Security Risk Management and Ethics Ch1
Textbook Reference
Title: Measuring and managing information risk: A FAIR Approach
Authors: Freund, J., & Jones, J.
Edition: 1st Edition, 2015
Publisher: Butterworth-Heinemann
ISBN-13: 9780127999326
Chapter One: Introduction to Security Risk Management
Chapter 1: Topics
Definitions and concepts related to risk, including its relationship to:
Threats
Vulnerabilities
Losses
Major components of risk to IT infrastructure
Importance of risk management in business
Techniques for risk identification
Techniques for risk management
Chapter 1: Goals
Upon completion of this chapter, you will be able to:
Define risk
Identify major components of risk
Describe relationships between:
Threats and vulnerabilities
Impact
Define risk management
Explain risk management's relationship with:
Profitability
Survivability
Understand the relationship between cost of loss versus cost of risk management
Describe risk perception among different organizational roles
Identify threats and categorize them
Describe techniques for identifying vulnerabilities
Define and identify risk management techniques
What Is Risk?
Definition of Risk: Likelihood of a loss occurring
Loss occurs when a threat exploits a vulnerability
Risk spectrum:
Severe risks can cause business failure; minor risks are often accepted
Management techniques help differentiate severe from minor risks
Decision-making outcomes involve:
Avoiding
Transferring
Mitigating
Accepting a risk
Key Concepts of Risk
Common themes in risk definitions:
Threat: Activity representing possible danger
Vulnerability: A weakness in systems or processes
Loss: Compromise to business functions or assets
Primary goal: Minimize potential losses from risks
Effect of Risks on Businesses
Categories of organizational losses:
Business Functions: Disruption of services or sales
Business Assets: Loss of value due to threats
Driver of Business Costs: Cost implications of managing risks
Business Functions
Activities performing services and product sales
Security risks affecting functions directly impact revenue
Examples of Business Functions & Risks
E-commerce site: Attack leads to loss of sales
Author's PC virus: Delayed article submission lowers value
Analyst connectivity issues: Poor decisions from outdated data
Warehouse application failure: Delayed shipments and losses
Business Assets
Definition: Items with measurable value to a company
Tangible value: Monetary worth, e.g., computer hardware
Intangible value: Non-measurable attributes, e.g., trust
Both types of value are crucial in risk identification and prioritization
Intangible Value Examples
Future lost revenue from shifting customer loyalty
Cost of acquiring customers lost during disruptions
Driver of Business Costs
Risk management impacts overall business profitability
Balance required between spending on risk controls and maintaining profits
Profitability vs. Survivability
Profitability: Revenue minus costs
Survivability: Ability to endure losses
Costs of risk management do not directly generate revenue but ensure continued operation
Key Considerations
Out-of-pocket costs: Funds spent on risk reduction
Lost opportunity costs: Alternative investments lost for risk management
Future costs: Ongoing expenses for maintaining controls
Confidence of clients/stakeholders: Affected by risk management effectiveness
Major Components of Risk in IT Infrastructure
Seven domains present in a typical environment:
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
Remote Access Domain
WAN Domain
System/Application Domain
Each domain must be protected; vulnerabilities in any can jeopardize the security of all
The User Domain
Includes users (employees, contractors) as potential weak links
Social engineering tactics can manipulate personnel to bypass security
Workstation Domain
Vulnerable to malware and lack of updates
Importance of antivirus software and timely patch management
LAN Domain
Internal environment with connected devices
Risks include sniffing attacks; protection through switches is key
LAN-to-WAN Domain
Boundary between trusted local network and untrusted WAN
Requires high security measures for protections
Remote Access Domain
Remote access grants workers connectivity but introduces vulnerabilities
VPNs provide security, but have their own risks
WAN Domain
Often the Internet, inherently untrusted and subjected to attacks
High-security measures are critical
System/Application Domain
Includes servers and key applications, requiring server-specific security
Regular updates and control measures are necessary to maintain integrity
Threats, Vulnerabilities, and Impact
Threats exploit vulnerabilities leading to potential loss
Important to understand impact severity and types of loss:
Confidentiality, Integrity, Availability (CIA)
Preventing unauthorized access is key to maintaining system security
Losses can be characterized as high, medium, or low impact
IT Security Management
Process to achieve suitable levels of key security objectives (CIA)
Functions include:
Defining security objectives and policies
Identifying and analyzing threats and risks
Developing safeguards and monitoring implementations
Incident detection and response
Security Standards
ISO 27000 series defines vocabulary and security management practices
Standards include frameworks for implementing controls and assessing risks
Risk Assessment Approaches
Baseline Approach: Use of industry best practices
Informal Approach: Pragmatic analysis using analyst knowledge
Detailed Risk Assessment: Comprehensive structure for critical systems
Combined Approach: Iterative assessment process
Steps to Risk Assessment
Establish Context: Define the broad exposure and risk appetite
Asset Identification: Identify significant assets within the organization
Threat Identification: Determine possible threats to the identified assets
Vulnerability Identification: Explore weaknesses in systems
Analyze Risks: Specify likelihood and consequences of identified risks
Documenting Results: Maintain a risk register detailing identified risks and controls
Case Study: Silver Star Mines
Context: Global mining operation with extensive IT infrastructure
Decided on a combined risk assessment approach
Emphasis on the integrity and availability of critical systems alongside managing known threats and vulnerabilities
Summary
Emphasizes the necessity of performing thorough risk assessments as part of IT security management processes.