organizational Feasibility • Operational Feasibility • Technical Feasibility • Political Feasibility • Risk Control Strategy Implementation
no reviews yet
Please Login to review.