T2 Ch06
T2 Ch06
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
1
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Learning Objectives
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
2
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Introduction to the Management of Risk in
Information Security
Chapter 06: Risk Management: Assessing Risk
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Management
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
4
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Introduction
• InfoSec managers and technicians are the defenders of
information
• They constantly face a myriad of threats to the
organization’s information assets
• A layered defense is the foundation of any InfoSec
program
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
5
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
What is Risk?
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
7
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Levels
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
8
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Matrix
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
9
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Management
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
10
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
13
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
14
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
15
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
16
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
17
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
19
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
20
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
The RM Policy
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
21
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
24
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Framework Design
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
26
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
27
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Framework Implementation
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
28
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
29
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
30
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Continuous Improvement
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
31
distributed with a certain product or service or otherwise on a password-protected website for classroom use
The Risk Management Process
Chapter 06: Risk Management: Assessing Risk
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
36
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
38
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
39
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
40
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
41
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
43
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
44
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
45
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
46
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
47
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
48
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
49
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Threat Assessment
Identifying Threats
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
51
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
52
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Assessing Threats
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
54
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Prioritizing Threats
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
55
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Vulnerability Assessment
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
57
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
59
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Risk Assessment: Risk Analysis
Chapter 06: Risk Management: Assessing Risk
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
61
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Assessing Risk
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
62
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
63
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
64
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
65
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
66
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
67
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
68
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
69
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
70
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Aggregation
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
71
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Uncertainty
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
72
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Determination
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
73
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
75
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
76
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Risk Evaluation
• Once the risk ratings are calculated for all TVA triples, the
organization needs to decide whether it can live with the
analyzed level of risk—in other words, the organization
must determine its risk appetite
• This is the risk evaluation stage
• The organization must translate its risk appetite from the
general statement developed by the RM framework
team (and based on guidance from the governance
group) to a numerical value it can compare to each
analyzed risk
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
77
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
78
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
79
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
80
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Evaluating Risk
• Once the risk has been identified and its relative severity against
the value of the information asset has been evaluated, the
organization must decide whether the current level of risk is
acceptable or something must be done
• If the RM process team completes its analysis and shares its
findings with the framework team and/or governance group, and
the executive decision makers state, “We can live with that,” then
the process moves on to the monitoring and review function,
where the organization keeps an eye on assets, threats, and
vulnerabilities for a trigger to restart the RM process anew.
• If the decision makers indicate that they are not comfortable with
the current level of risk, then the next stage of the RM process
proceeds: risk treatment
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
81
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
82
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
83
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
84
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Chapter Summary
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
85
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Chapter Summary
Summary
Summary (Continued)
• A TVA worksheet lists the assets in priority order along one axis,
and the threats in priority order along the other axis. The resulting
grid provides a convenient method of examining the “exposure” of
assets, allowing a simple vulnerability assessment
• The goal of risk assessment is the assignment of a risk rating or
score that represents the relative risk for a specific vulnerability of
a specific information asset
• If any specific vulnerability is completely managed by an existing
control, it no longer needs to be considered for additional controls
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
88
distributed with a certain product or service or otherwise on a password-protected website for classroom use
Management of Information Security, 6th ed. - Whitman & Mattord
Summary (Continued)
© 2018 Cengage May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
89
distributed with a certain product or service or otherwise on a password-protected website for classroom use