PSIT3G3 Risk Assessment

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

Risk

Assessment
Method
What is Risk
Assessment?
Risk assessment is the way
organizations decide what to do
in the face of today’s complex
security landscape. Threats and
vulnerabilities are everywhere.
They could come from an
external actor or a careless
user. They may even be built
into the network infrastructure.
Risk Assessment
Methodologies

Organizations can take several


approaches to assess risks—
quantitative and qualitative. Each
methodology can evaluate an
organization’s risk posture, but they
all require tradeoffs.
QUALITATIVE
In qualitative risk assessment, assessors engage with
employees across the organization to understand how their work
would be impacted if critical IT systems were compromised or
went offline. Through interviews and discussions, they gather
insights into the potential consequences of various security
incidents. The risks are then categorized on broad scales such
as High, Medium, or Low, based on the feedback received.
This approach gives a general overview of how
different risks could affect the organization’s IT
operations. It’s particularly useful for
understanding the operational impact of risks
from the perspective of those who rely on the
systems daily.
STRENGTH AND
LIMITATIONS
ONE OF THE MAIN STRENGTHS OF QUALITATIVE RISK
ASSESSMENT IS ITS ACCESSIBILITY. BECAUSE IT
USES DESCRIPTIVE, NON-TECHNICAL LANGUAGE,
PEOPLE ACROSS THE ORGANIZATION ARE MORE
LIKELY TO UNDERSTAND THE RISKS AND THEIR
POTENTIAL IMPACT. THIS CAN BE ESPECIALLY
VALUABLE IN FOSTERING A SECURITY-CONSCIOUS
CULTURE WITHIN THE ORGANIZATION.
QUANTITATIVE
Quantitative risk assessment in IT security assigns dollar values
to assets and risks, making it easier for executives to
understand and prioritize security measures through cost-
benefit analysis. This method brings financial clarity to decision-
making, showing the potential return on investment for different
security strategies.

However, not all IT risks are easily quantifiable. Forcing non-


financial risks into a numerical format can lead to subjective
decisions, reducing the objectivity of the assessment.
STRENGTH AND
LIMITATIONS
THE STRENGTH OF QUANTITATIVE RISK
ASSESSMENT LIES IN ITS ABILITY TO TRANSLATE
IT SECURITY RISKS INTO FINANCIAL LANGUAGE.
THIS IS PARTICULARLY VALUABLE WHEN
SECURING BUDGET APPROVALS FOR SECURITY
INITIATIVES, AS IT CLEARLY DEMONSTRATES THE
POTENTIAL RETURN ON INVESTMENT (ROI) OF
VARIOUS MITIGATION STRATEGIES.
Many organizations combine
qualitative and quantitative
methods in their IT security risk
assessments. Qualitative
assessments provide an initial
understanding of the risks, which
can then be further analyzed using
quantitative methods to determine
the financial implications and
prioritize responses more
effectively.
Prioritizing Risks
Likelihood and Impact
Organizations prioritize IT
security risks by assessing their
likelihood (how likely a risk is to
happen) and impact (the
potential damage if it does). This
helps them focus on the most
serious risks first.
Qualitative Approach:

• Risk Categories: Risks are rated as High, Medium, or Low


based on expert judgment.
• Risk Matrix: A visual tool plots risks on a grid, showing which
are most dangerous. For example:
• High Likelihood/High Impact: Needs immediate attention.
Qualitative Approach:
• Low Likelihood/High Impact: Requires contingency plans.
• High Likelihood/Low Impact: Should be monitored regularly.
• Low Likelihood/Low Impact: Can be deprioritized.
• Pros and Cons: This method is easy to understand but can
be subjective, depending on personal judgment.
QUANTITATIVE APPROACH:
• Numerical Values: Risks are given specific numbers, like how
much money a breach might cost.
• Risk Score: A risk score is calculated by multiplying the
likelihood by the impact (Risk = Probability × Impact). This
makes it clear which risks are most costly.
• Cost-Benefit: Helps in deciding which risks to mitigate based
on potential financial loss versus the cost of prevention.
• Pros and Cons: This method is precise but can be complex
and requires data and expertise.
Case Study: Enhancing Cybersecurity in a
Retail Organization
BACKGROUND:
A large retail organization recently suffered a cyber attack, which compromised
sensitive customer information, including credit card details. This incident led to
financial losses, damage to the company’s reputation, and a decline in customer
trust. Recognizing the critical need for stronger cybersecurity, the organization seeks
to overhaul its security measures.
OBJECTIVES:
The objective is to develop and implement a comprehensive
cybersecurity strategy that leverages the latest innovations and risk
assessment methodologies to protect against future cyber threats,
ensuring the safety of customer data and the continuity of business
Step 1: Conduct a Comprehensive Risk
Assessment
Qualitative Assessment: Engage with employees across
departments to understand how potential cyber threats could
impact their work and the organization’s operations. Use
interviews and discussions to categorize risks as High, Medium,
or Low based on the perceived impact. This provides a broad
understanding of the risks from an operational perspective.

Quantitative Assessment: Assign monetary values to the


identified risks to quantify their potential impact. This allows for
a more objective prioritization of security measures based on
Step 2: Implement Zero Trust
Architecture
Transition to a Zero Trust Architecture (ZTA), where no entity—whether
internal or external—is trusted by default. Ensure that every user, device,
and application is continuously authenticated and authorized before
accessing the network. This approach significantly reduces the likelihood
of unauthorized access and strengthens the organization's overall
security posture.
Step 3: Leverage Artificial Intelligence and
Machine Learning

Integrate AI and machine learning technologies to enhance threat


detection and response capabilities. These technologies can
recognize patterns of cyber attacks, predict potential threats,
and automatically take preventive actions, thereby reducing the
chances of a successful attack.
Step 4: Adopt Blockchain Technology

Implement blockchain technology to create a secure and


immutable record of transactions, particularly for handling
sensitive customer information. Blockchain enhances data
security by making it virtually impossible to alter or tamper with
transaction records, thus protecting against fraud and ensuring
data integrity.
Step 5: Implement Biometric Authentication

Replace traditional password-based authentication with biometric


methods such as fingerprint or facial recognition. Biometric
authentication offers a higher level of security as it is more
difficult to forge or bypass, ensuring that only authorized users
can access sensitive systems and data.
Step 5: Implement Biometric Authentication

Replace traditional password-based authentication with biometric


methods such as fingerprint or facial recognition. Biometric
authentication offers a higher level of security as it is more
difficult to forge or bypass, ensuring that only authorized users
can access sensitive systems and data.
Outcome:

The organization successfully improved its cybersecurity, preventing further

breaches and restoring customer trust. The enhanced security measures

minimized financial losses and ensured uninterrupted business operations.


Lessons Learned:
1.Risk Assessment is Essential: Regularly assess risks to identify and prioritize
potential threats
.2. Zero Trust Enhances Security: Always verify access to reduce the risk of
unauthorized breaches.
3. Use Advanced Technologies: AI, machine learning, and blockchain can
significantly improve threat detection and prevention.
4. Biometric Authentication is More Secure: It’s harder to bypass than
traditional passwords.
5. Continuous Innovation is Key: Constantly update security measures to stay
ahead of new threats.
Conclusion:
By following these steps, the retail organization can build a robust
cybersecurity framework that not only protects sensitive customer data but
also enhances operational continuity. Leveraging innovative technologies and
conducting thorough risk assessments will enable the organization to stay
ahead of emerging cyber threats and maintain customer trust.
THANK YOU!

You might also like