This document discusses risk management and outlines the key steps in the risk management process. It defines risk as a potential problem that might or might not occur and involves uncertainty and potential loss. The main steps in risk management are identifying risks, assessing risks through evaluating likelihood and impact, and controlling risks through strategies like avoidance, transference, mitigation, and acceptance. Key aspects of risk identification involve categorizing and valuing assets, identifying threats, and determining vulnerabilities. Risk assessment assigns risk ratings based on likelihood and impact. Risk control strategies aim to eliminate, transfer, reduce, or accept residual risks.
This document discusses risk management and outlines the key steps in the risk management process. It defines risk as a potential problem that might or might not occur and involves uncertainty and potential loss. The main steps in risk management are identifying risks, assessing risks through evaluating likelihood and impact, and controlling risks through strategies like avoidance, transference, mitigation, and acceptance. Key aspects of risk identification involve categorizing and valuing assets, identifying threats, and determining vulnerabilities. Risk assessment assigns risk ratings based on likelihood and impact. Risk control strategies aim to eliminate, transfer, reduce, or accept residual risks.
This document discusses risk management and outlines the key steps in the risk management process. It defines risk as a potential problem that might or might not occur and involves uncertainty and potential loss. The main steps in risk management are identifying risks, assessing risks through evaluating likelihood and impact, and controlling risks through strategies like avoidance, transference, mitigation, and acceptance. Key aspects of risk identification involve categorizing and valuing assets, identifying threats, and determining vulnerabilities. Risk assessment assigns risk ratings based on likelihood and impact. Risk control strategies aim to eliminate, transfer, reduce, or accept residual risks.
This document discusses risk management and outlines the key steps in the risk management process. It defines risk as a potential problem that might or might not occur and involves uncertainty and potential loss. The main steps in risk management are identifying risks, assessing risks through evaluating likelihood and impact, and controlling risks through strategies like avoidance, transference, mitigation, and acceptance. Key aspects of risk identification involve categorizing and valuing assets, identifying threats, and determining vulnerabilities. Risk assessment assigns risk ratings based on likelihood and impact. Risk control strategies aim to eliminate, transfer, reduce, or accept residual risks.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 6
Report by
Sudesh .R. Agrawal
RI SK MANAGEMENT What is Risk? A risk is a potential problem it might happen and it might not Conceptual definition of risk Risk concerns future happenings Risk involves change in mind, opinion, actions, places, etc. Risk involves choice and the uncertainty that choice entails Two characteristics of risk Uncertainty the risk may or may not happen, that is, there are no 100% risks (those, instead, are called constraints) Loss the risk becomes a reality and unwanted consequences or losses occur Risk Identification and Management The process of examining and documenting the security posture of an organizations information technology is called Risk Identification. Risk Identification is conducted within the larger process of identifying and justifying risk controls, known as Risk Management. Risk Management is a broad process which includes Identification, Assessment and Control within it. Steps to perform Risk Management Know your organization Identify your organizations enemies Involve relevant groups within the organization
Know yourself: In order to protect assets, which are defined as information and the systems that use, store and transmit information, everything about them must be understood. Once an understanding is achieved, protection of the data from threats can be done. Protection of the data doesnt only mean installing a mechanism and then never looking back. Each policies, education and training programs and technologies that protect information must be carefully maintained and administered to ensure that they are still effective. Know the enemy: Once organizations assets and weaknesses is known, we move forward to knowing the attacks that can take place i.e. knowing the enemy. The threats that most directly affect the organization and the security of the organizations information assets must be determined. Based on priority of the threat, they should be controlled or handled. Relevant groups: Involving groups like information security and information technology helps in managing the risk more efficiently. Information security members best understand the threats and attacks that introduce risk into the organization. IT group assist in building secure systems and operating them safely. For example, they ensure good backups to control the risk from hard drive failures.
Steps to perform Risk Identification Plan and organize the risk identification process. Categorize system components/assets. Identify threats to the categorized assets. Tie specific threats to specific, vulnerable assets.
Asset Identification and Valuation This process begins with the identification of assets, including all of the elements of an organizations system: people, procedures, data and information, software, hardware and networking elements. Then classification and categorization of the assets is done. According to SecSDLC, people are categorized in employees and nonemployees. Each of them are further divided based on trust factor. Procedures are standard and sensitive procedures; data is transmission, processing and storage and so on. Hardware is assigned to either the usual systems devices and peripherals or the devices that are part of information security control systems. Categorization of asset: Categorization is done on the basis of following data gathering questions: Which information asset is the most critical to the success of the organization? Which information asset generates the most revenue? Which information asset would be the most expensive to replace? Which information asset would be the most expensive to protect? Categorization of threat: Categorization of threat is done on the basis of following data gathering questions: Which threat present a danger to an organizations assets in given environment? Which threats represent the most danger to the organizations information? How much would it cost to recover from a successful attack? Which of the threats would require the greatest expenditure to prevent? According to study by Professor Mike Whitman, highest weighted threat is Deliberate software attack followed by Act of human error or failure and lowest weighted is forces of natures followed by compromises to intellectual property.
Threat Identification:
Risk Assessment After the assets are identified, along with their threats and vulnerabilities, risk assessment is done. It assigns a risk rating or score to each specific information asset. This number is useful in gauging the relative risk introduced by each information and facilitates making comparative rating later in the risk control process. For the purpose of relative risk assessment, risk equals likelihood of vulnerability occurrence times value (or impact) minus percentage risk already controlled plus an element of uncertainty. Risk Control After identifying and assessing the risk, the task is to control the risk. Following are the four risk control strategies: Apply safeguards that eliminate or reduce the remaining uncontrolled risks for the vulnerability (avoidance). Transfer the risk to other areas or to outside entities (transference). Reduce the impact should the vulnerability be exploited (mitigation). Understand the consequences and accept the risk without control or mitigation (acceptance).
Avoidance: Avoidance is the risk control strategy that attempts to prevent the exploitation of the vulnerability. This is the preferred approach, as it seeks to avoid risk in its entirety rather than dealing with it after it has been realized. It is accomplished through countering threats, removing vulnerabilities in assets, limiting access to assets and adding protective safeguards. Transference Transference is the control approach that attempts to shift the risk to other assets, other processes or other organizations. This may be accomplished through rethinking how services are offered, revising deployment models, outsourcing to other organizations, purchasing insurance or by implementing service contracts with providers. Mitigation Mitigation is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. This approach includes three types of plan: The disaster recovery plan, Incident response plan and Business continuity plan Each of these strategies depend on the ability to detect and respond to an attack as quickly as possible. Mitigation begins with the early detection that an attack is in progress. Acceptance In contrast to mitigation, acceptance of risk the choice is to do nothing to protect vulnerability and to accept the outcome of its exploitation. This may or may not be a conscious business decision. This control or rather lack of control is based on the assumption that it may be a prudent business decision to examine the alternatives and determine that the cost of protecting an asset doesnt justify the security expenditure. For example, it would cost an organization $100,000 per year to protect a server whereas for $10,000, the server information can be replaced, replacing the server itself and cover associated recovery costs.
Conclusion The management of the organization must structure the IT and information security functions to lead a successful defense of the organizations information assets. To achieve this goal, risk management process is to be used to build up the defense, so that no matter how strong the offense of enemy is, organization stand in its position.