SlideShare a Scribd company logo
Lesson 7-Managing Risk
Overview


Defining risk.

Identifying the risk to an organization.

Measuring risk.
Defining Risk


Risk is the potential for loss that requires protection.

Risk management provides a basis for valuing an

organization’s information assets.

Risk is the measure of vulnerabilities and threats.
Defining Risk


Vulnerability

Threats
Vulnerability


Vulnerabilities make computer systems and networks prone

to technical, non-technical, or social engineering attacks.

It is characterized by the difficulty and the level of technical

skill that is required to exploit it.

The result of such exploitation must also be considered.
Threat


A threat is an action or event that violates the security of

an information system environment.

It can have multiple targets.

The components of threat are targets, agents, and events.
Targets


The targets of threat or attack are security services such as:

     Confidentiality - Disclosure of classified information to

     unauthorized individuals.

     Integrity - Tampering of information.

     Availability - Denial-of-service attack.

     Accountability - Prevents organization from reconstructing past

     events.
Agents (1/2)


The characteristics of agents who are the people who may wish to

harm the organization are:

      Access - An agent must have direct or indirect access to system,

      network, facility, or information.

      Knowledge - An agent must have some knowledge about the

      target. More familiar an agent is with the target, more likely the

      agent will know about the vulnerabilities.

      Motivation - An agent may tamper with information as a

      challenge, greed to gain something, or purely with a malicious

      intent.
Agents (2/2)


A threat occurs when an agent with access and knowledge gains

motivation to take action. Such agents could be:

   Employees having necessary access and knowledge to systems.

   Ex-employees having any grudges.

   Hackers, terrorists, and criminals with a malicious intent to

   harm the organization.

   Commercial rivals who are interested in classified business

   information of the organization.
Events


Events are the ways in which an agent of threat may cause

harm to an organization.

It is the extent of harm that could possibly be done if the

agent gained access.
Risk and How to Identify the Risk to
            an Organization


 Risk is the combination of

threat and vulnerability.

 Risks can be categorized as low,

medium, or high-risk.
Identifying Vulnerabilities


To identify specific vulnerabilities:

      Locate all the entry points (electronic and physical) to the

      organization.

      Identify system configurations.

      Identify which information and systems are accessible.

      Include any known vulnerabilities in operating systems and

      applications.
Identifying Real Threats


Real or targeted threats may not show themselves until an

event has occurred.

All targeted threats are time-consuming and difficult.
Examining Countermeasures


Countermeasures for each access point within an

organization must be identified.

Some of the countermeasures include firewalls, anti-virus

software, access control mechanisms, and biometrics.
Identifying Risk


Identify specific risks to the organization.

Identify what possible harm can be done through each

access point.

Rate each risk as high risk, medium risk, or low risk. The

same vulnerability may pose different levels of risk based

on the access point.
Measuring Risk


Risks can be measured in terms

of:

       Money.

       Time.

       Resources.

       Reputation and lost

      business.
Money


The cost for managing risks include:

     Lost productivity.

     Stolen equipment or money.

     Cost of an investigation.

     Cost to repair or replace systems.

     Cost of experts to assist.

     Employee overtime.
Time


The amount of time taken to manage risks may include:

     The time a technical staff member is unavailable to perform

     normal tasks due to a security event.

     The downtime of a key system.

     Delay in product delivery or service.
Resources


Includes people, systems, communication lines,

applications, or access as resources.

Computes the monetary cost of using a resource to

troubleshoot.
Reputation and Lost Business


 Data compromise can affect the

organization’s reputation.

 Future business is in jeopardy

as people lose faith in the brand

name.

 Losses due to system failures

and production delay cannot be

ruled out.
Measuring Risk


To measure risk:

     Identify the extent of risk – best case, worst case, or most

     likely case.

     Identify the damage in terms of money, time, resources,

     reputation, and lost business.

     Identify the cost of restoration.

     Examine the potential results in each risk measurement area.

     Develop appropriate risk management approaches.
Summary


Security is managing risk.

To identify risks, identify vulnerabilities, and threats.

Examine countermeasures for each risk.

Identify the extent of risk.

Measure risk in terms of money, time, resources, reputation,

and lost business.

More Related Content

PPTX
Chapter 11: Information Security Incident Management
PPT
Chapter 3: Information Security Framework
PDF
A to Z of Information Security Management
PDF
Information security management system (isms) overview
PPT
Information security management
PPTX
Introduction to Incident Response Management
PDF
Information Security It's All About Compliance
PPTX
VAPT - Vulnerability Assessment & Penetration Testing
Chapter 11: Information Security Incident Management
Chapter 3: Information Security Framework
A to Z of Information Security Management
Information security management system (isms) overview
Information security management
Introduction to Incident Response Management
Information Security It's All About Compliance
VAPT - Vulnerability Assessment & Penetration Testing

What's hot (20)

PPT
information security management
PPT
Information security in todays world
PPT
Basics of Information System Security
PPTX
Chapter 8: Communications and Operations Security
PPTX
Cybersecurity Risk Management Tools and Techniques (1).pptx
PPTX
Chapter 5: Asset Management
PPT
Digital forensics
PPTX
Information security management system
PPSX
Security policies
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PPTX
27001 awareness Training
PPT
Lesson 1 - Technical Controls
PPT
Lesson 1- Intrusion Detection
PPT
Asset, Vulnerability, Threat, Risk & Control
PDF
Physical Security Management System
PPT
Lesson 2- Information Asset Valuation
PPTX
Physical Security Assessment
PPTX
Information security
PPTX
Chapter 9: Access Control Management
PPT
IT Security management and risk assessment
 
information security management
Information security in todays world
Basics of Information System Security
Chapter 8: Communications and Operations Security
Cybersecurity Risk Management Tools and Techniques (1).pptx
Chapter 5: Asset Management
Digital forensics
Information security management system
Security policies
INCIDENT RESPONSE NIST IMPLEMENTATION
27001 awareness Training
Lesson 1 - Technical Controls
Lesson 1- Intrusion Detection
Asset, Vulnerability, Threat, Risk & Control
Physical Security Management System
Lesson 2- Information Asset Valuation
Physical Security Assessment
Information security
Chapter 9: Access Control Management
IT Security management and risk assessment
 
Ad

Viewers also liked (8)

PDF
Ch18 Internet Security
PDF
Ch11 Vpn
PDF
Ch20 Wireless Security
PDF
Ch14 Desktop Protection
PDF
Ch08 8 Information Security Process it-slideshares.blogspot.com
PDF
Ch06 Policy
PDF
Ch12 Encryption
PDF
Ch09 Information Security Best Practices
Ch18 Internet Security
Ch11 Vpn
Ch20 Wireless Security
Ch14 Desktop Protection
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch06 Policy
Ch12 Encryption
Ch09 Information Security Best Practices
Ad

Similar to Ch07 Managing Risk (20)

PPTX
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
PPTX
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
PPTX
3.IS@Mohsin.pptx,.,,........,.............
PDF
Vskills Certified Network Security Professional Sample Material
DOCX
Create your own variant of both a hiring and a termination policy rela.docx
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PPTX
Purple Gradient Illustration Cyber Security Presentation (1).pptx
PPTX
Best Open Threat Management Platform in USA
PPTX
Information Security and Risk Management.pptx
PDF
Describe two methods for communicating the material in an Informatio.pdf
PDF
Threat and Vulnerability Management https://www.omexsecurity.com/
PDF
New Age Red Teaming - Enterprise Infilteration
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PPTX
Threats safety and Vulnerabilities in workplace .pptx
PDF
Internal Threats: The New Sources of Attack
PPTX
web application penetration testing.pptx
PDF
Outsourcing
DOCX
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
PDF
Domain1_Security_Principles --(My_Notes)
PPTX
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...
REPORTING IAS101djfjfjffjfjfjjfjfjjf.pptx
IAS101REPORTINGINFORMATIONRISKBSIT3B.pptx
3.IS@Mohsin.pptx,.,,........,.............
Vskills Certified Network Security Professional Sample Material
Create your own variant of both a hiring and a termination policy rela.docx
IT Security and Management - Semi Finals by Mark John Lado
Purple Gradient Illustration Cyber Security Presentation (1).pptx
Best Open Threat Management Platform in USA
Information Security and Risk Management.pptx
Describe two methods for communicating the material in an Informatio.pdf
Threat and Vulnerability Management https://www.omexsecurity.com/
New Age Red Teaming - Enterprise Infilteration
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Threats safety and Vulnerabilities in workplace .pptx
Internal Threats: The New Sources of Attack
web application penetration testing.pptx
Outsourcing
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
Domain1_Security_Principles --(My_Notes)
EBRE TABOR UNIVERSITY Gafat Institute of Technology Department of Information...

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web

Recently uploaded (20)

PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
DOCX
Euro SEO Services 1st 3 General Updates.docx
PDF
Nidhal Samdaie CV - International Business Consultant
DOCX
Business Management - unit 1 and 2
PPTX
5 Stages of group development guide.pptx
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
A Brief Introduction About Julia Allison
PDF
Business model innovation report 2022.pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Amazon (Business Studies) management studies
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
IFRS Notes in your pocket for study all the time
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
COST SHEET- Tender and Quotation unit 2.pdf
ICG2025_ICG 6th steering committee 30-8-24.pptx
Euro SEO Services 1st 3 General Updates.docx
Nidhal Samdaie CV - International Business Consultant
Business Management - unit 1 and 2
5 Stages of group development guide.pptx
Business Ethics - An introduction and its overview.pptx
Roadmap Map-digital Banking feature MB,IB,AB
Belch_12e_PPT_Ch18_Accessible_university.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
A Brief Introduction About Julia Allison
Business model innovation report 2022.pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Ôn tập tiếng anh trong kinh doanh nâng cao
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Amazon (Business Studies) management studies
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
IFRS Notes in your pocket for study all the time
Lecture (1)-Introduction.pptx business communication
COST SHEET- Tender and Quotation unit 2.pdf

Ch07 Managing Risk

  • 2. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
  • 3. Defining Risk Risk is the potential for loss that requires protection. Risk management provides a basis for valuing an organization’s information assets. Risk is the measure of vulnerabilities and threats.
  • 5. Vulnerability Vulnerabilities make computer systems and networks prone to technical, non-technical, or social engineering attacks. It is characterized by the difficulty and the level of technical skill that is required to exploit it. The result of such exploitation must also be considered.
  • 6. Threat A threat is an action or event that violates the security of an information system environment. It can have multiple targets. The components of threat are targets, agents, and events.
  • 7. Targets The targets of threat or attack are security services such as: Confidentiality - Disclosure of classified information to unauthorized individuals. Integrity - Tampering of information. Availability - Denial-of-service attack. Accountability - Prevents organization from reconstructing past events.
  • 8. Agents (1/2) The characteristics of agents who are the people who may wish to harm the organization are: Access - An agent must have direct or indirect access to system, network, facility, or information. Knowledge - An agent must have some knowledge about the target. More familiar an agent is with the target, more likely the agent will know about the vulnerabilities. Motivation - An agent may tamper with information as a challenge, greed to gain something, or purely with a malicious intent.
  • 9. Agents (2/2) A threat occurs when an agent with access and knowledge gains motivation to take action. Such agents could be: Employees having necessary access and knowledge to systems. Ex-employees having any grudges. Hackers, terrorists, and criminals with a malicious intent to harm the organization. Commercial rivals who are interested in classified business information of the organization.
  • 10. Events Events are the ways in which an agent of threat may cause harm to an organization. It is the extent of harm that could possibly be done if the agent gained access.
  • 11. Risk and How to Identify the Risk to an Organization Risk is the combination of threat and vulnerability. Risks can be categorized as low, medium, or high-risk.
  • 12. Identifying Vulnerabilities To identify specific vulnerabilities: Locate all the entry points (electronic and physical) to the organization. Identify system configurations. Identify which information and systems are accessible. Include any known vulnerabilities in operating systems and applications.
  • 13. Identifying Real Threats Real or targeted threats may not show themselves until an event has occurred. All targeted threats are time-consuming and difficult.
  • 14. Examining Countermeasures Countermeasures for each access point within an organization must be identified. Some of the countermeasures include firewalls, anti-virus software, access control mechanisms, and biometrics.
  • 15. Identifying Risk Identify specific risks to the organization. Identify what possible harm can be done through each access point. Rate each risk as high risk, medium risk, or low risk. The same vulnerability may pose different levels of risk based on the access point.
  • 16. Measuring Risk Risks can be measured in terms of: Money. Time. Resources. Reputation and lost business.
  • 17. Money The cost for managing risks include: Lost productivity. Stolen equipment or money. Cost of an investigation. Cost to repair or replace systems. Cost of experts to assist. Employee overtime.
  • 18. Time The amount of time taken to manage risks may include: The time a technical staff member is unavailable to perform normal tasks due to a security event. The downtime of a key system. Delay in product delivery or service.
  • 19. Resources Includes people, systems, communication lines, applications, or access as resources. Computes the monetary cost of using a resource to troubleshoot.
  • 20. Reputation and Lost Business Data compromise can affect the organization’s reputation. Future business is in jeopardy as people lose faith in the brand name. Losses due to system failures and production delay cannot be ruled out.
  • 21. Measuring Risk To measure risk: Identify the extent of risk – best case, worst case, or most likely case. Identify the damage in terms of money, time, resources, reputation, and lost business. Identify the cost of restoration. Examine the potential results in each risk measurement area. Develop appropriate risk management approaches.
  • 22. Summary Security is managing risk. To identify risks, identify vulnerabilities, and threats. Examine countermeasures for each risk. Identify the extent of risk. Measure risk in terms of money, time, resources, reputation, and lost business.