ICT380 - Workshop 9
ICT380 - Workshop 9
ICT380 - Workshop 9
It is very necessary to manage the risks in the project to make sure that the project keeps
working in the way it is supposed to. To achieve this we must identify the risk which we did in
the previous assignment and then we need to develop the strategy to manage the risk. There
can be five type of risk response and they are:
Defense
This is the strategy where we defend our system from the risk by changing the scope, planning
and scheduling activities in a different manner. We use this strategy when we are well aware of
the possibility of the occurrence of the risk and we have the tools to defend the system against
the risk and protect the system from having any serious damage.
For example, if the company is using an outdated operating system then in defense to this risk
we can change the operating system to a newer version.
Transfer
This strategy means that we can transfer the risk to some other third party supplier or vendor
who is professionally capable to handle the risk type. This strategy is used when handling of
certain risk is not possible with the current capability of the company or handling by self will
mean investing a lot of time, effort or money which does not seems logical.
For example certain data link at the client side is not active and due to that the company is not
able to send data to that client. Now we can transfer this risk to the client’s end as it will be
their IT department’s responsibility to fix the issue.
Mitigation
The risk of a system is the combination of Level of the risk means the severity of the risk and
the probability of the risk to occur in the real life. Now to mitigate the risk means that we can
reduce the severity of risk means the effect of the risk is reduced by making some adjustments
or by reducing the probability of the occurrence of the risk in the system. This way the risk will
be mitigated to some point but not entirely expired.
For example if the visitor is not escorted out of the office by someone then we can mitigate the
risk by assigning someone to escort the visitor out of the office when his work is done. This will
reduce the probability of the occurrence of the risk and it does not completely terminates the
risk.
Acceptance
If for certain type of risk, we do not take any action and just accept the risk, then that type of
risk response strategy is called acceptance. This strategy is used for non-critical risk or the effort
involved in resolving the risk is far higher than the actual effect of the risk. The risk response of
the acceptance strategy can be active or passive. Active acceptance can be that situation when
there will be some back up plan for the risk have kept in place and passive acceptance is when
we just note down the risk and move on.
For example suppose the system is built with a BCP strategy in the event of disaster in the city
but in the case of global pandemic that BCP strategy will be useless as all the location has been
hit by the pandemic, so in this type of probable risk we can just note done the risk and do
nothing about it.
Termination
When a risk is completely mitigated and new systems have been implements which ensure that
certain type of risk will never reoccur then we can mark the risk as terminated as the risk no
longer exist.
For example if there is a risk that there is no specialised resource for certain type of technology
and when we hire a new associate for that post and he takes over the responsibility, then the
risk is terminated.
Incident Response Plan (IRP)
Incident Response Plan is the set of steps which is predetermined by the IT security team and
will be executed in the event of any cyber security breach. For this we will have a plan, a
dedicated team which will be trained to manage the incident and minimise the extent of
damage and cost of recovery. There is generally accepted 6-sets framework that is widely
accepted and used:
1. Preparation: This is the first step of the response action, the IRP needs to work like
clockwork and there cannot be any gaps. The team handling it must have all the
resources that are required for the IRP. The resources can include well documented
activity list, step-by-step guide and the internal and external communication guidelines.
2. Identification: When the team should be activated or how the team will recognise the
need to start working need to be explained. Like what the team will do if it finds that the
external server is under DDoS attack or there has been an unauthorised breach attempt
on any of the server nodes.
3. Containment: This means that intrusion is contained to some extent. Containment can
be of two types, short and long. The short containment is the immediate action when
the intrusion is contained to few of the systems to stop the spreading. The effected
systems are backed up to save data and the systems are sent for forensics. The long
term containment is when the systems are allowed to perform business activities except
the infected system and accounts.
4. Eradication: The next step is to remove the infection and restore the affected systems.
The backdoor or point of intrusion needs to be patched immediately so that this type of
breach does not happen again. The steps to restore the affected systems will be to
reimage all the systems which had the intrusion and remove any trace of the infection.
5. Recovery: This is the step to bring all the system to production after making sure that all
the systems are clean and no residual code of the intrusion is left in the system.
6. Lesson Learned: This step is performed to understand the extent of the attack and
update the breach details and any identified deficiencies or weakness in the system.
Fire
Flood and water damage
Earthquake
Hurricane
Bomb Threat
Terrorist Attack
1 Threat Matrix Malicious Intruder
Social Engineering Attack
Denial of Service Attack
Pervasive Malware Attack
Stolen Confidential Information (digital and documents)
Loss of Key Digital Files and/or Databases
Server Failure