Security Project
Security Project
Security Project
MANAGEMENT
The risk analysis process gives management the
information it needs to make educated judgments
concerning information security. The procedure
identifies the existing security controls, calculates
vulnerabilities, and evaluates the effect of threats on each
area of vulnerability.
In most cases, the risk analysis procedure attempts to
strike an economic balance between the impact of risks
and the cost of security solutions intended to manage
them.
At the basis of selecting cost-effective protective
measures is the assumption that the cost of controlling
any risk should not exceed the maximum loss associated
with the risk.
For example, if the potential loss attributable to a risk is
estimated to be $100,000, the cost of the protective
measures intended to prevent that loss should not exceed
that amount.
In other cases, however, the decision to implement (or
not implement) countermeasures may be driven by the
importance of the system or its data or by mandates as
opposed to its cost.
In either case, the sum of averted risks must be
considered where a single remedy will reduce several
risks. The analyst must also consider the use and
interaction of multiple remedies. One remedy may
improve or negate the effectiveness of another.
These considerations form the basis for determining
which protective measures are the most appropriate.
After having evaluated the loss of each risk, assessments
can be made about the funds that can be allocated to
lessen the estimated annual losses to an acceptable level.
Threat Definition
A threat is a potential force that could degrade the
confidentiality (compromise),
accuracy (integrity), or avail-ability (denial of service) of
the system or network.
Threats can be human (intentional or unintentional) or
environmental (natural or
fabricated).
In-Place Countermeasures
Credit must be given for all in-place countermeasures.
Identifying in-place countermeasures is part of the up
front data gathering process in any risk analysis process.
Countermeasures can be categorized as Technical or
Administrative with sub categories of each type as
follows: Preventive This type countermeasure is
designed to prevent damage or impact from an action or
event from occurring.
Detective These countermeasures provide some type of
notification that something has gone wrong. Corrective
Some countermeasures have the ability to correct
identified problems, such as the loss of a bit in a word.
Countermeasure Definition Countermeasures are the
protection measures that reduce the level of vulnerability
to threats. For recommendation purposes, they come in
two flavors; required and discretionary.
Both types of in-place countermeasures are identified as
part of the initial data gathering activity.
The following axiom applies to countermeasures: Axiom
4: All countermeasures have inherent vulnerabilities.
Postulation:
A vulnerability level of ZERO can never be obtained
since all countermeasures have vulnerabilities
themselves. For this reason, vulnerability can never be
zero, and thus risk can never be totally eliminated.
Required Countermeasures
All countermeasures in this category can be traced to
one or more written rules or regulations. The sensitivity
of data being stored and/or processed on a system or
network, and its mode of operation, determine which
regulations apply. This, in turn, determines the required
countermeasures.