IISITv6p595 615nikolic673 PDF
IISITv6p595 615nikolic673 PDF
IISITv6p595 615nikolic673 PDF
Risk Assessment of
Information Technology Systems
Božo Nikolić and Ljiljana Ružić-Dimitrijević
The Higher Education Technical School of Professional Studies,
Novi Sad, Serbia
[email protected]; [email protected]
Abstract
Risk assessment is a structured and systematic procedure, which is dependent upon the correct
identification of hazards and an appropriate assessment of risks arising from them, with a view to
making inter-risk comparisons for purposes of their control and avoidance. There are differences
in the methodology used to conduct risk assessments.
This paper presents some methodologies of risk management in the IT (information technology)
area. In addition, a method of risk assessment created and applied by our expert team in this area
is described. As there is a similarity between these methodologies, the paper presents the use of
methods from the occupational health area in the IT area. All items in the risk assessment meth-
odology for working environment and workplace are modified to IT as working environment and
to an application as a workplace.
In that way, the risk assessment process in the safety analysis of an IT system is carried out by an
original method from the occupational health area.
Keywords: risk assessment, information technology, risk management.
Introduction
Information technology, as a technology with the fastest rate of development and application in
all branches of business, requires adequate protection to provide high security. The aim of the
safety analysis applied on an information system is to identify and evaluate threats, vulnerabilities
and safety characteristics. IT assets are exposed to risk of damage or losses. IT security involves
protecting information stored electronically. That protection implies data integrity, availability
and confidentiality. Nowadays, there are many types of computer crimes: money theft 44%,
damage of software 16%, theft of information 16%, alteration of data 12%, theft of services 10%,
trespass 2% (Boran, 2003).
In order to minimize losses, it is necessary to involve risk management and risk assessment in the
areas of information technology and
M aterial published as part of this publication, either on-line or operational risks. Risk management and
in print, is copyrighted by the Informing Science Institute.
Permission to make digital or paper copy of part or all of these risk assessment are the most important
works for personal or classroom use is granted without fee parts of Information Security Manage-
provided that the copies are not made or distributed for profit ment (ISM). There are various defini-
or commercial advantage AND that copies 1) bear this notice tions of Risk Management and Risk As-
in full and 2) give the full citation on the first page. It is per-
missible to abstract these works so long as credit is given. To sessment [ISO 13335-2], [NIST],
copy in all other cases or to republish or to post on a server or [ENISA Regulation], but most experts
to redistribute to lists requires specific permission and payment accept that Risk Management involves
of a fee. Contact [email protected] to request analysis, planning, implementation, con-
redistribution permission.
Risk Assessment of Information Technology System
trol and monitoring of implemented measurements, and Risk Assessment, as part of Risk Man-
agement. It consists of several processes:
• Risk identification,
• Relevant risk analysis,
• Risk evaluation
Risk Management recognizes risk, accesses risk, and takes measures to reduce risk, as well as
measures for risk maintenance on an acceptable level. The main aim of Risk Assessment is to
make a decision whether a system is acceptable, and which measures would provide its accept-
ability. For every organization using IT in its business process it is significant to conduct the risk
assessment. Numerous threats and vulnerabilities are presented and their identification, analysis,
and evaluation enable evaluation of risk impact, and proposing of suitable measures and controls
for its mitigation on the acceptable level.
The security policy has changed in the last years. From checklists for identifying specific events,
the information security has risen onto a higher level, i.e. the security policy and strategy consider
threats and weaknesses of the business environment, and IT infrastructure (Dhillon, 2001).
Risk Management
In the process of risk identification, its sources are distinguished by a certain event or incident. In
that process, the knowledge about the organization, both internal and external, has an important
role. Besides, past experiences from this or a similar organization about risk issues, are very use-
ful. We can use many techniques for identifying risk: checklists, experienced judgments, flow
charts, brainstorming, Hazard and Operability studies, scenario analysis, etc.
In order to assess the level of risk, likelihood and the impact of incidental occurrences should be
estimated. This estimation can be based on experience, standards, experiments, expert advice, etc.
Since every event has various and probably multiple consequences, the level of risk is calculated
as a combination of likelihood and impact. Risk analysis or assessment can be quantitative, semi-
quantitative, and qualitative (Macdonald, 2004).
Quantitative approach to risk assessment assigns numerical values to both impact and likelihood.
The quantitative measure of risk calculated by statistical model is used to judge whether or not it
is acceptable. Figure 1 represents relations between consequences, likelihood and limits of accep-
tance.
Event A has both low values, and risk is acceptable as far as it is under the limits. Event C is
above the limits with high frequency and huge consequence. It is unacceptable, and it needs some
measurements to reduce consequence and/or probability. For event B, which is in grey zone be-
tween the limits, it is hard to make decision.
596
Nikolić & Ružić-Dimitrijević
Frequency/Probability of occurrence
Unacceptable
B
AA Grey
area
Acceptable
Consequence
Figure 1: Evaluation of risk
597
Risk Assessment of Information Technology System
Information Security Agency) document about risk management, several of them, a total of 13,
have been discussed (“Risk Management”, 2006). Some of them are part of an ISO standard, i.e.
Guidelines for the management of IT security; others are developed by governments or national
offices for IT security.
All methods should present common descriptions of threats, vulnerabilities, assets groups, and,
finally, a classification of risks. In that way they can be compared, and in order to achieve the
best results, it is useful to apply the combination and optimization of methods.
ISO standards for IT security (13335, 17799, and 27001) are general guidelines for implementing
the IT security management process, but there are no solutions for conducting it.
598
Nikolić & Ružić-Dimitrijević
599
Risk Assessment of Information Technology System
Risk scale is presented as: High (>50 to 100); Medium (>10 to 50); Low (1 to 10).
Derived risk values are expressed quantitatively and qualitatively. Values classified as high risk
level require fast corrective measures. In the case of medium risk level corrective measures are
required within a reasonable period of time, and low risk level can be accepted with or without
any action.
Step 8 provides control recommendations in order to reduce the risk to an acceptable level, and
all results from all performed steps are documented in an official risk report in the last step. This
report describes the threats, vulnerabilities, measured risk level, and recommended controls.
The second process of risk management is risk mitigation, which performs evaluation, and im-
plementation recommended controls for risk elimination or reducing.
Risk assessment is an absolutely relative process. That could be confirmed by the example in Ta-
ble 1, by changing values in the risk scale. For instance, with the next risk scale: High (50<= x
<100); Medium (10<= x <50); Low (0< x < 10), we would obtain Table 1a with different risk
values.
Table 1a: Risk-Level Matrix
Impact
Threat
Low Medium High
Likelihood
(10) (50) (100)
Medium High High
High (1.0)
10* 1.0=10 50* 1.0=50 100*1.0=100
Low Medium High
Medium (0.5)
10* 0.5=5 50* 0.5=25 100*0.5=50
Low Low Medium
Low (0.1)
10* 0.1=1 50* 0.1=5 100*0.1=10
Possibilities are various, since the same procedures are applied on impact or threat likelihood,
assigning different values to each level. It means that the risk assessment is the only assessment,
but in the same time it means that experts must be vary careful and with great experience.
The advancement of this method is in clear visualization given in the form of risk matrix as a
combination of threat likelihood and impact. However, this matrix should be used for the devel-
opment of one’s own matrix depending on experience.
600
Nikolić & Ružić-Dimitrijević
601
Risk Assessment of Information Technology System
1-2 persons 1
3-7 persons 2
8-15 persons 4
16-50 persons 8
50+ persons 12
602
Nikolić & Ružić-Dimitrijević
Hazard code
Auxiliary means DESCRIPTIVE A NA LYSIS
Hazards and
No
for determining
harmfulness Occurrence
hazard exposure Consequences Exposure frequency Risk
probability
Number of Workers
Event Probability
Level of Damage
RISK LEVEL
RISK
Number of Workers
Event Probability
Level of Damage
PROCEDURE
RISK LEVEL
DEADLINE
RISK
WHO
603
Risk Assessment of Information Technology System
assessment is defined by analyzing common and particular measures of safety in the workplace
and in the work environment.
This method can be used for non-production workplaces, group workplaces, work environment,
collective offices, etc. The following assessment levels can be performed by this method:
• level of company location
• level of object or object’s part (floor, work office, plant, administrative and non-
productive workplaces …)
• level of a particular workplace and work activity
In the second approach, the probability is not defined in Table 1, but on the basis of safety as-
sessment in the next step-by-step procedure:
Step 1: safety assessment is defined as the ratio of negative marks n and the total number of
observed risk dimensions N
Step 2: probability values from tables are dependent by function:
y = 0.06 (x)2.7 (2)
where y = P, event probability, x periods for different probabilities.
n
In this case, safety status assessment variable x is equal to 8*
N
2 .7
n
Step 3: probability equation finally becomes P = 16.462 ∗ (3)
N
Step 4: the above value and values for frequency (Table 2) and consequence (Table 3) are
used for calculating the risk.
At all levels, risk assessment is conducted by finding out probability of accident (P), its frequency
(F), and harm degree as
R = P* F*H* N (4)
For each level is created a form with various elements observed in risk assessment. To each ele-
ment’s column is assigned the mark +, or – depending on the fulfilled safety status.
604
No
No.
Passages are clear, well
FLOOR NAME
+
lit and maintained in
properly conditions
NUMBER OF WORKERS
Internal transport routes
+
satisfy the regulations JOB/WORK POSITIONS (NUMBER
Co mpany : Building :
GENERA L DATA
+
passageways and work Fire risk
MAIN BUILDING
platforms
RECOMMENDED RISK
There is at least one sani-
REDUCTION MEASURES
Evacuation possibilities
+
tary room on every floor
Evacuation Routes
–
Number of sanitary points the shortest routes are well-marked,
+
spect to number of work- Doors to staircases open towards the
+
n
Building part/floor :
Analyst :
N
16 , 46
2 ,7
Doors with glass areas (staircases,
–
PROBABILITY
n
passages, hallways) are marked, pro-
and risk calculation
BILITY
PROBA-
N
16 , 46
Document Number
tected from breakage
2 ,7
FREQUENCY
Expert :
/
REMAINING RISK
IARY PREM ISES
Page Number
There is a safe approach to the roof
RISK ASSESSM ENT
+
Unit: A LL MAIN AND AUXIL-
RECOMMENDED
Form 3: Analysis of general and specific protection measures on every floor
MAINTAINING
Consulted workers: all
MENT
AN ACCEPTABLE
QUALITATIVE
Nikolić & Ružić-Dimitrijević
605
Page Num-
RISK LEVEL
Risk Assessment of Information Technology System
606
Nikolić & Ružić-Dimitrijević
There is an example of such forms. Values n (number of minus signs), and N (number of ob-
served elements) are used for calculating of probability, frequency is estimated while correspond-
ing values are from Table 2. For damage are used values from Table 3, but with modified de-
scriptors as presented in Table 3a.
Table 3a: Degree of possible harm (H)
System characteristics
Company: Higher Educational Building/ part: fl oor Unit: All main and au x- Page Number:
Technical School of iliary p remises
Ground floor
Professional Studies
Equi pment, i nstallati ons: Software: OS Windows, MS Office, educational
software, financial software, student administration
PC co mputers, wireless internet hardware, network-
software
ing hardware, printers, scanners,
System characteristics
The electrical mains supply is fro m two d istribution power transformers with two separate supply cables
into two school buildings. All co mputers are connected to the Internet either by wires or by a wireless sys-
tem.
In the institution there are three computer classrooms with 35 PCs in total and one classroom with 12 lap-
tops. In the financial depart ment there are four netwo rked PCs. In the student administration office there is
a network of 5 PCs as workstations and one PC server. Also, there is one or two PCs in every staff office.
Two co mputer classrooms are in the same building with the financial and student admin istration offices,
and there are two more in the other build ing with about 30 PCs in faculty offices.
There is an antenna for wireless Internet connection between the main server and the Internet provider. In-
ternally, all PCs are connected to the main server by wires, switches, and routers. Additionally, t wo PC
classrooms have the access to the main server by the internal wireless network.
Every co mputer has OS W indows XP, MS Office, and additional software for specific purposes.
607
–
Voltage variations
No.
608
Person:
+
Adequate updated antivirus software FLOOR NAME
Responsible
Company :
NUMBER OF computers
+
Backup and recovery procedures
Adequate storage of media in the event of NUMBER OF PERSONS EXPOSED TO
–
+
GENERA L DATA
emergency RISK
–
+
Systems placed behind firewalls and Compliance with fire regulations
/
Building :
Safety Person :
access and filter unnecessary protocols. Compliance with environmental regula-
+
Main build ing
/
traffic and as appropriate for other traffic
+
Seismic characteristics of the location
+
Restrictions regarding users and their Admissible temperature and humidity
–
connecting to wired and wireless LANs
There is an up-to-date certificate for
Ground floor
Analyst :
+
Segmented internal networks with inter- electric installations and lightning strike
/
nal firewalls and other protection in installations
Building part/floor:
depth techniques
–
+
Risk Assessment of Information Technology System
/
be restricted + Intensive magnetic fields – loss of data
Expert :
strong light
1.39
n
BILITY
N
16 , 46
PROBA-
–
2 ,7
auxiliary premises
Unit: All main and
Training of personnel
5
FREQUENCY
–
+
4
DAMAGE
hardware
Form 3a: Analysis of general and specific protection measures
27.73
software
Consulted workers: all
Page number:
Low, but
+
significant
Software maintenance
Nikolić & Ružić-Dimitrijević
AN ACCEPTABLE
RECOMMENDED
MEASURES FOR
MAINTAINING
CONCLUSION
FREQUENCY
RISK LEVEL
PROBABILITY
DAMAGE
RISK
RECOMMENDED RISK
REDUCTION MEASURES 2 ,7
16 , 46
n
N
Risk is acceptable
Purchasing of UPS equipment
and hardware.
Improvement of physical protection
0.21 Train staff peri-
1 5 1.05
Providing of security rooms for media storage odically.
Test the equip-
ment periodi-
cally.
In the first risk assessment (Form 4.1a) the probability (1.39) is calculated using the ratio of the
number of minus signs (8) and the total number of observed items (20). The values for frequency
(5) and damage (4) are estimated from Tables 2 and 3a, and the calculated risk is 27.73.
Risk reducing measures are recommended in Form 4.2a and their application should eliminate
four minus signs. The probability is now equal to 0.21, and the frequency is reduced to 1, with the
same damage. Finally, the risk is assessed as 1.05, which is an acceptable level. In order to main-
tain the risk at that level the appropriate measures are recommended.
After a common IT system safety assessment, we conducted the risk assessment of an application.
The first page includes the application description. Form 1a, Form 2.1a and Form 2.2a are similar
to Form 1, Form 2.1, and Form 2.2 respectively, the workplace in the occupational health area.
609
Risk Assessment of Information Technology System
Company: Higher Educational Department: Application: Informat ion system Page Num-
Technical School of Profes- Student admin istra- for student administration ber:
sional Studies tion
Equi pment, i nstallati ons: Software: OS Windows, student administration
PC co mputers – clients and server, networking software
hardware, printers
Protecti ve measures:
Using admission password
Antivirus software
Weekly data backup
610
Nikolić & Ružić-Dimitrijević
Hazard code
DESCRIPTIVE A NA LYSIS
No
611
Risk Assessment of Information Technology System
RISK REDUCTION
QUA NTITATIVE RISK A NALYSIS
MEASURES
Frequency of Exposure
Event Probability
Level of Damage
RISK LEVEL
RISK
Protection
Technical , Operat ional, Organizat ional
Aims
Low but
2 0.5 5 5 Install UPS equipment
significant
2 0.1 5 1 /
2 0.1 5 1 Negligible /
2 0.5 4 4 /
Data safety, processes safety
612
Nikolić & Ružić-Dimitrijević
CONCLUSION
LEVEL
Frequency of Exposure
Event Probability
Level of Damage
PROCEDURE
RISK LEVEL
DEADLINE
RISK
WHO
2 0.1 5 1 / / /
2 0.1 5 1 Negligible / / /
Risk is acceptable
2 0.5 4 4 / / /
System
613
Risk Assessment of Information Technology System
Conclusion
Advantages of our risk assessment method are:
• The method is original with the official name VTS method
• The application of method is complete because it has been approved in many enterprises
from the health and safety area
• The possibility of method application is obvious in all areas, especially in the IT area.
• All methodology requirements are fulfilled completely
• The applied method based on event probability determination by status value allows cor-
rection of particular status values in order to remove, reduce or prevent risk
• The method gives quantitative risk values and provides results suitable for comparison
• The method processes the impact of all types of threats and vulnerabilities
All conclusions given for methodology of risk assessment in the occupational health area could
be used in the risk assessment in the IT system area.
With corresponding modifications, this method offers good quality results in the risk assessment
of an IT system as well as of any of its applications. Generally, our method is based on assessing
risk level-wise from the most general to the most specific level. We applied this method to the
risk assessment of our IS in 2 levels. One includes the whole IT system, while the second in-
cludes particular applications. This could be done in more levels, such as assessing the risk of IT
systems in each building, the labs and offices. In addition, application software could be consid-
ered as a specific level. Depending on the applied software, you can come across different threats,
risks and recommended measures. We are planning to deal with these problems in our future in-
vestigation.
References
Boran, S., (2003). IT security cookbook. Boran Consulting.
Bozic, V., Kosic, S., & Niko lic, B. (2006). Regulation for risk assessment procedure in the work place and
in the workspace – comments. VTS, Novi Sad.
614
Nikolić & Ružić-Dimitrijević
BSI Standard 100-1. (2005). In formation Security Management Systems (ISMS). Retrieved May 2008, fro m
www.bsi.bund.de
BSI Standard 100-2. (2005). IT-Grundszchutz methodology. Retrieved May 2008, fro m www.bsi.bund.de
BSI Standard 100-3. (2005). Risk analysis based on IT-Grundszchutz. Retrieved May 2008, fro m
www.bsi.bund.de
Dhillon, G. (2001). In formation security management: Global challenges in the new millennium. Idea
Group Publishing.
Harms-Ringdahl, L. (2001) Safety analysis: Principles and practice in occupational safety. CRC Press.
Laban, M., Krnjet in, S., & Niko lic, B. (2007). Risk management and risk assessment in the enterprise.
Symposium about Occupational Safety and Health, Novi Sad, pp. 44-57.
Macdonald, D. (2004). Practical machinery safety. Pondicherry, India: Integra So ftware Serv ices.
Nikolic, B., (2007). Enact ment about risk assessment. Symposium about Occupational Safety and Health,
Novi Sad, pp. 32-43.
Nikolic, B., & Laban, M. (2008). Occupational health and safety risk assessment method. 17 th International
Symposium ECOLOGY 2008, Sunny Beach Resort, Bulgaria.
Risk Management. (2006). Implementation principles and Inventories for Risk Management/Risk Assess-
ment methods and tools. Conducted by the Technical Depart ment of ENISA Section Risk Manage-
ment, June 2006
Ruzic-Dimitrijevic, L., & Niko lic, B., (2008). Designing and building an info rmation system for a h igher
education institution. Proceedings of the 2008 Informing Science and IT Education Conference - In-
SITE 2008, Bu lgaria. Retrieved fro m
http://proceedings.informingscience.org/InSITE2008/InSITE08p 283-300Ru zic521.pdf
Stoneburner, G., Gougen, A., & Feringa, A., (2002). Risk management guide for information technology
systems. Reco mmendations of the NATIONA LE Institute of Standards and Technology (NIST) USA.
Biographies
Bozo Nikolić is a professor at the Higher Education Technical School
of Professional Studies, Novi Sad, Serbia. He teaches courses in the
fields of mechanical engineering and labour safety. He got his PhD
degree in mechanical engineering at the Belgrade University in 1998.
His areas of expertise are tools, accessories, and risk assessment re-
garding workplace and workspace. He is director of the Higher Educa-
tion Technical School of Professional Studies.
615