CISSP For Dummies

Beyond basic security fundamentals, the concepts of risk management are perhaps the most important and complex part of the information security and risk management domain. The CISSP candidate must fully understand the risk management triple; quantitative compared with qualitative risk assessment methodologies, risk calculations, and safeguard selection criteria and objectives.

The business of information security is all about risk management. A risk comprises a threat and a vulnerability of an asset, defined as follows:

Threat x Vulnerability = Risk

 Instant Answer   The risk management triple consists of an asset, a threat, and a vulnerability.

Risk can never be completely eliminated. Given sufficient time, resources, motivation, and money, any system or environment, no matter how secure, can eventually be compromised. Some threats or events, such as natural disasters, are entirely beyond our control and are largely unpredictable. Therefore, the main goal of risk management is risk mitigation: reducing risk to a level that’s acceptable to an organization. Risk management comprises the following three main elements:

Risk identification

A preliminary step in risk management is risk identification. Risk identification involves identifying specific elements of the three components of risk: assets, threats, and vulnerabilities.

Asset valuation

Identifying an organization’s assets and determining their value is a critical step in determining the appropriate level of security. The value of an asset to an organization can be both quantitative (related to its cost) and qualitative (its relative importance). An inaccurate or hastily conducted asset valuation process can have the following consequences:

 Instant Answer   A properly conducted asset valuation process has several benefits to an organization:

Three basic elements used to determine the value of an asset are

Threat analysis

Threat analysis involves the following four steps:

  1. Define the actual threat.

  2. Identify possible consequences to the organization if the threat is realized.

  3. Determine the probable frequency of a threat.

  4. Assess the probability that a threat will actually materialize.

For example, a company with a major distribution center located along the Gulf Coast of the United States may be concerned about hurricanes. Possible consequences may include power outages, wind damage, and flooding. Based on climatology, the company can determine that an annual average of three hurricanes pass within 50 miles of its location between June and September and that a high probability exists of a hurricane actually affecting the company’s operations during this period. During the remainder of the year, the threat of hurricanes is a low probability.

The number and types of threats that an organization must consider can be overwhelming but can generally be categorized as

 Warning   Not all threats can be easily or rigidly classified. For example, fires and utility losses can be both natural and man-made. See Chapter 11 for more on disaster recovery.

Vulnerability assessment

A vulnerability assessment provides a valuable baseline for determining appropriate and necessary safeguards. For example, a Denial of Service threat may exist based on a vulnerability found in Microsoft’s implementation of Domain Name System (DNS). However, if an organization’s DNS servers have been properly patched or the organization uses a UNIX-based BIND (Berkeley Internet Name Domain) server, the specific vulnerability may already have been adequately addressed, and no additional safeguards may be necessary for that threat.

Risk analysis

The next element in risk management is risk analysis. A risk analysis brings together all the elements of risk management (identification, analysis, and control) and is critical to an organization for developing an effective risk management strategy.

 Instant Answer   A risk analysis involves the following four steps:

  1. Identify the assets to be protected, including their relative value, sensitivity, or importance to the organization. This is a component of risk identification (asset valuation).

  2. Define specific threats, including threat frequency and impact data. Again, this is a component of risk identification (threat analysis).

  3. Calculate Annualized Loss Expectancy (ALE). ALE calculation is a fundamental concept in risk analysis; we discuss this in further detail later in this section.

  4. Select appropriate safeguards. This is a component of both risk identification (vulnerability assessment) and risk control (which we discuss later in this chapter).

The Annualized Loss Expectancy (ALE) provides a standard, quantifiable measure of the impact that a realized threat has on an organization’s assets. The estimated annual loss for a threat or event, expressed in dollars, ALE is particularly useful for determining the cost-benefit ratio of a safeguard or control. ALE is determined by this formula:

SLE x ARO = ALE

where

The two major types of risk analysis are quantitative and qualitative.

Quantitative risk analysis

A fully quantitative risk analysis requires all elements of the process, including asset value, impact, threat frequency, safeguard effectiveness, safeguard costs, uncertainty, and probability, to be measured and assigned a numeric value. However, assigning a value to every component associated with a risk (safeguard effectiveness and uncertainty) isn’t possible, so you must apply some qualitative measures.

 Instant Answer   A quantitative risk analysis attempts to assign an objective numeric value (cost) to the components (assets and threats) of the risk analysis.

Achieving a purely quantitative risk analysis is impossible.

Advantages of a quantitative compared with qualitative risk analysis include the following:

Disadvantages of a quantitative compared with qualitative risk analysis include the following:

Qualitative risk analysis

Qualitative risk analysis is more subjective than a quantitative risk analysis; and, unlike a quantitative risk analysis, it’s possible to conduct a purely qualitative risk analysis. The challenge of a qualitative risk analysis is developing real scenarios that describe a threat and potential losses to organizational assets.

Advantages of a qualitative compared with quantitative risk analysis include

Disadvantages of a qualitative compared with quantitative risk analysis include

 Instant Answer   A qualitative risk analysis is scenario-driven and doesn’t attempt to assign numeric values to the components (assets and threats) of the risk analysis.

Risk control

A properly conducted risk analysis provides the basis for selecting appropriate safeguards and countermeasures. A safeguard is a control or countermeasure that reduces risk associated with a specific threat. The absence of a safeguard against a threat creates a vulnerability and increases the risk.

 Instant Answer   Safeguards counter risks through one of three general remedies:

Several criteria for selecting safeguards include cost-effectiveness, legal liability, operational impact, and technical factors.

Cost-effectiveness

The most common criterion for safeguard selection is cost-effectiveness, which is determined through cost-benefit analysis. Cost-benefit analysis for a given safeguard or collection of safeguards can be computed as follows:

ALE before safeguard – ALE after safeguard – cost of safeguard = value of safeguard to the organization

For example, if the ALE associated with a specific threat (data loss) is $1,000,000; the ALE after a safeguard (enterprise tape backup) has been implemented is $10,000 (recovery time); and the cost of the safeguard (purchase, installation, training, and maintenance) is $140,000; then the value of the safeguard to the organization is $850,000.

When calculating the cost of the safeguard, you should consider the total cost of ownership, including

The total cost of a safeguard is normally stated as an annualized amount.

Legal liability

An organization that fails to implement a safeguard against a threat is exposed to legal liability if the cost to implement a safeguard is less than the loss resulting from a realized threat. The legal liability we’re talking about here could encompass statutory liability (as a result of failing to obey the law) or civil liability (as a result of failing to comply with a legal contract). A cost-benefit analysis is a useful tool for determining legal liability.

Operational impact

The operational impact of a safeguard must also be considered. If a safeguard is too difficult to implement and operate, or interferes excessively with normal operations or production, it will be circumvented or ignored and thus not be effective.

Technical factors

The safeguard itself should not introduce new vulnerabilities. For example, improper placement, configuration, or operation of a safeguard can cause new vulnerabilities; lack of fail-safe capabilities, insufficient auditing and accounting features, or improper reset functions can cause asset damage or destruction. Finally, covert channel access or other unsafe conditions are technical issues that can create new vulnerabilities.

Категории