Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Security
Security Risk Management
Risk Management
At the end of this course the students will be able to :
•Define the phenomenon of risk.
•Explain the various types of risks in human life.
•Describe the various risks involved in the business
world.
•Discuss the role of security in business risk
environment.
•Identify the components of risk in a security
environment.
•Describe the process of risk management
•Apply effectively the risk assessment
methodologies.
•Describe the decision making process in risk
mitigation.
•Develop risk exposure matrix chart.
•interpret the risk metrics derived from the chart.
•Generate a report based on the interpretation of
the
matrix chart.
LIFE IS FULL OF STRESS – OH! WHAT A
RISKY LIFE
The Risk factor
RISK is seen by many people in terms of their own personal
experiences…-
he following quotation is one which exemplifies a typical approach to risk
Directly affects
RISK
Asset
Can damage
Exposure
Safeguard And causes an
Can be counter
measured by a
The Ingredients of an Attack
Threat + Motive + Method + Vulnerability = ATTACK!
Good security Security
controls can stop Controls &
certain attacks Policies
Natural
Disasters
Methods Poor Security
and Policies could
Tools Let an attack
through
ASSETS
Motives Methods
Man-made
and and
Threats
Goals Tools
Vulnerabilities
Methods
and
Tools NO security policies or
Natural controls could be disastrous
Disasters
Basically risk analysis and risk
management are defined as
follows:
Identify
Baseline Classify Evaluate Prioritize
Or Risks Risks Risks
Project New Risks
Start
Identify Analyze
Communicate Risks
Inside and Outside
The Project Team * Modified from the SEI Risk
Management Paradigm
Communication Copyright Carnegie Melon University
QUIZ – SECURITY RISK MANAGEMENT 17-1-01
ANALYSIS
RISKS
MANAGEMENT
COUNTERMEASURES
Risk Management Process
Define Scope
Identify Assets
‘Value’ Assets -
Impact of Failure
Assess Likelihood
of Threat
Determine
Residual Risk
Risk Analysis
• Risk Analysis is a method of identifying and
assessing the possible damage that could be
caused on order to justify security safeguards.
• Two types of risk analysis:
– Quantitative – attempts to assign real numbers to
the costs of safeguards and the amount of damage
that can take place
– Qualitative – An analysis that judges an
organization’s risk to threats, which is based on
judgment, intuition, and the experience versus
assigning real numbers to this possible risks and
their potential loss
Risk Analysis Model
Assets
Threats
Vulnerabilities Controls
Components of Risk Assessment
Asset Threat Vulnerability Mitigation
What are What are How could What is
you trying to you afraid of the threat currently
assess? happening? occur? reducing
the risk?
Impact Probability
What is the How likely is
+
impact to the the threat
business? given
the controls?
=
Current Level of
Risk
What is the probability that the threat
will overcome controls to successfully
exploit the vulnerability and impact
the asset?
Assets
• People
• Property
• Information
Threat
Vulnerability
COUNTERMEASURES/SAFEGUARDS
COUNTERMEASURES/SAFEGUARDS
Steps of Quantitative Risk
Analysis
• Assign value to assets (tangible and
intangible)
• Estimate potential loss per risk
• Perform a threat analysis
• Derive the overall loss potential per risk
• Choose safeguards / countermeasure for
each risk
• Determine Risk Response (e.g. mitigation,
avoidance, acceptance)
Quantitative Risk Analysis
• Exposure Factor (EF) = Percentage of asset loss caused by
identified threat; ranges from 0 to 100%
Brainstormin
g
Evaluate the Risk
Very High 10
High 8-9
Medium High 7
Medium 5-6
Medium Low 4
Low 2-3
Very Low 1
ASSET RATING
ASSESSMENT
THREAT RATING
Very High 10
High 8-9
Medium High 7
Medium 5-6
Medium Low 4
Low 2-3
Very Low 1
QUANTIFYING THREAT VALUE
• Very High – Known aggressors or hazards highly capable of
causing loss of, or damage to, the facility exist. One or more
vulnerabilities are present. The aggressors are known or highly
suspected of having intent to exploit the facility’s assets and
are known or highly suspected of performing surveillance on a
facility.
Very High 10
High 8-9
Medium High 7
Medium 5-6
Medium Low 4
Low 2-3
Very Low 1
VULNERABILI
TY
ASSESSMENT
ISK ASSESSMENT
• 3 hours - 1
• 1 day - 2
• 1 week - 3
• 1 month - 4
• ≥2 months - 5
Financial Loss / Disruption to Activities : Assignment of Values
Result in l
Measure Threats and Vulnerabilities
CONSEQUENCE
CONTROLS IN PLACE
VULNERABILITY - =
Probability Definition Scale
Frequency in which threat will exploit vulnerability
independent of harm
Probability of each asset/threat/vulnerability combination
should be quantified:
Extreme = > once per day - 5
Very High = > once per month - 4
High <= once per month - 3
Medium <= once every 6 months - 2
Low <= once per year - 1
Negligible Unlikely to occur - 0
Harm Definition Scale
Impact if threat exploits vulnerability independent of probability
Harm of each asset/threat/vulnerability combination should be
quantified:
•Permanent shutdown /Complete compromise - Grave - 5
•Extended outage and / or loss of connectivity
Compromise of large amounts of data or service - Serious - 4
Scale Definition
Cost of Cost of
Security Insecurity