SlideShare a Scribd company logo
Principles of Information Security,
Fifth Edition
Chapter 5
Risk Management
Lesson 1 – Risk
Management
Learning Objectives
• Upon completion of this material, you should be
able to:
– Define risk management, risk identification, and risk
control
– Describe how risk is identified and assessed
– Assess risk based on probability of occurrence and
likely impact
– Explain the fundamental aspects of documenting risk
via the process of risk assessment
Principles of Information Security, Fifth Edition 2
Learning Objectives (cont’d)
– Describe the various risk mitigation strategy options
– Identify the categories that can be used to classify
controls
– Discuss conceptual frameworks for evaluating risk
controls and formulate a cost-benefit analysis
Principles of Information Security, Fifth Edition 3
Introduction
• Organizations must design and create safe
environments in which business processes and
procedures can function.
• Risk management: the process of identifying,
assessing, and reducing risks facing an organization
• Risk identification: the enumeration and
documentation of risks to an organization’s
information assets
• Risk control: the application of controls that reduce
the risks to an organization’s assets to an acceptable
level
Principles of Information Security, Fifth Edition 4
An Overview of Risk Management
• Know yourself: identify, examine, and understand
the information and systems currently in place
• Know the enemy: identify, examine, and
understand the threats facing the organization
• Responsibility of each community of interest within
an organization to manage the risks that are
encountered
Principles of Information Security, Fifth Edition 5
Principles of Information Security, Fifth Edition 6
The Roles of the Communities of
Interest
• Information security, management and users, and
information technology all must work together.
• Communities of interest are responsible for:
– Evaluating the risk controls
– Determining which control options are cost effective
for the organization
– Acquiring or installing the needed controls
– Ensuring that the controls remain effective
Principles of Information Security, Fifth Edition 7
Risk Appetite and Residual Risk
• Risk appetite: It defines the quantity and nature of risk
that organizations are willing to accept as trade-offs
between perfect security and unlimited accessibility.
– Reasoned approach is one that balances the expense
of controlling vulnerabilities against possible losses if
the vulnerabilities are exploited.
• Residual risk: risk that has not been completely
removed, shifted, or planned for
– The goal of information security is to bring residual risk
into line with risk appetite.
Principles of Information Security, Fifth Edition 8
Principles of Information Security, Fifth Edition 9
Risk Identification
• Risk management involves identifying, classifying,
and prioritizing an organization’s assets.
• A threat assessment process identifies and
quantifies the risks facing each asset.
Principles of Information Security, Fifth Edition 10
Principles of Information Security, Fifth Edition 11
Plan and Organize the Process
• The first step in the risk identification process is to
follow your project management principles.
• Begin by organizing a team with representation
across all affected groups.
• The process must then be planned out.
– Periodic deliverables
– Reviews
– Presentations to management
• Tasks laid out, assignments made, and timetables
discussed
Principles of Information Security, Fifth Edition 12
Identifying, Inventorying, and
Categorizing Assets
• Iterative process: Begins with the identification and
inventory of assets, including all elements of an
organization’s system (people, procedures, data
and information, software, hardware, networking)
• Assets are then categorized.
Principles of Information Security, Fifth Edition 13
Principles of Information Security, Fifth Edition 14
People, Procedures, and Data Asset
Identification
• Human resources, documentation, and data
information assets are more difficult to identify.
• Important asset attributes:
– People: position name/number/ID; supervisor;
security clearance level; special skills
– Procedures: description; intended purpose; relation
to software/hardware/networking elements; storage
location for reference; storage location for update
– Data: classification; owner/creator/manager; data
structure size; data structure used; online/offline;
location; backup procedures employed
Principles of Information Security, Fifth Edition 15
Hardware, Software, and Network
Asset Identification
• What information attributes to track depends on:
– Needs of organization/risk management efforts
– Preferences/needs of the security and information
technology communities
• Asset attributes to be considered are name, IP
address, MAC address, element type, serial
number, manufacturer name, model/part number,
software version, physical or logical location, and
controlling entity.
Principles of Information Security, Fifth Edition 16
Asset Inventory
• Unless information assets are identified and
inventoried, they cannot be effectively protected.
• Inventory process involves formalizing the
identification process in some form of organizational
tool.
• Automated tools can sometimes identify the system
elements that make up hardware, software, and
network components.
Principles of Information Security, Fifth Edition 17
Asset Categorization
• People comprise employees and nonemployees.
• Procedures either do not expose knowledge useful to
a potential attacker or are sensitive and could allow
adversary to gain advantage.
• Data components account for the management of
information in transmission, processing, and storage.
• Software components are applications, operating
systems, or security components.
• Hardware: either the usual system devices and
peripherals or part of information security control
systems
Principles of Information Security, Fifth Edition 18
Classifying, Valuing, and Prioritizing
Information Assets
• Many organizations have data classification
schemes (e.g., confidential, internal, public data).
• Classification of components must be specific
enough to enable the determination of priority levels.
• Categories must be comprehensive and mutually
exclusive.
Principles of Information Security, Fifth Edition 19
Data Classification and Management
• Variety of classification schemes are used by
corporate and military organizations.
• Information owners are responsible for classifying
their information assets.
• Information classifications must be reviewed
periodically.
• Classifications include confidential, internal, and
external.
Principles of Information Security, Fifth Edition 20
Data Classification and Management
(cont’d)
• Security clearances
– Each data user must be assigned authorization level
indicating classification level.
– Before accessing specific set of data, the employee
must meet the need-to-know requirement.
• Management of classified data includes storage,
distribution, transportation, and destruction.
• Clean desk policy
• Dumpster diving
Principles of Information Security, Fifth Edition 21

More Related Content

What's hot (20)

PPT
Lesson 2- Information Asset Valuation
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
PPT
Lesson 1 - Introduction
PDF
Ise viii-information and network security [10 is835]-solution
PPT
Lesson 1 - Technical Controls
PPT
Lesson 3- Fair Approach
PPT
Lessson 2 - Application Layer
PPT
Lesson 1- Information Policy
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
PPT
Introduction to information security - by Ivan Nganda
Lesson 2- Information Asset Valuation
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 2
Lesson 1 - Introduction
Ise viii-information and network security [10 is835]-solution
Lesson 1 - Technical Controls
Lesson 3- Fair Approach
Lessson 2 - Application Layer
Lesson 1- Information Policy
Information Assurance And Security - Chapter 1 - Lesson 1
Introduction to information security - by Ivan Nganda
Ad

Similar to Lesson 1 (20)

PPT
Lesson 1- Risk Managment
PPTX
Module 3_Lesson 7.pptx
PPT
Principles of information security chp 4.ppt
PPTX
Introduction to Information security ppt
PPTX
Introduction to Information security ppt
PPTX
Step by-step for risk analysis and management-yaser aljohani
PPTX
Step by-step for risk analysis and management-yaser aljohani
PDF
CHAPTER 5 -Information assurance management.pdf
PDF
1 info sec+risk-mgmt
PPT
Information security
PDF
internet securityand cyber law Unit3 1
PPTX
L1_Introduction.pptx
PPT
ch14.ppt
PPT
Risk management Risk managementRisk managementRisk managementRisk managementR...
PDF
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
PPT
Introduction to information security
PPT
01Introduction to Information Security.ppt
PPTX
Information Security and Risk Management.pptx
Lesson 1- Risk Managment
Module 3_Lesson 7.pptx
Principles of information security chp 4.ppt
Introduction to Information security ppt
Introduction to Information security ppt
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
CHAPTER 5 -Information assurance management.pdf
1 info sec+risk-mgmt
Information security
internet securityand cyber law Unit3 1
L1_Introduction.pptx
ch14.ppt
Risk management Risk managementRisk managementRisk managementRisk managementR...
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
Introduction to information security
01Introduction to Information Security.ppt
Information Security and Risk Management.pptx
Ad

More from MLG College of Learning, Inc (20)

PPTX
PPTX
PC111-lesson1.pptx
PPTX
PC LEESOON 6.pptx
PPTX
PC 106 PPT-09.pptx
PPTX
PPTX
PPTX
PPTX
PC 106 Slide no.02
PPTX
PPTX
PPTX
PC 106 Slide 1.pptx
PDF
Db2 characteristics of db ms
PDF

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
master seminar digital applications in india
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Lesson notes of climatology university.
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Yogi Goddess Pres Conference Studio Updates
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharmacology of Heart Failure /Pharmacotherapy of CHF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
master seminar digital applications in india
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O7-L3 Supply Chain Operations - ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Lesson notes of climatology university.
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
VCE English Exam - Section C Student Revision Booklet
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Lesson 1

  • 1. Principles of Information Security, Fifth Edition Chapter 5 Risk Management Lesson 1 – Risk Management
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Define risk management, risk identification, and risk control – Describe how risk is identified and assessed – Assess risk based on probability of occurrence and likely impact – Explain the fundamental aspects of documenting risk via the process of risk assessment Principles of Information Security, Fifth Edition 2
  • 3. Learning Objectives (cont’d) – Describe the various risk mitigation strategy options – Identify the categories that can be used to classify controls – Discuss conceptual frameworks for evaluating risk controls and formulate a cost-benefit analysis Principles of Information Security, Fifth Edition 3
  • 4. Introduction • Organizations must design and create safe environments in which business processes and procedures can function. • Risk management: the process of identifying, assessing, and reducing risks facing an organization • Risk identification: the enumeration and documentation of risks to an organization’s information assets • Risk control: the application of controls that reduce the risks to an organization’s assets to an acceptable level Principles of Information Security, Fifth Edition 4
  • 5. An Overview of Risk Management • Know yourself: identify, examine, and understand the information and systems currently in place • Know the enemy: identify, examine, and understand the threats facing the organization • Responsibility of each community of interest within an organization to manage the risks that are encountered Principles of Information Security, Fifth Edition 5
  • 6. Principles of Information Security, Fifth Edition 6
  • 7. The Roles of the Communities of Interest • Information security, management and users, and information technology all must work together. • Communities of interest are responsible for: – Evaluating the risk controls – Determining which control options are cost effective for the organization – Acquiring or installing the needed controls – Ensuring that the controls remain effective Principles of Information Security, Fifth Edition 7
  • 8. Risk Appetite and Residual Risk • Risk appetite: It defines the quantity and nature of risk that organizations are willing to accept as trade-offs between perfect security and unlimited accessibility. – Reasoned approach is one that balances the expense of controlling vulnerabilities against possible losses if the vulnerabilities are exploited. • Residual risk: risk that has not been completely removed, shifted, or planned for – The goal of information security is to bring residual risk into line with risk appetite. Principles of Information Security, Fifth Edition 8
  • 9. Principles of Information Security, Fifth Edition 9
  • 10. Risk Identification • Risk management involves identifying, classifying, and prioritizing an organization’s assets. • A threat assessment process identifies and quantifies the risks facing each asset. Principles of Information Security, Fifth Edition 10
  • 11. Principles of Information Security, Fifth Edition 11
  • 12. Plan and Organize the Process • The first step in the risk identification process is to follow your project management principles. • Begin by organizing a team with representation across all affected groups. • The process must then be planned out. – Periodic deliverables – Reviews – Presentations to management • Tasks laid out, assignments made, and timetables discussed Principles of Information Security, Fifth Edition 12
  • 13. Identifying, Inventorying, and Categorizing Assets • Iterative process: Begins with the identification and inventory of assets, including all elements of an organization’s system (people, procedures, data and information, software, hardware, networking) • Assets are then categorized. Principles of Information Security, Fifth Edition 13
  • 14. Principles of Information Security, Fifth Edition 14
  • 15. People, Procedures, and Data Asset Identification • Human resources, documentation, and data information assets are more difficult to identify. • Important asset attributes: – People: position name/number/ID; supervisor; security clearance level; special skills – Procedures: description; intended purpose; relation to software/hardware/networking elements; storage location for reference; storage location for update – Data: classification; owner/creator/manager; data structure size; data structure used; online/offline; location; backup procedures employed Principles of Information Security, Fifth Edition 15
  • 16. Hardware, Software, and Network Asset Identification • What information attributes to track depends on: – Needs of organization/risk management efforts – Preferences/needs of the security and information technology communities • Asset attributes to be considered are name, IP address, MAC address, element type, serial number, manufacturer name, model/part number, software version, physical or logical location, and controlling entity. Principles of Information Security, Fifth Edition 16
  • 17. Asset Inventory • Unless information assets are identified and inventoried, they cannot be effectively protected. • Inventory process involves formalizing the identification process in some form of organizational tool. • Automated tools can sometimes identify the system elements that make up hardware, software, and network components. Principles of Information Security, Fifth Edition 17
  • 18. Asset Categorization • People comprise employees and nonemployees. • Procedures either do not expose knowledge useful to a potential attacker or are sensitive and could allow adversary to gain advantage. • Data components account for the management of information in transmission, processing, and storage. • Software components are applications, operating systems, or security components. • Hardware: either the usual system devices and peripherals or part of information security control systems Principles of Information Security, Fifth Edition 18
  • 19. Classifying, Valuing, and Prioritizing Information Assets • Many organizations have data classification schemes (e.g., confidential, internal, public data). • Classification of components must be specific enough to enable the determination of priority levels. • Categories must be comprehensive and mutually exclusive. Principles of Information Security, Fifth Edition 19
  • 20. Data Classification and Management • Variety of classification schemes are used by corporate and military organizations. • Information owners are responsible for classifying their information assets. • Information classifications must be reviewed periodically. • Classifications include confidential, internal, and external. Principles of Information Security, Fifth Edition 20
  • 21. Data Classification and Management (cont’d) • Security clearances – Each data user must be assigned authorization level indicating classification level. – Before accessing specific set of data, the employee must meet the need-to-know requirement. • Management of classified data includes storage, distribution, transportation, and destruction. • Clean desk policy • Dumpster diving Principles of Information Security, Fifth Edition 21