SlideShare ist ein Scribd-Unternehmen logo
1 von 52
TransformingLives. InventingtheFuture. www.iit.edu
I ELLINOIS T UINS TI T
OF TECHNOLOGY
ITM 578 1
RiskManagement II
Ray Trygstad
ITM 578 Section 071
Spring 2004
Master of Information Technology & Management Program
CenterforProfessional Development
Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 2
ILLINOIS INSTITUTE OF TECHNOLOGY
Learning Objectives:
 Upon completion of this lesson the student
should be able to:
– Explain why risk control is needed in today’s
organizations
– Recall risk mitigation strategy options for
controlling risks
– Identify the categories that can be used to
classify controls
– Discuss the conceptual frameworks that exist for
evaluating risk controls
– Formulate a cost benefit analysis when required
– Describe how to maintain and perpetuate risk
controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 3
ILLINOIS INSTITUTE OF TECHNOLOGY
Introduction
 Competitive advantage vs. competitive
disadvantage
– The need to avoid falling behind the competition
 To achieve competitive advantage,
organizations must design and create a safe
environment in which business processes and
procedures can function
 Environment must maintain confidentiality,
privacy and integrity of organizational data
 Objectives are met through the application of
the principles of risk management
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 4
ILLINOIS INSTITUTE OF TECHNOLOGY
Risk Management
 Risk management is:
– The process of identifying vulnerabilities in an
organization’s information systems and
– Taking carefully reasoned steps to assure the
confidentiality, integrity, and availability of all
the components in the organization’s
information systems
 Primary deliverable from risk assessment
is a list of documented vulnerabilities
ranked by criticality of impact
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 5
ILLINOIS INSTITUTE OF TECHNOLOGY
Risk Control Strategies
 When risks from information security threats
create competitive disadvantage, information
technology and information security
communities of interest take control of risks
 Four basic strategies are used to control risks
resulting from vulnerabilities:
– Apply safeguards (avoidance)
– Transfer the risk (transference)
– Reduce the impact (mitigation)
– Inform themselves of all of the consequences and
accept the risk without control or mitigation
(acceptance)
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 6
ILLINOIS INSTITUTE OF TECHNOLOGY
Avoidance
 Attempts to prevent exploitation of the
vulnerability
 Preferred approach, as it seeks to avoid risk
in its entirety rather than dealing with it
after it has been realized
 Accomplished through
– Countering threats
– Removing vulnerabilities in assets
– Limiting access to assets and/or
Adding protective safeguards
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 7
ILLINOIS INSTITUTE OF TECHNOLOGY
Avoidance: Areas of Control
Three areas of control:
– Policy
– Training and education
– Technology
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 8
ILLINOIS INSTITUTE OF TECHNOLOGY
Transference
 Control approach that attempts to shift the
risk to other assets, other processes, or other
organizations
– If an organization does not already have quality
security management and administration
experience, it should hire individuals or firms
that provide such expertise
– Allows organization to transfer risk associated
with the management of these complex systems
to another organization with established
experience in dealing with those risks
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 9
ILLINOIS INSTITUTE OF TECHNOLOGY
Mitigation
 Attempts to reduce impact of exploitation
through planning and preparation
 Three types of plans:
– disaster recovery planning (DRP)
– business continuity planning (BCP)
– incident response planning (IRP)
 Most common: disaster recovery plan or DRP
 Actions to take while the incident is in
progress are in the incident response plan
or IRP
 Longer term issues are handled in the
business continuity plan or BCP
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 10
ILLINOIS INSTITUTE OF TECHNOLOGY
Plan Description Example When Deployed Time Frame
Incident Response
Plan (IRP)
Actions an
organization takes
during incidents
(attacks)
 List of steps to be taken
during disaster
 Intelligence gathering
 Information analysis
As incident or
disaster unfolds
Immediate &
real-time
action
Disaster Recovery
Plan (DRP)
Preparations for
recovery should a
disaster occur;
strategies to limit
losses before and
during disaster;
step-by-step
instructions to
regain normalcy
 Procedures for the
recovery of lost data
 Procedures for the
reestablishment of lost
services
 Shut-down procedures to
protect systems and data
Immediately after
the incident is
labeled a disaster
Short-term
recovery
Business Recovery
Plan (BRP)
Steps to ensure
continuation of
business when the
scale of a disaster
requires relocation
 Preparation steps for
activation of secondary
data centers
 Establishment of a hot
site in a remote location
Immediately after
it is determined
that the disaster
affects the cont-
tinued operations
of the organization
Long-term
recovery
Mitigation Summary
Table 5.1 Summaries of mitigation plans
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 11
ILLINOIS INSTITUTE OF TECHNOLOGY
Acceptance
 Doing nothing to close a vulnerability and to accept
the outcome of its exploitation
 Valid only when:
– Level of risk determined
– Probability of attack assessed
– Potential damage estimated
– Thorough cost benefit analysis completed
– Controls using each appropriate feasibility evaluated
– Conscious decision made that the particular function,
service, information, or asset does not justify the cost of
protection
 Risk appetite describes the degree to which an
organization is willing to accept risk as a trade-off
to the expense of applying controls
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 12
ILLINOIS INSTITUTE OF TECHNOLOGY
Mitigation Strategy Selection
Level of threat and value of the asset
play a major role in the selection of
strategy
Following rules of thumb can be applied
in selecting the preferred strategy
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 13
ILLINOIS INSTITUTE OF TECHNOLOGY
Mitigation Strategy Selection Rules
When a vulnerability exists implement
assurance techniques to reduce the
likelihood of a vulnerability’s being
exercised
When a vulnerability can be exploited,
apply layered protections, architectural
designs, and administrative controls to
minimize the risk or prevent this
occurrence
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 14
ILLINOIS INSTITUTE OF TECHNOLOGY
Mitigation Strategy Selection Rules
When the attacker’s cost is less
than his/her potential gain, apply
protections to increase the attacker’s
cost
When potential loss is substantial,
apply design principles, architectural
designs, and technical and non-
technical protections to limit the extent
of the attack, thereby reducing the
potential for loss
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 15
ILLINOIS INSTITUTE OF TECHNOLOGY
Risk Handling Decision Points
ViableViable
threatsthreats
SystemasSystemas
designeddesigned
RiskRisk
existsexists
VulnerabilityVulnerability
existsexists
Is systemIs system
vulnerable?vulnerable?
Is systemIs system
exploitable?exploitable?
Is the attacker’sIs the attacker’s
gain > loss?gain > loss?
Is expectedIs expected
loss > organization’sloss > organization’s
acceptable level?acceptable level?
Threat andThreat and
vulnerabilityvulnerability
existexist
No riskNo risk No riskNo risk
RiskcanRiskcan
be acceptedbe accepted
RiskcanRiskcan
be acceptedbe accepted
RiskisRiskis
unacceptableunacceptable
No
Yes
No
Yes
No
Yes
No
Yes
Figure 5-2
Risk Handling Decisions
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 16
ILLINOIS INSTITUTE OF TECHNOLOGY
Risk Control Cycle
AdequateAdequate
controls?controls?
IdentifyIdentify
informationinformation
assetsassets
AcceptableAcceptable
Risk?Risk?
Prepare rankedPrepare ranked
vulnerability riskvulnerability risk
worksheetworksheet
DevelopDevelop
control strategycontrol strategy
& plans& plans
ImplementImplement
controlcontrol
AssessAssess
controlcontrol
Plan forPlan for
maintenancemaintenance
Measure riskMeasure risk
to informationto information
assetasset
No
Yes
No
Yes
Figure 5-3 Risk Control Cycle
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 17
ILLINOIS INSTITUTE OF TECHNOLOGY
Categories of Controls
Controlling risk through avoidance,
mitigation, or transference may be
accomplished by implementing controls
or safeguards
One approach to selecting controls is by
category:
– Control Function
– Architectural Layer
– Strategy Layer
– Information Security Principles
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 18
ILLINOIS INSTITUTE OF TECHNOLOGY
Control Function - Preventative
Controls or safeguards designed to
defend the vulnerability are either
preventive or detective
Preventive controls stop attempts to
exploit vulnerability by implementing
enforcement of an organizational
policy or a security principle, such as
authentication or confidentiality
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 19
ILLINOIS INSTITUTE OF TECHNOLOGY
Control Function - Preventative
Detective controls warn of violations
of security principles, organizational
policies, or attempts to exploit
vulnerabilities
Detective controls use techniques
such as audit trails, intrusion
detection, or configuration monitoring
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 20
ILLINOIS INSTITUTE OF TECHNOLOGY
Architectural Layer
 Some controls apply to one or more layers of
an organization’s technical architecture
 Among the architectural layer designators in
common use are:
– organizational policy
– external networks
– extranets (or demilitarized zones)
– Intranets (WAN and LAN)
– network devices that interface network zones
(switches, routers, firewalls, and hubs)
– systems (computers for mainframe, server or
desktop use)
– applications
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 21
ILLINOIS INSTITUTE OF TECHNOLOGY
Strategy Layer
Controls are sometimes classified by
the risk control strategy they operate
within:
– avoidance
– mitigation
– transference
– acceptance
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 22
ILLINOIS INSTITUTE OF TECHNOLOGY
Information Security Principles
Controls operate within one or more
of the commonly accepted
information security principles:
– Confidentiality
– Integrity
– Availability
– Authentication
– Authorization
– Accountability
– Privacy
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 23
ILLINOIS INSTITUTE OF TECHNOLOGY
Feasibility Studies & the Cost Benefit Analysis
 Before deciding on the strategy for a specific
vulnerability all information about the
economic and non-economic consequences of
the vulnerability facing the information asset
must be explored
 Fundamentally we are asking -
“What are the actual and perceived
advantages of implementing a control
contrasted with the actual and perceived
disadvantages of implementing the control?”
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 24
ILLINOIS INSTITUTE OF TECHNOLOGY
Cost Benefit Analysis (CBA)
 The most common approach for a project of
information security controls and safeguards
is the economic feasibility of implementation
 Begins by evaluating the worth of information
assets to be protected + loss in value if those
information assets are compromised
 An organization should not spend more to
protect an asset than the asset is worth
 Formal process to document called cost
benefit analysis or an economic feasibility
study
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 25
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: Cost Factors
Some of the items that impact the
cost of a control or safeguard include:
– Cost of development or acquisition
– Training fees
– Cost of implementation
– Service costs
– Cost of maintenance
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 26
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: Benefits
Benefit is the value that the
organization recognizes by using
controls to prevent losses associated
with a specific vulnerability
Usually determined by valuing the
information asset or assets exposed by
the vulnerability & determining how
much of that value is at risk
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 27
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: Asset Valuation
 The process of assigning financial value or
worth to each information asset
 Involves estimation of real and perceived
costs associated with the design,
development, installation, maintenance,
protection, recovery, and defense against
market loss for each set of information
bearing systems or information assets
 There are many components to asset
valuation
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 28
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: Loss Estimates
 Once the worth of various assets is estimated
examine the potential loss that could occur
from the exploitation of vulnerability or a
threat occurrence
 Process results in estimate of potential loss
per risk
 The questions that must be asked include:
– What damage could occur, and what financial
impact would it have?
– What would it cost to recover from the attack, in
addition to the costs above?
– What is the single loss expectancy for each risk?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 29
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: ALE & ARO
 Expected value of a loss:
– Annualized Loss Expectancy (ALE) =
Single Loss Expectancy (SLE) x Annualized
Rate of Occurrence (ARO) where:
SLE = asset value x exposure factor (EF)
 ARO is simply how often you expect a
specific type of attack to occur, per year
 SLE is calculation of the value associated
with the most likely loss from an attack
 EF is the percentage loss that would occur
from a given vulnerability being exploited
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 30
ILLINOIS INSTITUTE OF TECHNOLOGY
CBA: Formula
 CBA is whether or not the control alternative
being evaluated is worth the associated cost
incurred to control the specific vulnerability
 While many CBA techniques exist, for our
purposes, the CBA is most easily calculated
using the ALE from earlier assessments
 CBA = ALE(prior) – ALE(post) – ACS
 Where:
– ALE prior is the Annualized Loss Expectancy of
the risk before the implementation of the control
– ALE post is the ALE examined after the control
has been in place for a period of time
– ACS is the Annual Cost of the Safeguard
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 31
ILLINOIS INSTITUTE OF TECHNOLOGY
Benchmarking
 Rather than use the financial value of
information assets, review peer institutions
to determine what they are doing to protect
their assets (benchmarking)
 When benchmarking, an organization
typically uses one of two measures:
– Metrics-based measures are comparisons based
on numerical standards
– Process-based measures examine the activities
performed in pursuit of its goal, rather than the
specifics of how goals were attained
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 32
ILLINOIS INSTITUTE OF TECHNOLOGY
Due Care/Due Diligence
 When organizations adopt levels of security
for a legal defense, they may need to show
that they have done what any prudent
organization would do in similar
circumstances
– Referred to as a standard of due care
 Due diligence
– Demonstration that the organization is diligent in
ensuring that the implemented standards
continue to provide the required level of protection
 Failure to support a standard of due care or
due diligence can open an organization to
legal liability
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 33
ILLINOIS INSTITUTE OF TECHNOLOGY
Best Business Practices
 Security efforts that provide a superior level
of protection of information are referred to as
best business practices
 Best security practices (BSPs) are security
efforts among the best in the industry
 When considering best practices for adoption
in your organization, consider the following:
– Does your organization resemble the identified
target?
– Are the resources you can expend similar?
– Are you in a similar threat environment?
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 34
ILLINOIS INSTITUTE OF TECHNOLOGY
Microsoft’s Ten Laws of Security
1. If a bad guy can persuade you to run his
program on your computer, it’s not your
computer anymore
2. If a bad guy can alter the operating system
on your computer, it’s not your computer
anymore
3. If a bad guy has unrestricted physical
access to your computer, it’s not your
computer anymore
4. If you allow a bad guy to upload programs
to your web site, it’s not your web site
anymore
5. Weak passwords trump strong security
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 35
ILLINOIS INSTITUTE OF TECHNOLOGY
Microsoft’s Ten Laws of Security
6. A machine is only as secure as the
administrator is trustworthy
7. Encrypted data is only as secure as the
decryption key
8. An out of date virus scanner is only
marginally better than no virus scanner at
all
9. Absolute anonymity isn’t practical, in real
life or on the web
10. Technology is not a panacea
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/10imlaws.asp
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 36
ILLINOIS INSTITUTE OF TECHNOLOGY
Problems
 The biggest problem with benchmarking in
information security is that organizations
don’t talk to each other
 Another problem with benchmarking is that
no two organizations are identical
 A third problem is that best practices are a
moving target
 One last issue to consider is that simply
knowing what was going on a few years ago,
as in benchmarking, doesn’t necessarily tell
us what to do next
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 37
ILLINOIS INSTITUTE OF TECHNOLOGY
Baselining
Baselining is the analysis of measures
against established standards
In information security, baselining is
comparing security activities and
events against the organization’s
future performance
When baselining it is useful to have a
guide to the overall process
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 38
ILLINOIS INSTITUTE OF TECHNOLOGY
Organizational Feasibility
Organizational feasibility examines
how well the proposed information
security alternatives will contribute to
the efficiency, effectiveness, and
overall operation of an organization
Above and beyond the impact on the
bottom line, the organization must
determine how the proposed
alternatives contribute to the business
objectives of the organization
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 39
ILLINOIS INSTITUTE OF TECHNOLOGY
Operational Feasibility
Addresses user acceptance and
support, management acceptance and
support, and the overall requirements
of the organization’s stakeholders
Sometimes known as behavioral
feasibility, because it measures the
behavior of users
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 40
ILLINOIS INSTITUTE OF TECHNOLOGY
Operational Feasibility
 A fundamental principle of systems
development is obtaining user buy-in on a
project
 One of the most common methods for
obtaining user acceptance and support is
through user involvement obtained through
three simple steps:
– Communicate
– Educate
– Involve
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 41
ILLINOIS INSTITUTE OF TECHNOLOGY
Technical Feasibility
The project team must also consider
the technical feasibilities associated
with the design, implementation, and
management of controls
Examines whether or not the
organization has or can acquire the
technology necessary to implement &
support the control alternatives
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 42
ILLINOIS INSTITUTE OF TECHNOLOGY
Political Feasibility
 For some organizations, the most significant
feasibility evaluated may be political
 Within organizations, political feasibility
defines what can and cannot occur based on
the consensus and relationships between
the communities of interest
 Limits placed on an organization’s actions
or behaviors by the information security
controls must fit within the realm of the
possible before they can be effectively
implemented, and that realm includes the
availability of staff resources
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 43
ILLINOIS INSTITUTE OF TECHNOLOGY
Risk Management Discussion Points
 Not every organization has the collective will
to manage each vulnerability through the
application of controls
 Depending on the willingness to assume risk,
each organization must define its risk
appetite
 Risk appetite defines the quantity and
nature of risk that organizations are willing
to accept as they evaluate the tradeoffs
between perfect security and unlimited
accessibility
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 44
ILLINOIS INSTITUTE OF TECHNOLOGY
Residual Risk
When we have controlled any given
vulnerability as much as we can, there
is often risk that has not been
completely removed or has not been
completely shifted or planned for
This remainder is called residual risk
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 45
ILLINOIS INSTITUTE OF TECHNOLOGY
Residual Risk
To express it another way,
“Residual Risk is a combined function of
(1) a threat less the effect of some
threat-reducing safeguards
(2) a vulnerability less the effect of some
vulnerability-reducing safeguards
(3) an asset less the effect of some asset
value-reducing safeguards.”
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 46
ILLINOIS INSTITUTE OF TECHNOLOGY
Amount of threat
reduced by a safeguard
Amount of vulnerability
reduced by a safeguard
Amount of asset value
reduced by a safeguard
Residual risk: risk
that has not been
covered by one of
the safeguards
Risk Residual
Risk ResidualFigure 5-4
Riskof information asset
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 47
ILLINOIS INSTITUTE OF TECHNOLOGY
Documenting Results
 At minimum, each information asset-
vulnerability pair should have a documented
control strategy that clearly identifies any
residual risk remaining after the proposed
strategy has been executed
 Some organizations document the outcome of
the control strategy for each information
asset-vulnerability pair as an action plan
 Action plan includes concrete tasks, each
with accountability assigned to an
organizational unit or to an individual
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 48
ILLINOIS INSTITUTE OF TECHNOLOGY
Recommended Practices in Controlling Risk
We must convince budget authorities to
spend up to the value of the asset to
protect a particular asset from an
identified threat
Each and every control or safeguard
implemented will impact more than
one threat-asset pair
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 49
ILLINOIS INSTITUTE OF TECHNOLOGY
Qualitative Measures
 Spectrum of steps described above performed
with real numbers or best-guess estimates of
real numbers is known as a quantitative
assessment
 However, an organization could determine
that it couldn’t put specific numbers on these
values
 Fortunately, it is possible to repeat these
steps using estimates based on a qualitative
assessment
 Instead of using specific numbers, ranges or
levels of values can be developed simplifying
the process
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 50
ILLINOIS INSTITUTE OF TECHNOLOGY
Delphi Technique
 One technique for accurately estimating
scales and values is the Delphi Technique
 The Delphi Technique, named for the Oracle
at Delphi, is a process whereby a group of
individuals rate or rank a set of information
 The individual responses are compiled and
then returned to the individuals for another
iteration
 This process continues until the group is
satisfied with the result
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 51
ILLINOIS INSTITUTE OF TECHNOLOGY
Evaluation, Assessment, and Maintenance of Risk Controls
Once a control strategy has been
implemented, effectiveness of controls
should be monitored and measured on
an ongoing basis to determine the
effectiveness of the security controls
and accuracy of the estimate of the
residual risk
Transfo rm ing Live s. Inve nting the Future .
www.iit.edu
ITM 578 52
ILLINOIS INSTITUTE OF TECHNOLOGY
The End…
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapDavid Sweigert
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat ModelingEC-Council
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Managementasherad
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Risk management i
Risk management iRisk management i
Risk management iDhani Ahmad
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Maganathin Veeraragaloo
 

Was ist angesagt? (20)

Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
The OCTAVE Method
The OCTAVE MethodThe OCTAVE Method
The OCTAVE Method
 
Cyber Threat Modeling
Cyber Threat ModelingCyber Threat Modeling
Cyber Threat Modeling
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Lesson 3- Remote Access
Lesson 3- Remote AccessLesson 3- Remote Access
Lesson 3- Remote Access
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Risk management i
Risk management iRisk management i
Risk management i
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Capability Maturity Model (C2M2)
 

Andere mochten auch

Information system
Information systemInformation system
Information systemDhani Ahmad
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnelDhani Ahmad
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behaviorDhani Ahmad
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care itDhani Ahmad
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Islamic information management
Islamic information managementIslamic information management
Islamic information managementDhani Ahmad
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Beni Krisbiantoro
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and recordsDhani Ahmad
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisDhani Ahmad
 
Strategic planning
Strategic planningStrategic planning
Strategic planningDhani Ahmad
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islamDhani Ahmad
 
Information resource management
Information resource managementInformation resource management
Information resource managementDhani Ahmad
 

Andere mochten auch (20)

Information system
Information systemInformation system
Information system
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Islamic information seeking behavior
Islamic information seeking behaviorIslamic information seeking behavior
Islamic information seeking behavior
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Privacy & security in heath care it
Privacy & security in heath care itPrivacy & security in heath care it
Privacy & security in heath care it
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Islamic information management
Islamic information managementIslamic information management
Islamic information management
 
Secure
SecureSecure
Secure
 
Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02Database design, implementation, and management -chapter02
Database design, implementation, and management -chapter02
 
The need for security
The need for securityThe need for security
The need for security
 
Security policy
Security policySecurity policy
Security policy
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
Physical security
Physical securityPhysical security
Physical security
 
Types of islamic institutions and records
Types of islamic institutions and recordsTypes of islamic institutions and records
Types of islamic institutions and records
 
Opportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysisOpportunities, threats, industry competition, and competitor analysis
Opportunities, threats, industry competition, and competitor analysis
 
Database - Design & Implementation - 1
Database - Design & Implementation - 1Database - Design & Implementation - 1
Database - Design & Implementation - 1
 
Strategic planning
Strategic planningStrategic planning
Strategic planning
 
Islamic information management sources in islam
Islamic information management sources in islamIslamic information management sources in islam
Islamic information management sources in islam
 
Database design
Database designDatabase design
Database design
 
Information resource management
Information resource managementInformation resource management
Information resource management
 

Ähnlich wie Risk management ii

Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuityDhani Ahmad
 
Delivering stronger business security and resilience
Delivering stronger business security and resilienceDelivering stronger business security and resilience
Delivering stronger business security and resiliencezadok001
 
Vulnerability Management.pdf
Vulnerability Management.pdfVulnerability Management.pdf
Vulnerability Management.pdfIntuitiveCloud
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architectureiasaglobal
 
ERM Presentation
ERM PresentationERM Presentation
ERM PresentationH Contrex
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Week01-An Overview of Information Security and Risk Management_reduced.pptx
Week01-An Overview of Information Security and Risk Management_reduced.pptxWeek01-An Overview of Information Security and Risk Management_reduced.pptx
Week01-An Overview of Information Security and Risk Management_reduced.pptxpshah21
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessInvensis Learning
 
Understanding enterprise risk management and fair
Understanding enterprise risk management and fairUnderstanding enterprise risk management and fair
Understanding enterprise risk management and fairiaemedu
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxchristinemaritza
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk managementDr. Lasantha Ranwala
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 

Ähnlich wie Risk management ii (20)

Disaster recovery & business continuity
Disaster recovery & business continuityDisaster recovery & business continuity
Disaster recovery & business continuity
 
Delivering stronger business security and resilience
Delivering stronger business security and resilienceDelivering stronger business security and resilience
Delivering stronger business security and resilience
 
800-30.pptx
800-30.pptx800-30.pptx
800-30.pptx
 
Vulnerability Management.pdf
Vulnerability Management.pdfVulnerability Management.pdf
Vulnerability Management.pdf
 
Building Risk Management into Enterprise Architecture
Building Risk Management into Enterprise ArchitectureBuilding Risk Management into Enterprise Architecture
Building Risk Management into Enterprise Architecture
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
ERM Presentation
ERM PresentationERM Presentation
ERM Presentation
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Dj24712716
Dj24712716Dj24712716
Dj24712716
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Week01-An Overview of Information Security and Risk Management_reduced.pptx
Week01-An Overview of Information Security and Risk Management_reduced.pptxWeek01-An Overview of Information Security and Risk Management_reduced.pptx
Week01-An Overview of Information Security and Risk Management_reduced.pptx
 
Webinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and EffectivenessWebinar - Building Team Efficiency and Effectiveness
Webinar - Building Team Efficiency and Effectiveness
 
Understanding enterprise risk management and fair
Understanding enterprise risk management and fairUnderstanding enterprise risk management and fair
Understanding enterprise risk management and fair
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 

Mehr von Dhani Ahmad

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planningDhani Ahmad
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effortDhani Ahmad
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentationsDhani Ahmad
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data managementDhani Ahmad
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & proceduresDhani Ahmad
 
Topic 9 secondary data sources
Topic 9   secondary data sourcesTopic 9   secondary data sources
Topic 9 secondary data sourcesDhani Ahmad
 
Topic 8 questionnaire design
Topic 8   questionnaire designTopic 8   questionnaire design
Topic 8 questionnaire designDhani Ahmad
 
Topic 7 measurement in research
Topic 7   measurement in researchTopic 7   measurement in research
Topic 7 measurement in researchDhani Ahmad
 

Mehr von Dhani Ahmad (11)

Strategic information system planning
Strategic information system planningStrategic information system planning
Strategic information system planning
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Information security as an ongoing effort
Information security as an ongoing effortInformation security as an ongoing effort
Information security as an ongoing effort
 
Implementing security
Implementing securityImplementing security
Implementing security
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Topic 12 report & presentations
Topic 12   report & presentationsTopic 12   report & presentations
Topic 12 report & presentations
 
Topic 11 data management
Topic 11   data managementTopic 11   data management
Topic 11 data management
 
Topic 10 sample designs & procedures
Topic 10   sample designs & proceduresTopic 10   sample designs & procedures
Topic 10 sample designs & procedures
 
Topic 9 secondary data sources
Topic 9   secondary data sourcesTopic 9   secondary data sources
Topic 9 secondary data sources
 
Topic 8 questionnaire design
Topic 8   questionnaire designTopic 8   questionnaire design
Topic 8 questionnaire design
 
Topic 7 measurement in research
Topic 7   measurement in researchTopic 7   measurement in research
Topic 7 measurement in research
 

Kürzlich hochgeladen

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 

Kürzlich hochgeladen (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 

Risk management ii

  • 1. TransformingLives. InventingtheFuture. www.iit.edu I ELLINOIS T UINS TI T OF TECHNOLOGY ITM 578 1 RiskManagement II Ray Trygstad ITM 578 Section 071 Spring 2004 Master of Information Technology & Management Program CenterforProfessional Development Slides based on Whitman, M. and Mattord, H., Principles of InformationSecurity; Thomson Course Technology 2003
  • 2. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 2 ILLINOIS INSTITUTE OF TECHNOLOGY Learning Objectives:  Upon completion of this lesson the student should be able to: – Explain why risk control is needed in today’s organizations – Recall risk mitigation strategy options for controlling risks – Identify the categories that can be used to classify controls – Discuss the conceptual frameworks that exist for evaluating risk controls – Formulate a cost benefit analysis when required – Describe how to maintain and perpetuate risk controls
  • 3. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 3 ILLINOIS INSTITUTE OF TECHNOLOGY Introduction  Competitive advantage vs. competitive disadvantage – The need to avoid falling behind the competition  To achieve competitive advantage, organizations must design and create a safe environment in which business processes and procedures can function  Environment must maintain confidentiality, privacy and integrity of organizational data  Objectives are met through the application of the principles of risk management
  • 4. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 4 ILLINOIS INSTITUTE OF TECHNOLOGY Risk Management  Risk management is: – The process of identifying vulnerabilities in an organization’s information systems and – Taking carefully reasoned steps to assure the confidentiality, integrity, and availability of all the components in the organization’s information systems  Primary deliverable from risk assessment is a list of documented vulnerabilities ranked by criticality of impact
  • 5. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 5 ILLINOIS INSTITUTE OF TECHNOLOGY Risk Control Strategies  When risks from information security threats create competitive disadvantage, information technology and information security communities of interest take control of risks  Four basic strategies are used to control risks resulting from vulnerabilities: – Apply safeguards (avoidance) – Transfer the risk (transference) – Reduce the impact (mitigation) – Inform themselves of all of the consequences and accept the risk without control or mitigation (acceptance)
  • 6. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 6 ILLINOIS INSTITUTE OF TECHNOLOGY Avoidance  Attempts to prevent exploitation of the vulnerability  Preferred approach, as it seeks to avoid risk in its entirety rather than dealing with it after it has been realized  Accomplished through – Countering threats – Removing vulnerabilities in assets – Limiting access to assets and/or Adding protective safeguards
  • 7. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 7 ILLINOIS INSTITUTE OF TECHNOLOGY Avoidance: Areas of Control Three areas of control: – Policy – Training and education – Technology
  • 8. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 8 ILLINOIS INSTITUTE OF TECHNOLOGY Transference  Control approach that attempts to shift the risk to other assets, other processes, or other organizations – If an organization does not already have quality security management and administration experience, it should hire individuals or firms that provide such expertise – Allows organization to transfer risk associated with the management of these complex systems to another organization with established experience in dealing with those risks
  • 9. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 9 ILLINOIS INSTITUTE OF TECHNOLOGY Mitigation  Attempts to reduce impact of exploitation through planning and preparation  Three types of plans: – disaster recovery planning (DRP) – business continuity planning (BCP) – incident response planning (IRP)  Most common: disaster recovery plan or DRP  Actions to take while the incident is in progress are in the incident response plan or IRP  Longer term issues are handled in the business continuity plan or BCP
  • 10. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 10 ILLINOIS INSTITUTE OF TECHNOLOGY Plan Description Example When Deployed Time Frame Incident Response Plan (IRP) Actions an organization takes during incidents (attacks)  List of steps to be taken during disaster  Intelligence gathering  Information analysis As incident or disaster unfolds Immediate & real-time action Disaster Recovery Plan (DRP) Preparations for recovery should a disaster occur; strategies to limit losses before and during disaster; step-by-step instructions to regain normalcy  Procedures for the recovery of lost data  Procedures for the reestablishment of lost services  Shut-down procedures to protect systems and data Immediately after the incident is labeled a disaster Short-term recovery Business Recovery Plan (BRP) Steps to ensure continuation of business when the scale of a disaster requires relocation  Preparation steps for activation of secondary data centers  Establishment of a hot site in a remote location Immediately after it is determined that the disaster affects the cont- tinued operations of the organization Long-term recovery Mitigation Summary Table 5.1 Summaries of mitigation plans
  • 11. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 11 ILLINOIS INSTITUTE OF TECHNOLOGY Acceptance  Doing nothing to close a vulnerability and to accept the outcome of its exploitation  Valid only when: – Level of risk determined – Probability of attack assessed – Potential damage estimated – Thorough cost benefit analysis completed – Controls using each appropriate feasibility evaluated – Conscious decision made that the particular function, service, information, or asset does not justify the cost of protection  Risk appetite describes the degree to which an organization is willing to accept risk as a trade-off to the expense of applying controls
  • 12. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 12 ILLINOIS INSTITUTE OF TECHNOLOGY Mitigation Strategy Selection Level of threat and value of the asset play a major role in the selection of strategy Following rules of thumb can be applied in selecting the preferred strategy
  • 13. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 13 ILLINOIS INSTITUTE OF TECHNOLOGY Mitigation Strategy Selection Rules When a vulnerability exists implement assurance techniques to reduce the likelihood of a vulnerability’s being exercised When a vulnerability can be exploited, apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent this occurrence
  • 14. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 14 ILLINOIS INSTITUTE OF TECHNOLOGY Mitigation Strategy Selection Rules When the attacker’s cost is less than his/her potential gain, apply protections to increase the attacker’s cost When potential loss is substantial, apply design principles, architectural designs, and technical and non- technical protections to limit the extent of the attack, thereby reducing the potential for loss
  • 15. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 15 ILLINOIS INSTITUTE OF TECHNOLOGY Risk Handling Decision Points ViableViable threatsthreats SystemasSystemas designeddesigned RiskRisk existsexists VulnerabilityVulnerability existsexists Is systemIs system vulnerable?vulnerable? Is systemIs system exploitable?exploitable? Is the attacker’sIs the attacker’s gain > loss?gain > loss? Is expectedIs expected loss > organization’sloss > organization’s acceptable level?acceptable level? Threat andThreat and vulnerabilityvulnerability existexist No riskNo risk No riskNo risk RiskcanRiskcan be acceptedbe accepted RiskcanRiskcan be acceptedbe accepted RiskisRiskis unacceptableunacceptable No Yes No Yes No Yes No Yes Figure 5-2 Risk Handling Decisions
  • 16. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 16 ILLINOIS INSTITUTE OF TECHNOLOGY Risk Control Cycle AdequateAdequate controls?controls? IdentifyIdentify informationinformation assetsassets AcceptableAcceptable Risk?Risk? Prepare rankedPrepare ranked vulnerability riskvulnerability risk worksheetworksheet DevelopDevelop control strategycontrol strategy & plans& plans ImplementImplement controlcontrol AssessAssess controlcontrol Plan forPlan for maintenancemaintenance Measure riskMeasure risk to informationto information assetasset No Yes No Yes Figure 5-3 Risk Control Cycle
  • 17. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 17 ILLINOIS INSTITUTE OF TECHNOLOGY Categories of Controls Controlling risk through avoidance, mitigation, or transference may be accomplished by implementing controls or safeguards One approach to selecting controls is by category: – Control Function – Architectural Layer – Strategy Layer – Information Security Principles
  • 18. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 18 ILLINOIS INSTITUTE OF TECHNOLOGY Control Function - Preventative Controls or safeguards designed to defend the vulnerability are either preventive or detective Preventive controls stop attempts to exploit vulnerability by implementing enforcement of an organizational policy or a security principle, such as authentication or confidentiality
  • 19. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 19 ILLINOIS INSTITUTE OF TECHNOLOGY Control Function - Preventative Detective controls warn of violations of security principles, organizational policies, or attempts to exploit vulnerabilities Detective controls use techniques such as audit trails, intrusion detection, or configuration monitoring
  • 20. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 20 ILLINOIS INSTITUTE OF TECHNOLOGY Architectural Layer  Some controls apply to one or more layers of an organization’s technical architecture  Among the architectural layer designators in common use are: – organizational policy – external networks – extranets (or demilitarized zones) – Intranets (WAN and LAN) – network devices that interface network zones (switches, routers, firewalls, and hubs) – systems (computers for mainframe, server or desktop use) – applications
  • 21. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 21 ILLINOIS INSTITUTE OF TECHNOLOGY Strategy Layer Controls are sometimes classified by the risk control strategy they operate within: – avoidance – mitigation – transference – acceptance
  • 22. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 22 ILLINOIS INSTITUTE OF TECHNOLOGY Information Security Principles Controls operate within one or more of the commonly accepted information security principles: – Confidentiality – Integrity – Availability – Authentication – Authorization – Accountability – Privacy
  • 23. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 23 ILLINOIS INSTITUTE OF TECHNOLOGY Feasibility Studies & the Cost Benefit Analysis  Before deciding on the strategy for a specific vulnerability all information about the economic and non-economic consequences of the vulnerability facing the information asset must be explored  Fundamentally we are asking - “What are the actual and perceived advantages of implementing a control contrasted with the actual and perceived disadvantages of implementing the control?”
  • 24. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 24 ILLINOIS INSTITUTE OF TECHNOLOGY Cost Benefit Analysis (CBA)  The most common approach for a project of information security controls and safeguards is the economic feasibility of implementation  Begins by evaluating the worth of information assets to be protected + loss in value if those information assets are compromised  An organization should not spend more to protect an asset than the asset is worth  Formal process to document called cost benefit analysis or an economic feasibility study
  • 25. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 25 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: Cost Factors Some of the items that impact the cost of a control or safeguard include: – Cost of development or acquisition – Training fees – Cost of implementation – Service costs – Cost of maintenance
  • 26. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 26 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: Benefits Benefit is the value that the organization recognizes by using controls to prevent losses associated with a specific vulnerability Usually determined by valuing the information asset or assets exposed by the vulnerability & determining how much of that value is at risk
  • 27. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 27 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: Asset Valuation  The process of assigning financial value or worth to each information asset  Involves estimation of real and perceived costs associated with the design, development, installation, maintenance, protection, recovery, and defense against market loss for each set of information bearing systems or information assets  There are many components to asset valuation
  • 28. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 28 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: Loss Estimates  Once the worth of various assets is estimated examine the potential loss that could occur from the exploitation of vulnerability or a threat occurrence  Process results in estimate of potential loss per risk  The questions that must be asked include: – What damage could occur, and what financial impact would it have? – What would it cost to recover from the attack, in addition to the costs above? – What is the single loss expectancy for each risk?
  • 29. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 29 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: ALE & ARO  Expected value of a loss: – Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO) where: SLE = asset value x exposure factor (EF)  ARO is simply how often you expect a specific type of attack to occur, per year  SLE is calculation of the value associated with the most likely loss from an attack  EF is the percentage loss that would occur from a given vulnerability being exploited
  • 30. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 30 ILLINOIS INSTITUTE OF TECHNOLOGY CBA: Formula  CBA is whether or not the control alternative being evaluated is worth the associated cost incurred to control the specific vulnerability  While many CBA techniques exist, for our purposes, the CBA is most easily calculated using the ALE from earlier assessments  CBA = ALE(prior) – ALE(post) – ACS  Where: – ALE prior is the Annualized Loss Expectancy of the risk before the implementation of the control – ALE post is the ALE examined after the control has been in place for a period of time – ACS is the Annual Cost of the Safeguard
  • 31. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 31 ILLINOIS INSTITUTE OF TECHNOLOGY Benchmarking  Rather than use the financial value of information assets, review peer institutions to determine what they are doing to protect their assets (benchmarking)  When benchmarking, an organization typically uses one of two measures: – Metrics-based measures are comparisons based on numerical standards – Process-based measures examine the activities performed in pursuit of its goal, rather than the specifics of how goals were attained
  • 32. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 32 ILLINOIS INSTITUTE OF TECHNOLOGY Due Care/Due Diligence  When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances – Referred to as a standard of due care  Due diligence – Demonstration that the organization is diligent in ensuring that the implemented standards continue to provide the required level of protection  Failure to support a standard of due care or due diligence can open an organization to legal liability
  • 33. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 33 ILLINOIS INSTITUTE OF TECHNOLOGY Best Business Practices  Security efforts that provide a superior level of protection of information are referred to as best business practices  Best security practices (BSPs) are security efforts among the best in the industry  When considering best practices for adoption in your organization, consider the following: – Does your organization resemble the identified target? – Are the resources you can expend similar? – Are you in a similar threat environment?
  • 34. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 34 ILLINOIS INSTITUTE OF TECHNOLOGY Microsoft’s Ten Laws of Security 1. If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore 2. If a bad guy can alter the operating system on your computer, it’s not your computer anymore 3. If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore 4. If you allow a bad guy to upload programs to your web site, it’s not your web site anymore 5. Weak passwords trump strong security
  • 35. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 35 ILLINOIS INSTITUTE OF TECHNOLOGY Microsoft’s Ten Laws of Security 6. A machine is only as secure as the administrator is trustworthy 7. Encrypted data is only as secure as the decryption key 8. An out of date virus scanner is only marginally better than no virus scanner at all 9. Absolute anonymity isn’t practical, in real life or on the web 10. Technology is not a panacea http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/10imlaws.asp
  • 36. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 36 ILLINOIS INSTITUTE OF TECHNOLOGY Problems  The biggest problem with benchmarking in information security is that organizations don’t talk to each other  Another problem with benchmarking is that no two organizations are identical  A third problem is that best practices are a moving target  One last issue to consider is that simply knowing what was going on a few years ago, as in benchmarking, doesn’t necessarily tell us what to do next
  • 37. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 37 ILLINOIS INSTITUTE OF TECHNOLOGY Baselining Baselining is the analysis of measures against established standards In information security, baselining is comparing security activities and events against the organization’s future performance When baselining it is useful to have a guide to the overall process
  • 38. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 38 ILLINOIS INSTITUTE OF TECHNOLOGY Organizational Feasibility Organizational feasibility examines how well the proposed information security alternatives will contribute to the efficiency, effectiveness, and overall operation of an organization Above and beyond the impact on the bottom line, the organization must determine how the proposed alternatives contribute to the business objectives of the organization
  • 39. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 39 ILLINOIS INSTITUTE OF TECHNOLOGY Operational Feasibility Addresses user acceptance and support, management acceptance and support, and the overall requirements of the organization’s stakeholders Sometimes known as behavioral feasibility, because it measures the behavior of users
  • 40. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 40 ILLINOIS INSTITUTE OF TECHNOLOGY Operational Feasibility  A fundamental principle of systems development is obtaining user buy-in on a project  One of the most common methods for obtaining user acceptance and support is through user involvement obtained through three simple steps: – Communicate – Educate – Involve
  • 41. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 41 ILLINOIS INSTITUTE OF TECHNOLOGY Technical Feasibility The project team must also consider the technical feasibilities associated with the design, implementation, and management of controls Examines whether or not the organization has or can acquire the technology necessary to implement & support the control alternatives
  • 42. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 42 ILLINOIS INSTITUTE OF TECHNOLOGY Political Feasibility  For some organizations, the most significant feasibility evaluated may be political  Within organizations, political feasibility defines what can and cannot occur based on the consensus and relationships between the communities of interest  Limits placed on an organization’s actions or behaviors by the information security controls must fit within the realm of the possible before they can be effectively implemented, and that realm includes the availability of staff resources
  • 43. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 43 ILLINOIS INSTITUTE OF TECHNOLOGY Risk Management Discussion Points  Not every organization has the collective will to manage each vulnerability through the application of controls  Depending on the willingness to assume risk, each organization must define its risk appetite  Risk appetite defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility
  • 44. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 44 ILLINOIS INSTITUTE OF TECHNOLOGY Residual Risk When we have controlled any given vulnerability as much as we can, there is often risk that has not been completely removed or has not been completely shifted or planned for This remainder is called residual risk
  • 45. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 45 ILLINOIS INSTITUTE OF TECHNOLOGY Residual Risk To express it another way, “Residual Risk is a combined function of (1) a threat less the effect of some threat-reducing safeguards (2) a vulnerability less the effect of some vulnerability-reducing safeguards (3) an asset less the effect of some asset value-reducing safeguards.”
  • 46. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 46 ILLINOIS INSTITUTE OF TECHNOLOGY Amount of threat reduced by a safeguard Amount of vulnerability reduced by a safeguard Amount of asset value reduced by a safeguard Residual risk: risk that has not been covered by one of the safeguards Risk Residual Risk ResidualFigure 5-4 Riskof information asset
  • 47. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 47 ILLINOIS INSTITUTE OF TECHNOLOGY Documenting Results  At minimum, each information asset- vulnerability pair should have a documented control strategy that clearly identifies any residual risk remaining after the proposed strategy has been executed  Some organizations document the outcome of the control strategy for each information asset-vulnerability pair as an action plan  Action plan includes concrete tasks, each with accountability assigned to an organizational unit or to an individual
  • 48. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 48 ILLINOIS INSTITUTE OF TECHNOLOGY Recommended Practices in Controlling Risk We must convince budget authorities to spend up to the value of the asset to protect a particular asset from an identified threat Each and every control or safeguard implemented will impact more than one threat-asset pair
  • 49. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 49 ILLINOIS INSTITUTE OF TECHNOLOGY Qualitative Measures  Spectrum of steps described above performed with real numbers or best-guess estimates of real numbers is known as a quantitative assessment  However, an organization could determine that it couldn’t put specific numbers on these values  Fortunately, it is possible to repeat these steps using estimates based on a qualitative assessment  Instead of using specific numbers, ranges or levels of values can be developed simplifying the process
  • 50. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 50 ILLINOIS INSTITUTE OF TECHNOLOGY Delphi Technique  One technique for accurately estimating scales and values is the Delphi Technique  The Delphi Technique, named for the Oracle at Delphi, is a process whereby a group of individuals rate or rank a set of information  The individual responses are compiled and then returned to the individuals for another iteration  This process continues until the group is satisfied with the result
  • 51. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 51 ILLINOIS INSTITUTE OF TECHNOLOGY Evaluation, Assessment, and Maintenance of Risk Controls Once a control strategy has been implemented, effectiveness of controls should be monitored and measured on an ongoing basis to determine the effectiveness of the security controls and accuracy of the estimate of the residual risk
  • 52. Transfo rm ing Live s. Inve nting the Future . www.iit.edu ITM 578 52 ILLINOIS INSTITUTE OF TECHNOLOGY The End… Questions?

Hinweis der Redaktion

  1. Upon completion of this lesson the student should be able to: Explain why risk control is needed in today’s organizations Recall risk mitigation strategy options for controlling risks Identify the categories that can be used to classify controls Discuss the conceptual frameworks that exist for evaluating risk controls Formulate a cost benefit analysis when required Describe how to maintain and perpetuate risk controls
  2. Introduction Competitive advantage vs. competitive disadvantage, or the need to avoid falling behind the competition To keep up with the competition, organizations must design and create a safe environment in which business processes and procedures can function This environment must maintain the confidentiality, privacy and integrity of organizational data These objectives are met through the application of the principles of risk management
  3. Risk Management Risk management is the process of identifying vulnerabilities in an organization’s information systems and taking carefully reasoned steps to assure the confidentiality, integrity, and availability of all the components in the organization’s information system. The primary deliverable from risk assessment was a list of documented vulnerabilities, ranked by criticality of impact. Here, you work from that list, assessing options, estimating costs, weighing relative merits of options, and gauging the benefits from various control approaches.
  4. RISK CONTROL STRATEGIES When organizational management has determined that risks from information security threats are creating a competitive disadvantage, they empower the information technology and information security communities of interest to control the risks. Once the project team for information security development has created the Ranked Vulnerability Worksheet, the team must choose one of four basic strategies to control the risks that result from these vulnerabilities. The four risk strategies guide an organization to: 1.Apply safeguards that eliminate or reduce the remaining uncontrolled risks for the vulnerability (avoidance) 2.Transfer the risk to other areas or to outside entities (transference) 3.Reduce the impact should the vulnerability be exploited (mitigation) 4.Inform themselves of all of the consequences and accept the risk without control or mitigation (acceptance)
  5. Avoidance Avoidance is the risk control strategy that attempts to prevent the realization or exploitation of the vulnerability. This is the preferred approach, as it seeks to avoid risk in its entirety rather than dealing with it after it has been realized. Avoidance is accomplished through countering threats, removing vulnerabilities in assets, limiting access to assets, and/or adding protective safeguards.
  6. The most common methods of avoidance involve three areas of controls, avoidance through application of policy, training and education, and technology.
  7. Transference Transference is the control approach that attempts to shift the risk to other assets, other processes, or other organizations. If an organization does not already have quality security management and administration experience, it should hire individuals or firms that provide such expertise. This allows the organization to transfer the risk associated with the management of these complex systems to another organization with established experience in dealing with those risks.
  8. Mitigation Mitigation is the control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. This approach includes three types of plans: disaster recovery planning (DRP), business continuity planning (BCP), and incident response planning (IRP). Mitigation begins with the early detection that an attack is in progress. The most common of the mitigation procedures is the disaster recovery plan. The DRP includes the entire spectrum of activities to recover from an incident. The DRP can include strategies to limit losses before and during the disaster. DRPs usually include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed steps to follow when the disaster has ended. The actions an organization can and perhaps should take while the incident is in progress should be defined in a document referred to as the incident response plan or IRP. The IRP provides answers to questions victims might pose in the midst of a disaster. It answers the questions: What do I do NOW?! What should the administrators do first? Who should they contact? What should they document? DRP and IRP planning overlap to a degree. In many regards, the DRP is the subsection of the IRP that covers disastrous events. While some DRP and IRP decisions and actions are the same, their urgency and results can differ dramatically. The DRP focuses more on preparations completed before and actions taken after the incident, while the IRP focuses on intelligence gathering, information analysis, coordinated decision making and urgent, concrete actions. The third type of planning document under mitigation is the business continuity plan or BCP. The BCP is most strategic and long-term plan of the three plans. It encompasses the continuation of business activities if a catastrophic event occurs, such as the loss of an entire database, building or operations center. The BCP includes planning for the steps to insure the continuation of the organization when the scope or scale of a disaster exceeds the DRPs ability to restore operations.
  9. Acceptance With the Acceptance control approach, an organization evaluates the risk of a vulnerability and allows the risky state to continue as is. The only acceptance strategy that is recognized as valid occurs when the organization has: Determined the level of risk Assessed the probability of attack Estimated the potential damage that could occur from these attacks Performed a thorough cost benefit analysis Evaluated controls using each appropriate type of feasibility Decided that the particular function, service, information, or asset did not justify the cost of protection Acceptance of risk is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation. This control, or rather lack of control, is based on the assumption that it may be a prudent business decision to examine the alternatives and determine that the cost of protecting an asset does not justify the security expenditure. The term, risk appetite is used to describe the degree to which an organization is willing to accept risk as a trade-off to the expense of applying controls.
  10. Mitigation Strategy Selection The level of threat and value of the asset should play a major role in the selection of strategy. The following rules of thumb can be applied in selecting the preferred strategy:
  11. When a vulnerability exists implement assurance techniques to reduce the likelihood of a vulnerability’s being exercised. When a vulnerability can be exploited apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent this occurrence.
  12. When the attacker’s cost is less than his potential gain apply protections to increase the attacker’s cost (e.g., use system controls to limit what a system user can access and do, thereby significantly reducing an attacker’s gain). When potential loss is substantial apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.”
  13. Categories of controls Controlling risk through avoidance, mitigation or transference may be accomplished by implementing controls or safeguards. One approach to selecting controls is by category: 1.Control Function 2.Architectural Layer 3.Strategy Layer 4.Information Security Principle
  14. Control Function Controls or safeguards designed to defend the vulnerability are either preventive or detective. Preventive controls stop attempts to exploit vulnerability by implementing enforcement of an organizational policy or a security principle, such as authentication or confidentiality.
  15. Detective controls warn of violations of security principles, organizational policies, or attempts to exploit vulnerabilities. Detective controls use techniques such as audit trails, intrusion detection, or configuration monitoring.
  16. Architectural Layer Some controls apply to one or more layers of an organization’s technical architecture. Among the architectural layer designators in common use are: organizational policy, external networks, extranets (or demilitarized zones), Intranets (WAN and LAN), network devices that interface network zones (switches, routers, firewalls, and hubs), systems, (computers for mainframe, server or desktop use) and applications.
  17. Strategy Layer Controls are sometimes classified by the risk control strategy they operate within: avoidance, mitigation, transference or acceptance.
  18. Information Security Principle Controls operate within one or more of the commonly accepted information security principles: Confidentiality Integrity Availability Authentication Authorization Accountability Privacy
  19. Feasibility Studies and the Cost Benefit Analysis Before deciding on the strategy for a specific vulnerability all information about the economic and non-economic consequences of the vulnerability facing the information asset must be explored. Fundamentally we are asking, “What are the actual and perceived advantages of implementing a control contrasted with the actual and perceived disadvantages of implementing the control?”
  20. Cost Benefit Analysis (CBA) The approach most commonly considered for a project of information security controls and safeguards is the economic feasibility of implementation. An organization begins by evaluating the worth of the information assets to be protected and the loss in value if those information assets are compromised by the specific vulnerability. It is only common sense that an organization should not spend more to protect an asset than it is worth. The formal process to document this is called a cost benefit analysis or an economic feasibility study.
  21. CBA: Factors Some of the items that impact the cost of a control or safeguard include: Cost of development or acquisition Training fees Cost of implementation Service costs Cost of maintenance
  22. CBA: Benefits Benefit is the value that the organization recognizes by using controls to prevent losses associated with a specific vulnerability. This is usually determined by valuing the information asset or assets exposed by the vulnerability and then determining how much of that value is at risk, and how much risk there is for the asset.
  23. CBA: Asset Valuation Asset valuation is the process of assigning financial value or worth to each information asset. Some will argue that it is virtually impossible to accurately determine the true value of information and information-bearing assets. The valuation of assets involves estimation of real and perceived costs associated with the design, development, installation, maintenance, protection, recovery, and defense against market loss and litigation for every set of information bearing systems or information assets. Some of the components of asset valuation include: Value retained from the cost of creating or acquiring the information asset Value retained from past maintenance of the information asset Value implied by the cost of replacing the information Value from providing the information. Value incurred from the cost of protecting the information Value to owners Value of Intellectual Value to adversaries Loss of productivity while the information assets are unavailable Loss of revenue while information assets are unavailable The organization must be able to place a dollar value on each collection of information and the information assets it comprises. This value is based on the answers to these questions: How much did it cost to create or acquire this information? How much would it cost to recreate or recover this information? How much does it cost to maintain this information? How much is this information worth to the organization? How much is this information worth to the competition?
  24. CBA: Loss Estimates Once an organization has estimated the worth of various assets, it can begin to examine the potential loss that could occur from the exploitation of vulnerability or a threat occurrence. This process results in the estimate of potential loss per risk. The questions that must be asked here include: What damage could occur, and what financial impact would it have? What would it cost to recover from the attack, in addition to the costs from #1? What is the single loss expectancy for each risk?
  25. CBA: ALE & ARO The expected value of a loss can be stated in the following equation: Annualized Loss Expectancy (ALE) = Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO) where: SLE = asset value x exposure factor (EF) ARO is simply how often you expect a specific type of attack to occur, per year. SLE is the calculation of the value associated with the most likely loss from an attack. EF is the percentage loss that would occur from a given vulnerability being exploited.
  26. CBA: Formula In its simplest definition, CBA is whether or not the control alternative being evaluated is worth the associated cost incurred to control the specific vulnerability. While many CBA techniques exist, for our purposes, the CBA is most easily calculated using the ALE from earlier assessments. CBA = ALE(prior) – ALE(post) – ACS ALE prior is the Annualized Loss Expectancy of the risk before the implementation of the control. ALE post is the ALE examined after the control has been in place for a period of time. ACS is the Annual Cost of the Safeguard.
  27. Benchmarking An alternative strategy to the cost benefit analysis and its attempt to place a hard dollar figure on each information asset is to approach risk management from a different angle. Instead of determining the financial value of information, and then implementing security as an acceptable percentage of that value, an organization could look at peer institutions to determine what others are doing to protect their information (benchmarking). Benchmarking is the process of seeking out and studying the practices used in other organizations that produce the results you desire in your organization. When benchmarking, an organization typically uses one of two measures to compare practices, to determine which practices it would prefer to implement. These are metrics-based measures, and process-based measures. Metrics-based measures are comparisons based on numerical standards, such as: Numbers of successful attacks Staff-hours spent on systems protection Dollars spent on protection Numbers of security personnel Estimated losses in dollars of information due to successful attacks Loss in productivity hours associated with successful attacks An organization uses this information by ranking competitive businesses within a similar size or market, and determining how their measures compare to others. Process-based measures are generally less number-focused and more strategic than metrics-based measures. For each of the areas the organization is interested in benchmarking, process-based measures enable the companies to examine the activities an individual company performs in pursuit of its goal, rather than the specifics of how goals were attained. The primary focus is the method the organization uses to accomplish a particular process, rather than the outcome. In information security, two categories of benchmarks are used: standards of due care/due diligence, and best practices. Within best practices is a sub-category of practices referred to as the gold standard, those practices typically viewed as “the best of the best.”
  28. Due Care/Due Diligence When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as a standard of due care. It is insufficient to just implement these standards and then ignore them. The application of controls at or above the prescribed levels and the maintenance of those standards of due care show that the organization has performed due diligence. Due diligence is the demonstration that the organization is diligent in ensuring that the implemented standards continue to provide the required level of protection. Failure to support a standard of due care or due diligence can open an organization to legal liability, provided it can be shown that the organization was negligent in its application or lack of application of information protection.
  29. Best Business Practices Security efforts that seek to provide a superior level of performance in the protection of information are referred to as best business practices or simply best practices or recommended practices. Best security practices (BSPs) are those security efforts that are among the best in the industry, balancing the need to access with the need to provide adequate protection. Best practices seek to provide as much security as possible for information and systems while maintaining a solid degree of fiscal responsibility. When considering best practices for adoption in your organization, consider the following: Does your organization resemble the identified target organization of the best practice? Are the resources you can expend similar to those identified in the best practice? A best practice proposal that assumes unlimited funding and does not identify needed tradeoffs will be of limited value if your approach has strict resource limits. Are you in a similar threat environment as that proposed in the best practice? A proposal of best practice from months and even weeks ago may not be appropriate for the current threat environment.
  30. Microsoft’s Ten Immutable Laws of Security 1: If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore. 2: If a bad guy can alter the operating system on your computer, it’s not your computer anymore. 3: If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore. 4: If you allow a bad guy to upload programs to your web site, it’s not your web site anymore. 5: Weak passwords trump strong security.
  31. Microsoft’s Ten Immutable Laws of Security 6: A machine is only as secure as the administrator is trustworthy. 7: Encrypted data is only as secure as the decryption key. 8: An out of date virus scanner is only marginally better than no virus scanner at all. 9: Absolute anonymity isn't practical, in real life or on the web. 10: Technology is not a panacea. http://www.microsoft.com/technet/treeview/default.asp?url=/technet/columns/security/10imlaws.asp
  32. Problems with benchmarking and best practices The biggest problem with benchmarking in information security is that organizations don’t talk to each other. Another problem with benchmarking is that no two organizations are identical. A third problem is that best practices are a moving target. What worked well two years ago may be completely worthless against today’s threats. One last issue to consider is that simply knowing what was going on a few years ago, as in benchmarking, doesn’t necessarily tell us what to do next.
  33. Baselining Baselining is the analysis of measures against established standards. In information security, baselining is the comparison of security activities and events against the organization’s future performance. When baselining it is useful to have a guide to the overall process.
  34. Organizational Feasibility Organizational feasibility examines how well the proposed information security alternatives will contribute to the efficiency, effectiveness, and overall operation of an organization. Above and beyond the impact on the bottom line, the organization must determine how the proposed alternatives contribute to the business objectives of the organization.
  35. Operational Feasibility Operational feasibility addresses user acceptance and support, management acceptance and support, and the overall requirements of the organizations’ stakeholders. Operational feasibility is sometimes known as behavioral feasibility, because it measures the behavior of users.
  36. One of the fundamental principles of systems development is obtaining user buy-in on a project. One of the most common methods for obtaining user acceptance and support is through user involvement. User involvement can be obtained through three simple steps: communicate, educate, and involve.
  37. Technical Feasibility In addition to the straightforward feasibilities associated with the economic costs and benefits of the controls, the project team must also consider the technical feasibilities associated with the design, implementation and management of controls. Technical feasibility examines whether or not the organization has or can acquire the technology necessary to implement and support the control alternatives.
  38. Political Feasibility For some organizations, the most significant feasibility evaluated may be political. Within organizations, political feasibility defines what can and cannot occur based on the consensus and relationships between the communities of interest. The limits placed on an organization’s actions or behaviors by the information security controls must fit within the realm of the possible before they can be effectively implemented, and that realm includes the availability of staff resources.
  39. Risk Management Discussion Points Not every organization has the collective will to manage each vulnerability through the application of controls. Depending on the willingness to assume risk, each organization must define its risk appetite. Risk appetite defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.
  40. Residual Risk When we have controlled any given vulnerability as much as we can, there is often risk that has not been completed removed or has not been completely shifted or planned for. This remainder is called residual risk.
  41. To express it another way, “Residual Risk is a combined function of (1) a threat less the effect of some threat reducing safeguards; (2) a vulnerability less the effect of some vulnerability reducing safeguards and (3) an asset less the effect of some asset value reducing safeguards.”
  42. Documenting Results At minimum, each information asset-vulnerability pair should have a documented control strategy that clearly identifies any residual risk remaining after the proposed strategy has been executed. Some organizations document the outcome of the control strategy for each information asset-vulnerability pair as an action plan. This action plan includes concrete tasks, each with accountability assigned to an organizational unit or to an individual.
  43. Recommended Practices in Controlling Risk Select Safeguards Based On Expenditures We must convince budget authorities to spend up to the value of the asset to protect a particular asset from an identified threat. Each and every control or safeguard implemented will impact more than one threat-asset pair. Between the impossible task associated with the valuation of information assets, and the dynamic nature of the ALE calculations, it’s no wonder organizations are looking for a more straightforward method of implementing controls, that doesn’t involve such imperfect calculations.
  44. Qualitative Measures The spectrum of steps described above was performed with real numbers or best-guess estimates of real numbers. This is known as a quantitative assessment. However, an organization could determine that it couldn’t put specific numbers on these values. Fortunately, it is possible to repeat these steps using estimates based on a qualitative assessment. Instead of using specific numbers, ranges or levels of values can be developed simplifying the process.
  45. Delphi Technique How do you calculate the values and scales of either qualitative or quantitative assessment? One technique for accurately estimating scales and values is the Delphi Technique. The Delphi Technique, named for the Oracle at Delphi, is a process whereby a group of individuals rate or rank a set of information. The individual responses are compiled and then returned to the individuals for another iteration. This process continues until the group of individuals is satisfied with the result.
  46. Evaluation, Assessment and Maintenance of Risk Controls Once a control strategy has been implemented, the effectiveness of controls should be monitored and measured on an ongoing basis to determine the effectiveness of the security controls and the accuracy of the estimate of the residual risk.