Friday, August 23, 2013

Risk Assessment

We can determine the relative risk for each of the vulnerabilities through a process called risk assessment.
 Risk assessment assigns a risk rating or score to each specific information asset, useful in gauging the relative risk introduced by each vulnerable information asset and making comparative ratings later in the risk control process.

Introduction to Risk Assessment:
 Risk Identification Estimate Factors
– Likelihood
– Value of Information Assets
– Percent of Risk Mitigated
– Uncertainty

Risk Determination:
For the purpose of relative risk assessment:
risk =minus plus
likelihood of vulnerability occurrence times value (or impact)
percentage risk already controlled an element of uncertainty.

Identify Possible Controls:
 For each threat and its associated vulnerabilities that have any residual risk, create a preliminary list of control ideas
 Residual risk is the risk that remains to the information asset even after the existing control has been applied.

Access Controls:
 One particular application of controls is in the area of access controls
 Access controls are those controls that specifically address admission of a user into a trusted area of the organization
 There are a number of approaches to controlling access
 Access controls can be
– discretionary
– mandatory
– nondiscretionary

Types of Access Controls:
 Discretionary Access Controls (DAC) are implemented at the discretion or option of the data user
 Mandatory Access Controls (MACs) are structured and coordinated with a data classification scheme, and are required
 Nondiscretionary Controls are those determined by a central authority in the organization and can be based on that individual‘s role (Role-Based Controls) or a specified set of duties or tasks the individual is assigned (Task-Based Controls) or can be based on specified lists maintained on subjects or objects.

Lattice-based Control:
 Another type of nondiscretionary access is lattice-based control, where a lattice structure (or matrix) is created containing subjects and objects, and the boundaries associated with each pair is contained
 This specifies the level of access each subject has to each object
 In a lattice-based control the column of attributes associated with a particular object are referred to as an access control list or ACL
 The row of attributes associated with a particular subject (such as a user) is referred to as a capabilities table.

Documenting Results of Risk Assessment:
 The goal of this process has been to identify the information assets of the organization that have specific vulnerabilities and create a list of them, ranked for focus on those most needing protection first
 In preparing this list we have collected and preserved factual information about the assets, the threats they face, and the vulnerabilities they experience
Introduction to Risk Assessment
 The process you develop for risk identification should include designating what function the reports will serve, who is responsible for preparing the reports, and who reviews them
We do know that the ranked vulnerability risk worksheet is the initial working document for the next step in the risk management process: assessing and controlling risk 

No comments:

Post a Comment