Risk Management: Identifying and Assessing Risk�Chapter 4
Once we know our weaknesses, they cease to do us any harm.
-- G.C. (GEORG CHRISTOPH) LICHTENBERG (1742–1799) GERMAN PHYSICIST, PHILOSOPHER
Learning Objectives:
Upon completion of this chapter you should be able to:
Principles of Information Security - Chapter 4
2
Principles of Information Security - Chapter 4
3
Risk Management
Principles of Information Security - Chapter 4
4
Know Ourselves
Principles of Information Security - Chapter 4
5
Know the Enemy
Principles of Information Security - Chapter 4
6
Accountability for Risk Management
Principles of Information Security - Chapter 4
7
Accountability for Risk Management
Principles of Information Security - Chapter 4
8
Risk Management Process
Principles of Information Security - Chapter 4
9
Risk Identification
Principles of Information Security - Chapter 4
10
Asset Identification and Valuation
Principles of Information Security - Chapter 4
11
People, Procedures, and Data Asset Identification
Principles of Information Security - Chapter 4
13
Asset Information for People
Principles of Information Security - Chapter 4
14
Asset Information for Procedures
Principles of Information Security - Chapter 4
15
Asset Information for Data
Principles of Information Security - Chapter 4
16
Hardware, Software, and Network Asset Identification
Principles of Information Security - Chapter 4
17
Hardware, Software, and Network Asset Identification
Principles of Information Security - Chapter 4
18
Information Asset Classification
Principles of Information Security - Chapter 4
19
Information Asset Valuation
Principles of Information Security - Chapter 4
20
Figure 4-3 – Example Worksheet
Principles of Information Security - Chapter 4
21
Information Asset Valuation
Which factor is the most important to the organization?
Principles of Information Security - Chapter 4
22
Principles of Information Security - Chapter 4
23
Data Classification and Management
Principles of Information Security - Chapter 4
24
Security Clearances
Principles of Information Security - Chapter 4
25
Management of Classified Data
Principles of Information Security - Chapter 4
26
Threat Identification
Principles of Information Security - Chapter 4
27
Principles of Information Security - Chapter 4
28
Identify and Prioritize Threats
Principles of Information Security - Chapter 4
29
Vulnerability Identification
Principles of Information Security - Chapter 4
30
Vulnerability Identification
Principles of Information Security - Chapter 4
31
Table 4-4 – Vulnerability Assessment Example
Principles of Information Security - Chapter 4
32
Risk Assessment
Principles of Information Security - Chapter 4
33
Introduction to Risk Assessment
Principles of Information Security - Chapter 4
34
Risk Determination
For the purpose of relative risk assessment:
risk =
(value (or impact) of information asset ×
likelihood of vulnerability occurrence)
× (100% −
percentage of risk already controlled +
an element of uncertainty)
Principles of Information Security - Chapter 4
35
Identify Possible Controls
Principles of Information Security - Chapter 4
36
3 General Categories of Control
Details in page 143 of text…
Principles of Information Security - Chapter 4
37
Access Controls
Principles of Information Security - Chapter 4
38
Types of Access Controls
Principles of Information Security - Chapter 4
39
Lattice-based Control
Principles of Information Security - Chapter 4
40
Documenting Results of Risk Assessment
Principles of Information Security - Chapter 4
41
Introduction to Risk Assessment
Principles of Information Security - Chapter 4
42
Principles of Information Security - Chapter 4
43