Uploaded by pauljayakar

CRISC guide

advertisement
CRISC Certification
Preparation Guide Kit
TABLE OF CONTENT
Study Guide................................................................................................ 2
Module 1:
Welcome and Introduction ..................................................................................................... 2
Module 2:
Preliminary .......................................................................................................................................... 5
Module 3:
Risk Identification ......................................................................................................................... 14
Module 4:
Risk Assessment .......................................................................................................................... 39
Module 5:
Risk Mitigation ............................................................................................................................... 49
Module 6:
Risk Monitoring and Control Mitigation ...................................................................... 69
Glossary..................................................................................................... 78
ENROLL THIS COURSE
Study Guide
CRISC
Created By​: Nenad Andrejevic, Teaching Assistant
Module 1: ​Welcome and Introduction
Lesson 1.1: Welcome and Introduction
Skills Learned From This Lesson: Introduction to course - agenda, instructor introduction,
Introduction to certificate CRISC
●
Course material:
○ Study guide (you are reading it now)
○ Glossary
○ Flashcards
Lesson 1.2: Who is ISACA?
Skills Learned From This Lesson: History and value of ISACA as organisation, value of c
certification, other ISACA certification
●
ISACA is an international professional association focused on IT (Information
technology) governance. It is known as the Information Systems Audit and Control
Association, although ISACA now goes by its acronym only.
○ WEB:​ ​https://www.isaca.org
○ CRISC - is the only certification that prepares and enables IT professionals for
the unique challenges of IT and enterprise risk management, and positions them
to become strategic partners to the enterprise.
■ https://www.isaca.org/Certification/CRISC-Certified-in-Risk-and-Informatio
n-Systems-Control/Pages/default.aspx
○ Respectable certificate around the globe.
○ Vendor neutral - not vendor specific.
○ Portable certification - not industry specific.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
ENROLL THIS COURSE
○
Increase your marketing value :-)
Lesson 1.3: Who Should Take CRISC?
Skills Learned From This Lesson: Benefits of certification for you and for your employer.
●
●
●
●
●
Those who earn CRISC help enterprises to understand business risk, and have the
technical knowledge to implement appropriate IS controls.
CRISC is designed for:
○ IT professionals
○ Risk professionals
○ Control professionals
○ Business analysts
○ Project managers
○ Compliance professionals
IT risk are business risk
CRISC certification can help you pass the other IT security certifications such as CISM,
CISA, CISSP or PMP.
Course agenda follow the ISACA Risk life cycle:
○ Domain 0 - Introduction To Is Risk Management Concepts
○ Domain 1 - Identifying IT Risk (27%)
○ Domain 2 - Assessing IT Risk (28%)
○ Domain 3 - Risk Response And Mitigation (23%)
○ Domain 4 - Risk And Control Monitoring And Reporting (22%)
○ Exam question preparation review
Lesson 1.4: The Exam
Skills Learned From This Lesson: What is the certification process, how to register and
scheduling the exam. You will learn about the exam format, numbers of questions, passing
score. Steps need to be taken after the exam and application submitting process.
●
Since December 2017, ISACA changed from paper based exam to computer based
exam. There were no more paper based exams.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
ENROLL THIS COURSE
●
●
●
●
●
●
!!!! NOTE !!!! - In the video, Kelly explain about registration process and time frames for
taking exam. However ISACA change their exam policy, from the June 2019. !!!! NOTE
!!!
Beginning in June 2019, ISACA exams (CISA, CISM, CGEIT, CRISC, CSX-Audit,
CSX-Fundamentals, COBIT) are now administered all year round in what is known as
Continuous Testing.
Exam candidates may register for the exam whenever they are ready to sit for the
examination. There are no deadlines as to when an individual needs to register by.
When registering for Continuous Testing, exam candidates are provided with a 365-day
exam eligibility period to sit for the examination. Individuals may schedule their
examination for a location, date, and time that is most convenient to them (based on
location and date availability.
Exam format
○ 150 Multiple choice questions
○ Four hours allotted for taking exam
○ Scoring from 200-800 points 450 points for passing
○ Only one Credited answer
○ Questions are weighted
○ Questions are designed to test Practical knowledge and experience
After successfully passing the exam:
○ Meet the following work experience requirements in the fields of IT risk
management and IS control.
○ A minimum of at least three (3) years of cumulative work experience performing
the tasks of a CRISC professional across at least two (2) of the four (4) CRISC
domains is required for certification. Of these two (2) required domains, one (1)
must be in either Domain 1 or 2.
○ Adherence to the Code of Professional Ethics
■ https://www.isaca.org/Certification/Code-of-Professional-Ethics/Pages/def
ault.aspx
○ Adherence to the Continuing Professional Education (CPE) Policy
■ Attain and report a minimum of one hundred and twenty (120) CPE hours
for a three-year reporting period and attain and report an annual minimum
of twenty (20) CPE hours.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
ENROLL THIS COURSE
■
https://www.isaca.org/Certification/Additional-Resources/Pages/Annual-C
PE-Audit.aspx
Module 2: ​Preliminary
Lesson 2.1: Video Introduction to Information Security Risks
Skills Learned From This Lesson: Risk, Information security Risk, Definition, Risk factors,
Assets, Threat, Vulnerability, Likelihood
●
●
●
●
●
Risk definition by ISACA - The combination of the probability of an event and its impact.
For many practitioners, traditional definition Risk = Threat x Vulnerability is considered
more useful because separate risk from impact (consequences).
IT Risk - The business risk associated with the use, ownership, operation, involvement,
influence and adoption of IT within an enterprise.
Assets - Something of either tangible or intangible value that is worth protecting,
including people, information, infrastructure, finances and reputation.
Risk calculation is defined by R(risk) = A(asset) x T(threat) x P(probability)
Lesson 2.2: Risk Governance vs. Risk Management
Skills Learned From This Lesson: Governance, Management, Board of directors, Steering
committee,Senior management
●
●
●
●
●
Entities responsible for governance - board of directors, managers, shareholders,
creditors, auditors, regulators.
Corporate governance is the collection of mechanisms, processes and relations by
which corporations are controlled and operated. Governance structures and principles
identify the distribution of rights and responsibilities among different participants in the
corporation (such as the board of directors, managers, shareholders, creditors, auditors,
regulators, and other stakeholders) and include the rules and procedures for making
decisions in corporate affairs. (https://en.wikipedia.org/wiki/Corporate_governance)
Culture of the organization - also includes the organization’s vision, values, norms,
systems, symbols, language, assumptions, beliefs, and habits (Needle, 2004).
“ Culture, more than rule books, determine how a company behaves.” - Warren Buffett
Risk Governance - four main objectives:
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
ENROLL THIS COURSE
●
●
●
●
●
●
●
●
●
●
●
○ Establish and maintain common risk view
○ Integrate risk management into the enterprise
○ Make risk-aware business decisions
○ Ensure that risk management controls are implemented and operating correctly
Governance should give an answer to these four questions :
○ Are we doing the right things ?
○ Are we doing the right way ?
○ Are we getting them done well ?
○ Are we getting the benefits ?
Governance determine - focus, directions
Governance delivering value
Risk Management
“Companies that think about risk in the context of their business decisions can be better
positioned to manage the risks that drive performance.” - GRC survey 2015, EY, 2015
Context of the organization define risk view.
Risk management is conducted by functional leadership.
Focus on :
○ Planning
○ Building
○ Running
○ Monitoring
Risk management - Foresees challenges to a degree that’s acceptable by senior
management (or board directors)
Main difference - Governance (is more about WHAT) vs Management (HOW)
Lesson 2.3: Risk Definitions -Little bit coroase sound :(
Skills Learned From This Lesson:​ Asset, Vulnerability, Threat, Probability, Impact, Threat agent,
Exploit, Risk, Skill
●
●
Asset​ - Something of either tangible or intangible value that is worth protecting, including
people, information, infrastructure, finances and reputation.
Vulnerability - A weakness in the design, implementation, operation or internal control of
a process that could expose the system to adverse threats from threat events.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6
ENROLL THIS COURSE
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Threat - Anything (e.g., object, substance, human) that is capable of acting against an
asset in a manner that can result in harm.A potential cause of an unwanted incident
(ISO/IEC 13335)
Probability - The likelihood to the risk will occur.
Impact - Magnitude of loss resulting from a threat agent exploiting a vulnerability. The
damage caused it the risk will occur.
Threat agent - Methods and things used to exploit a vulnerability. Examples include
determination, capability, motive and resources (What carries out to attack).
Exploit- Full use of a vulnerability for the benefit of an attacker. An instance of
compromise.
Risk definition by ISACA - The combination of the probability of an event and its impact
(consequence). Risk are unknown entities - until they are realized (and then becomes an
incident)
Additional Risk Definitions
Inherent risk - The risk level or exposure without taking into account the actions that
management has taken or might take (e.g., implementing controls).
Residual risk - The remaining risk after management has implemented a risk response.
Secondary Risk - One risk response may cause a second risk event (e.g. system cannot
boot after security patch applied)
Risk Appetite - Risk appetite is the level of risk that an organization is prepared to accept
in pursuit of its objectives, before action is deemed necessary to reduce the risk. It
represents a balance between the potential benefits of innovation and the threats that
change inevitably brings. Amount and type of risk that an organization is prepared to
pursue, retain or take (ISO 31000)
Risk Tolerance - levels of risk, types of risk, and degree of risk uncertainty that are
acceptable.
Risk profile - A risk profile identifies the acceptable level of risk an organization is
prepared and able to accept.
Risk Threshold - measure of the level of uncertainty or the level of impact at which a
stakeholder may have a specific interest. Below that risk threshold, the organization will
accept the risk. Above that risk threshold, the organization will not tolerate the risk.
Risk Capacity - refers to the maximum amount of risk that an organization is able to
tolerate.
Risk Utility - The positive outcome desired from taking risk.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
7
ENROLL THIS COURSE
●
Types of Risk
○ Systemic Risk - Systemic risk is the possibility that an event at the company level
could trigger severe instability or collapse an entire industry or economy.
Systemic risk was a major contributor to the financial crisis of 2008. Companies
considered to be a systemic risk are called "too big to fail."
○ Contagious Risk - Event that happen to several business partner in a short time
frame (e.g. DYN DoS - led to loss of availability to Clodud providers such as
Amazon, Yahoo, Twitter etc )
○ Obscure Risk - Unknown of unknowns, risk that is still unknown, or difficult for
identification.
Lesson 2.4: IT Risk Management
Skills Learned From This Lesson: IT Risk, Business Risk, Controls
●
●
●
●
●
●
●
Business risk and IT risk should be aligned, they should not be (and they aren't) different
entities.
IT risk is a subset of business risk.
Information security is all about risk management.
Different type of risk, require different set of controls
IT risk attempt to reduce IT risk to an acceptable level, focused on “known unknowns”,
however Business Continuity Plan is focused on “unknown unknowns” (black swan), with
moderate to high impact.
Context of IT Risk Management depends on Context of entire organization, or
environment. Different organizations require different approaches to IT Risk
Management.
Exam tip: Always start with knowing the context of organization.
Lesson 2.5: IT Security Basics
Skills Learned From This Lesson: Information Security, Confidentiality, Integrity, Availability, CIA
Triad, Identity and Access Management (IAM), Non-Repudiation
●
Confidentiality - Preserving authorized restrictions on access and disclosure, including
means for protecting privacy and proprietary information.
○ Threats against confidentiality :
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
8
ENROLL THIS COURSE
●
●
●
●
■ Social engineering
■ Media reuse
■ Eavesdropping
Integrity​ - is the concept of protecting the reliability and correctness of data. Integrity
protection prevents unauthorized alteration of data. Guarding against improper
information modification or destruction, and includes ensuring information
non-repudiation and authenticity.
○ System integrity - refer to integrity of the system (include not limited to operating
system, Software, hardware / firmware etc) - free from unauthorized
manipulation.
○ Data integrity - refer to integrity of the data (no alteration in the data) intentionally or not, including but not limited to corruption of data or malicious
modification.
Availability​ - means authorized subjects are granted timey and uninterrupted access to
objects. Availability protection controls support sufficient bandwidth and timeliness of
processing as deemed necessary by the organization or situation.
○ To provide timely and reliable access to resources enable:
■ Redundancy
■ Prevent Single point of Failure
■ Comprehensive fault tolerance (Data, Hard Drives, Solid State Drives,
Network links, Servers, Power etc.)
Identity and Access Management (IAM) - Encapsulates people, processes and products
to identify and manage the data used in an information system to authenticate users and
grant or deny access rights to data and system resources. The goal of IAM is to provide
appropriate access to enterprise resources.
○ Main functions are:
■ Account provisioning / deprovisioning
■ Identification
■ Authentification
■ Authorisation
■ Auditing
Non-Repudiation -is the assurance that someone cannot deny the validity of something.
○ Provide proof of the integrity and origin data or message.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
9
ENROLL THIS COURSE
○
○
○
●
Must include authentication that can be asserted to be genuine with high
assurance.
A sender cannot dispute having sent a message, nor the contents of that
message.
Digital signatures (combined with other measures) can offer non-repudiation.
Classification of data is another way to protect our information. In order to protect data
those should be considered :
■ Cost - Value of the data or asset.
■ Classify - The owner of the data/asset provide classification based on
predefined standards.
■ Control - depends on the level of the classification, security controls
should be implemented equally for the data or asset within the same
classification.
○ Business classification (by ISO 27001) :
■ Public (everyone has access)
■ Internal (all employees have access)
■ Restricted (most employees have access)
■ Confidential (only senior management have access)
○ The U.S. government uses three levels of classification to designate how
sensitive certain information is:
■ Confidential
■ Secret
■ Top Secret
Lesson 2.6: Risk Management for IT Projects
Skills Learned From This Lesson: IT Projects, PMI, PMBOK, Risk register
●
●
Project management is usually focused to deliver “on time, on budget”. Risk
management in project management is essential to keep the project under control.
The PMBOK’s Project Risk Management knowledge area contains 7 processes:
○ Plan Risk Management
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
10
ENROLL THIS COURSE
■
○
○
○
This initial step involves the production of a risk management plan, a
component of the overall project management plan. It includes things like
itemizing the risk categories (market, procurement, resources, etc.),
determining the timing and procedures for reassessing risks, and
definitions of risk probability and impact.
■ The only output is a Risk Management Plan.
Identify Risks
■ This is where the value is created. A good list of potential risks to a
project’s cost, schedule, or any other critical success factor is the key to
great risk management.
■ Inputs
■ Project management plan
■ Project documents
■ Agreements
■ Procurement documentation
■ Enterprise environmental factors
■ Organizational process assets
■ Outputs
■ Risk register
■ Risk report
■ Project documents updates
Perform Qualitative Risk Analysis
■ Each risk on the risk register is analyzed and a ranking assigned to the
two underlying variables probability of occurrence, and impact. Overall
risk priority ranking is found (by multiplication of the two rankings).
■ Inputs
■ Project management plan
■ Project documents
■ Enterprise environmental factors
■ Organizational process assets
■ Output
■ Project documents updates
Perform Quantitative Risk Analysis
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
11
ENROLL THIS COURSE
■
○
○
○
Using the risk priorities established during the previous Qualitative Risk
Analysis step, the impact on the project’s schedule and budget are
determined.
■ Inputs
■ Project management plan
■ Project documents
■ Enterprise environmental factors
■ Organizational process assets
■ Output
■ Project documents updates
Plan Risk Responses
■ In this process you take the most important risks to the project and create
an action plan, not just for responding to the risk if it happens, but for
monitoring the risk triggers so you have the earliest possible warning.
■ Inputs
■ Project management plan
■ Project documents
■ Enterprise environmental factors
■ Organizational process assets
■ Outputs
■ Change requests
■ Project management plan updates
■ Project documents updates
Implement Risk Responses
■ When a risk event is triggered, the response plan springs into action.
■ Inputs
■ Project management plan
■ Project documents
■ Organizational process assets
■ Outputs
■ Change requests
■ Project documents updates
■
Monitor Risks
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
12
ENROLL THIS COURSE
○
●
Throughout the project, the risk register is monitored to ensure the analysis
remains current. Risk priorities can change as many things can happen
throughout a project that change the risk profile (probability, impact) of each risk.
■ Inputs
■ Project management plan
■ Project documents
■ Work performance data
■ Work performance reports
■ Outputs
■ Work performance information
■ Change requests
■ Project management plan updates
■ Project documents updates
■ Organizational process assets updates
Every process listed above had their inputs as well as outputs. Inputs can be interview,
plan, documents, output from other process etc. One of the biggest and most important
documents is Risk register. Central repository for information about risk, used to
communicate with stakeholders.
Lesson 2.7: ISACA’s Framework and Lifecycle
Skills Learned From This Lesson: ISACA, Risk, Framework, IT Governance
●
●
Purpose of the ISACA Risk IT Framework - Management of business risk is an essential
component of the responsible administration of any enterprise. Almost every business
decision requires the executive or manager to balance risk and reward.
Benefits and outcome:
○ Accurate view on current and near-future IT-related events.
○ End-to-end guidance on how to manage IT-related risks.
○ Understanding of how to capitalise on the investment made in an IT internal
control system already in place Integration with the overall risk and compliance
structures within the enterprise.
○ Common language to help manage the relationships Promotion of risk ownership
throughout the organisation
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
13
ENROLL THIS COURSE
●
●
The Risk IT framework consists of:
○ Risk Governance (RG)​ Ensure that IT risk management practices are
embedded in the enterprise, enabling the enterprise to secure optimal
risk-adjusted return.
■ RG1 Establish and maintain a common risk view
■ RG2 Integrate with ERM
■ RG3 Make risk-aware business decisions
○ Risk Evaluation (RE) ​Ensure that IT-related risks and opportunities are
identified, analysed and presented in business terms.
■ RE1 Collect data
■ RE2 Analyse risk
■ RE3 Maintain risk profile
○ Risk Response (RR)​ Ensure that IT-related risk issues, opportunities and events
are addressed in a cost-effective manner and in line with business priorities.
■ RR1 Articulate risk
■ RR2 Manage risk
■ RR3 React to events
ISACA’s Risk Management Life Cycle
○ Cyclical process
○ Process based on the complete cycle of all elements
○ Continuous process with refinement, adaptation and improvement
Lesson 2.8: Review Questions
Skills Learned From This Lesson: RISK, Exam, Question
●
●
Module 3: ​Risk Identification
Lesson 3.1: Risk Identification Intro
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
14
ENROLL THIS COURSE
Skills Learned From This Lesson: ISO, ISO/IEC 27005, Frameworks, NIST, SP 800-39, SP
800-30, SP 800-37, Culture, Risk Register, Domain 1.
●
●
●
●
Domain 1 - Risk Identification Agenda
International Organization for Standardization (ISO) They develop and publish
international standards. ISO creates documents that provide requirements,
specifications, guidelines or characteristics that can be used consistently to ensure that
materials, products, processes and services are fit for their purpose.
○ ISO 27005 is the international standard that describes how to conduct an
information security risk assessment in accordance with the requirements of ISO
27001.
○ Risk assessments are one of the most important parts of an organisation’s ISO
27001 compliance project. ISO 27001 requires you to demonstrate evidence of
information security risk management, risk actions taken and how relevant
controls from Annex A have been applied.
ISO 27005 is applicable to all organisations, regardless of size or sector. It supports the
general concepts specified in ISO 27001, and is designed to assist the satisfactory
implementation of information security based on a risk management approach.
Content of the standard ISO/IEC 27005:2018 (latest version published in 2018)
○ The standard doesn't specify, recommend or even name any specific risk
management method. It does however imply a continual process consisting of a
structured sequence of activities, some of which are iterative:
○ Establish the risk management context (e.g. the scope, compliance obligations,
approaches/methods to be used and relevant policies and criteria such as the
organization’s risk tolerance or appetite);
○ Quantitatively or qualitatively assess (i.e. identify, analyze and evaluate) relevant
information risks, taking into account the information assets, threats, existing
controls and vulnerabilities to determine the likelihood of incidents or incident
scenarios, and the predicted business consequences if they were to occur, to
determine a ‘level of risk’;
○ Treat (i.e. modify [use information security controls], retain [accept], avoid and/or
share [with third parties]) the risks appropriately, using those ‘levels of risk’ to
prioritize them;
○ Keep stakeholders informed throughout the process; and
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
15
ENROLL THIS COURSE
○
●
●
●
●
●
Monitor and review risks, risk treatments, obligations and criteria on an ongoing
basis, identifying and responding appropriately to significant changes.
ISACA Risk IT Framework (Covered in Lesson 2.7: ISACA’s Framework and Lifecycle)
The National Institute of Standards and Technology (NIST) is a physical science
laboratory, and a non-regulatory agency of the United States Department of Commerce.
Its mission is to promote innovation and industrial competitiveness. NIST's activities are
organized into laboratory programs that include nanoscale science and technology,
engineering, information technology, neutron research, material measurement, and
physical measurement.
○ NIST’s cybersecurity programs seek to enable greater development and
application of practical, innovative security technologies and methodologies that
enhance the country’s ability to address current and future computer and
information security challenges.
The purpose of ​Special Publication​ ​800-39​ is to provide guidance for an integrated,
organization-wide program for managing information security risk to organizational
operations (i.e., mission, functions, image, and reputation), organizational assets,
individuals, other organizations, and the Nation resulting from the operation and use of
federal information systems. Special Publication 800-39 provides a structured, yet
flexible approach for managing information security risk that is intentionally broad-based,
with the specific details of assessing, responding to, and monitoring risk on an ongoing
basis provided by other supporting NIST security standards and guidelines. The
guidance provided in this publication is not intended to replace or subsume other
risk-related activities, programs, processes, or approaches that organizations have
implemented. Rather, the information security risk management guidance described
herein is complementary to and can be used as part of a more comprehensive
Enterprise Risk Management (ERM) program.
The purpose of ​Special Publication 800-30​ rev 1 is to provide guidance for conducting
risk assessments of federal information systems and organizations, amplifying the
guidance in Special Publication 800-39. Risk assessments, carried out at all three tiers in
the risk management hierarchy, are part of an overall risk management
process—providing senior leaders/executives with the information needed to determine
appropriate courses of action in response to identified risks.
Special Publication 800-37 rev 1 and 2​ describes the Risk Management Framework
(RMF) and provides guidelines for applying the RMF to information systems and
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
16
ENROLL THIS COURSE
●
organizations. The RMF provides a disciplined, structured, and flexible process for
managing security and privacy risk that includes information security categorization;
control selection, implementation, and assessment; system and common control
authorizations; and continuous monitoring.
Risk Culture - remember “fish stinks from the head”.
Lesson 3.2: ISO 270005 Framework
Skills Learned From This Lesson: Risk Identification, Risk Estimation, Risk Evaluation, Risk
Response.
●
●
●
●
Unlike ISO 31000:2018 Risk Management Guidelines, which were written to be easily
understood by top executives and board directors, the ISO 27005:2018 is longer, denser
and more technically targeted to chief information security officers (CISOs), chief risk
officers and auditors. It emphasizes the importance of a systematic approach to
developing and maintaining an information security risk management (ISRM) process —
and reminds stakeholders that risk management must be continual and subject to
regular review to ensure continued effectiveness.
Although ISO 27005 does not specify any specific risk management methodology, it
does imply a continual information risk management process based on six key
components:
1. ​Context establishment:​ The risk management context sets the criteria for how risks
are identified, who is responsible for risk ownership, how risks impact the confidentiality,
integrity and availability of the information, and how risk impact and likelihood are
calculated.
2. ​Risk assessment:​ Many organisations choose to follow an asset-based risk
assessment process comprising five key stages:
I. Compiling information assets.
II. Identifying the threats and vulnerabilities applicable to each asset.
III. Assigning impact and likelihood values based on risk criteria.
IV. Evaluating each risk against predetermined levels of acceptability.
V. Prioritising which risks need to be addressed, and in which order.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
17
ENROLL THIS COURSE
●
3. ​Risk treatment:​ There are four ways to treat a risk:
I. ‘Avoid’ the risk by eliminating it entirely.
II. ‘Modify’ the risk by applying security controls.
III. ‘Share’ the risk with a third party (through insurance or outsourcing).
IV. ‘Retain’ the risk (if the risk falls within established risk acceptance criteria).
●
●
●
●
●
4. ​Risk acceptance:​ Organisations should determine their own criteria for risk
acceptance that consider existing policies, goals, objectives and shareholder interests.
5. ​Risk communication and consultation:​ Effective communication is pivotal to the
information security risk management process. It ensures that those responsible for
implementing risk management understand the basis on which decisions are made, and
why certain actions are required. Sharing and exchanging information about risk also
facilitates agreement between decision makers and other stakeholders on how to
manage risk.
○ Risk communication activity should be performed continually, and organisations
should develop risk communication plans for normal operations as well as
emergency situations.
6. ​Risk monitoring and review:​ Risks are not static and can change abruptly.
Therefore, they should be continually monitored in order to quickly identify changes and
maintain a complete overview of the risk picture.
While the ISO 27005:2018 outlines both the “what” and the “how” of a risk management
process, it avoids doing so narrowly or prescriptively. Although it defines a systematic
and cyclical process where inputs, actions and outputs are well-defined at each step, the
ISO 27005:2018 leaves a lot of room for the organization to customize its own
procedures to produce value regardless of its size, sector, regulatory environment or
geographic location.
By developing a structured ISRM process and carefully and continually reviewing it with
stakeholders, any organization can ensure that its risk appetite is aligned to its culture,
business objectives and strategies, especially in the face of changing market conditions
and regulations.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
18
ENROLL THIS COURSE
Lesson 3.3: NIST 800-39 Risk Framing
Skills Learned From This Lesson: risk management, security, risk assessment, roles,
responsibilities, organization, mission, information system
●
●
●
●
●
The purpose of Special Publication 800-39 is to provide guidance for an integrated,
organization-wide program for managing information security risk to organizational
operations (i.e., mission, functions, image, and reputation), organizational assets,
individuals, other organizations, and the Nation resulting from the operation and use of
federal information systems. Special Publication 800-39 provides a structured, yet
flexible approach for managing risk that is intentionally broad-based, with the specific
details of assessing, responding to, and monitoring risk on an ongoing basis provided by
other supporting NIST security standards and guidelines.
Managing risk is a complex, multifaceted activity that requires the involvement of the
entire organization—from senior leaders/executives providing the strategic vision and
top-level goals and objectives for the organization; to mid-level leaders planning,
executing, and managing projects; to individuals on the front lines operating the
information systems supporting the organization’s missions/business functions.
Risk management is a comprehensive process that requires organizations to:
○ frame risk (i.e., ​establish the context​ for risk-based decisions);
○ assess risk;
○ respond to risk once determined; and
○ monitor risk on an ongoing basis using effective organizational communications
and a feedback loop for continuous improvement in the risk-related activities of
organizations.
The first component of risk management addresses how organizations frame risk or
establish a risk context—that is, describing the environment in which risk-based
decisions are made. The purpose of the risk framing component is to produce a risk
management strategy that addresses how organizations intend to assess risk, respond
to risk, and monitor risk—making explicit and transparent the risk perceptions that
organizations routinely use in making both investment and operational decisions. The
risk frame establishes a foundation for managing risk and delineates the boundaries for
risk-based decisions within organizations.
Establishing a realistic and credible risk frame requires that organizations identify:
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
19
ENROLL THIS COURSE
○
○
○
○
Risk assumptions (e.g., assumptions about the threats, vulnerabilities,
consequences/impact, and likelihood of occurrence that affect how risk is
assessed, responded to, and monitored over time);
Risk constraints (e.g., constraints on the risk assessment, response, and
monitoring alternatives under consideration);
Risk tolerance (e.g., levels of risk, types of risk, and degree of risk uncertainty
that are acceptable); and
Priorities and trade-offs
●
Lesson 3.4: NIST 800-39 Risk Assessment
Skills Learned From This Lesson: Assessment, Framework, Monitor, Response
●
●
●
The second component of risk management addresses how organizations assess risk
within the context of the organizational risk frame. The purpose of the risk assessment
component is to identify:
○ Threats to organizations (i.e., operations, assets, or individuals) or threats
directed through organizations against other organizations or the Nation;
○ Vulnerabilities internal and external to organizations;
○ The harm (i.e., consequences/impact) to organizations that may occur given the
potential for threats exploiting vulnerabilities; and
○ The likelihood that harm will occur.
The end result is a determination of risk (i.e., the degree of harm and likelihood of harm
occurring).
Additional framework described in special publication 800-30 rev 1, cover risk
assessment.
●
Lesson 3.5: NIST 800-39 Risk Response
Skills Learned From This Lesson: Skill, Skill, Skill
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
20
ENROLL THIS COURSE
●
●
●
The third component of risk management addresses how organizations respond to risk
once that risk is determined based on the results of risk assessments.
The purpose of the risk response component is to provide a consistent,
organization-wide, response to risk in accordance with the organizational risk frame by:
○ Developing alternative courses of action for responding to risk;
○ Evaluating the alternative courses of action;
○ Determining appropriate courses of action consistent with organizational risk
tolerance; and
○ Implementing risk responses based on selected courses of action.
To support the risk response component, organizations describe the types of risk
responses that can be implemented (i.e., accepting, avoiding, mitigating, sharing, or
transferring risk).
Lesson 3.6: NIST 800-39 Risk Monitoring
Skills Learned From This Lesson: Monitoring, Legislation, Effectiveness, Major change, KRI,
KPI
●
●
●
The fourth component of risk management addresses how organizations monitor risk
over time.
The purpose of the risk monitoring component is to:
○ Verify that planned risk response measures are implemented and information
security requirements derived from/traceable to organizational missions/business
functions, federal legislation, directives, regulations, policies, and standards, and
guidelines, are satisfied;
○ Determine the ongoing effectiveness of risk response measures following
implementation; and
○ Identify risk-impacting changes to organizational information systems and the
environments in which the systems operate.
To support the risk monitoring component, organizations describe how compliance is
verified and how the ongoing effectiveness of risk responses is determined (e.g., the
types of tools, techniques, and methodologies used to determine the
sufficiency/correctness of risk responses and if risk mitigation measures are
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
21
ENROLL THIS COURSE
●
●
●
●
implemented correctly, operating as intended, and producing the desired effect with
regard to reducing risk). In addition, organizations describe how changes that may
impact the ongoing effectiveness of risk responses are monitored.
KRI - Key Risk Indicators (KRIs), as the name suggests, measure risk. KRIs are used by
organisations to determine how much risk they are exposed to or how risky a particular
venture or activity is.
KPI- Key Performance Indicators (KPIs) are the gauges and measurements an
organisation uses to understand how well individuals, business units, projects and
companies are performing against their strategic goals.
While KPIs help organisations understand how well they are doing in relation to their
strategic plans, KRIs help them understand the risks involved and the likelihood of not
delivering good outcomes in the future. This means KRIs can be the flipside or KPIs.
KPIs and KRIs are not the same. KRIs help to quantify risks, while KPIs help to measure
business performance.
Lesson 3.7: NIST 800-30 Intro !!! NOTE !!! First 35 seconds are without sound or picture !!!
Note!!!
Skills Learned From This Lesson: NIST 800-39, Revision 1, Assessment, Framework, Threats,
Vulnerabilities, Impact.
The purpose of Special Publication 800-30 is to provide guidance for conducting risk
assessments of federal information systems and organizations, amplifying the guidance in
Special Publication 800-39. Risk assessments, carried out at all three tiers in the risk
management hierarchy, are part of an overall risk management process—providing senior
leaders/executives with the information needed to determine appropriate courses of action in
response to identified risks.
●
●
The purpose of risk assessment is to inform decision makers, stakeholders and support
risk responses by identifying:
Threats to organization
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
22
ENROLL THIS COURSE
○
●
●
●
A threat is any circumstance or event with the potential to adversely impact
organizational operations and assets, individuals, other organizations, or the
Nation through an information system via unauthorized access, destruction,
disclosure, or modification of information, and/or denial of service.
Vulnerabilities
○ A vulnerability is a weakness in an information system, system security
procedures, internal controls, or implementation that could be exploited by a
threat source.
Impact
○ The level of impact from a threat event is the magnitude of harm that can be
expected to result from the consequences of unauthorized disclosure of
information, unauthorized modification of information, unauthorized destruction of
information, or loss of information or information system availability.
Risk assessments can be conducted at all three tiers in the risk management
hierarchy—including Tier 1 (organization level), Tier 2 (mission/business process level),
and Tier 3 (information system level).
Lesson 3.8: NIST 800-30 Risk Assessment Methodology
Skills Learned From This Lesson: Frame Risk, Quantitative, Qualitative, Semi-qualitative,
●
●
●
NIST 800-39 guide us through fundamental concepts associated with managing
information security risk across an organization. Comprehensive process requires
organizations to:
○ frame risk
○ assess risk
○ respond to risk once determined
○ monitor risk
NIST 800-30 provide guidance on Assessment Risk and methodology used for it.
A risk assessment methodology typically includes:
○ A risk assessment process
○ An explicit risk model
○ An assessment approach specifying the range of values those risk factors can
assume during the risk assessment and how combinations of risk factors are
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
23
ENROLL THIS COURSE
○
identified/analyzed so that values of those factors can be functionally combined
to evaluate risk. Assessment types are:
■ Quantitative
■ Quantitative assessments typically employ a set of methods,
principles, or rules for assessing risk based on the use of
numbers—where the meanings and proportionality of values are
maintained inside and outside the context of the assessment.
■ Qualitative
■ Qualitative assessments typically employ a set of methods,
principles, or rules for assessing risk based on nonnumerical
categories or levels (e.g., very low, low, moderate, high, very
high). This type of assessment supports communicating risk
results to decision makers.
■ Semi-qualitative,
■ semi-quantitative assessments typically employ a set of methods,
principles, or rules for assessing risk that uses bins, scales, or
representative numbers whose values and meanings are not
maintained in other contexts. This type of assessment can provide
the benefits of quantitative and qualitative assessments.
An analysis approach
■ Threat-oriented
■ A threat-oriented approach starts with the identification of threat
sources and threat events, and focuses on the development of
threat scenarios.
■ asset/impact-oriented
■ An asset/impact-oriented approach starts with the identification of
impacts or consequences of concern and critical assets, possibly
using the results of a mission or business impact analyses and
identifying threat events that could lead to and/or threat sources
that could seek those impacts or consequences.
■ vulnerability-oriented, describing how combinations of risk factors are
identified/analyzed to ensure adequate coverage of the problem space at
a consistent level of detail.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
24
ENROLL THIS COURSE
●
Risk assessment component of risk management—provide a step-by-step process for
organizations on:
○ How to prepare for risk assessments
○ How to conduct risk assessments
○ How to communicate risk assessment results to key organizational personnel
○ How to maintain the risk assessments over time.
Lesson 3.9: NIST 800-37 Revision 1 and Revision 2
Skills Learned From This Lesson: NIST 800-37, Risk Management Framework (RMF), revision
1, Federal Information Systems,
●
●
●
●
This publication describes the Risk Management Framework (RMF) and provides
guidelines for applying the RMF to information systems and organizations.
The RMF provides a disciplined, structured, and flexible process for managing security
and privacy risk that includes information security categorization; control selection,
implementation, and assessment; system and common control authorizations; and
continuous monitoring.
First question when you start with Risk Management should be “What I should be
protecting ?” and tools can help us in this process is FIPS 199. Determine what kind of
assets, what kind of information is on those systems - help us to select the appropriate
controls to protect the assets.
○ Identify the security controls that are provided by the organization as common
controls for organizational information systems and document the controls in a
security plan (or equivalent document).
○ Tool for selecting controls should be always FIPS 200, depend on categorisation
of the assets we can use control, from FIPS 200.
○ Security controls for the information system should be documented in the security
plan.
Implementation of the security controls specified in the security plan is our next step.
Security control implementation is consistent with the organization’s enterprise
architecture and information security architecture.
Assess security controls - Develop, review, and approve a plan to assess the security controls.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
25
ENROLL THIS COURSE
●
The security assessment plan provides the objectives for the security control
assessment, a detailed roadmap of how to conduct such an assessment, and
assessment procedures. The assessment plan reflects the type of assessment the
organization is conducting.
Assess the security controls in accordance with the assessment procedures defined in the
security assessment plan.
●
Security control assessments determine the extent to which the controls are
implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the information system.
Authorisation step require preparation plan of action and milestones based on the findings and
recommendations of the security assessment report excluding any remediation actions taken.
●
●
●
●
The plan of action and milestones, prepared for the authorizing official by the information
system owner or common control provider, is one of three key documents in the security
authorization package and describes the specific tasks that are planned:
○ To correct any weaknesses or deficiencies in the security controls noted during
the assessment;
○ To address the residual vulnerabilities in the information system.
The security authorization package contains:
○ The security plan;
○ The security assessment report
○ The plan of action and milestones.
The information in these key documents is used by authorizing officials to make
risk-based authorization decisions.
Last step in Security life cycle is monitoring. Information systems are in a constant state
of change with upgrades to hardware, software, or firmware and modifications to the
surrounding environments where the systems reside and operate. A disciplined and
structured approach to managing, controlling, and documenting changes to an
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
26
ENROLL THIS COURSE
information system or its environment of operation is an essential element of an effective
security control monitoring program.
NIST 800-37 Revision 2 (December 2018) - Risk Management Framework for Information
Systems and Organizations - A System Life Cycle Approach for Security and Privacy
There are seven steps in the RMF; a preparatory step to ensure that organizations are ready to
execute the process and six main steps. All seven steps are essential for the successful
execution of the RMF. The steps are:
●
●
●
●
●
●
●
Prepare to execute the RMF from an organization- and a system-level perspective by
establishing a context and priorities for managing security and privacy risk.
Categorize the system and the information processed, stored, and transmitted by the
system based on an analysis of the impact of loss.
Select an initial set of controls for the system and tailor the controls as needed to reduce
risk to an acceptable level based on an assessment of risk.
Implement the controls and describe how the controls are employed within the system
and its environment of operation.
Assess the controls to determine if the controls are implemented correctly, operating as
intended, and producing the desired outcomes with respect to satisfying the security and
privacy requirements.
Authorize the system or common controls based on a determination that the risk to
organizational operations and assets, individuals, other organizations, and the Nation is
acceptable.
Monitor the system and the associated controls on an ongoing basis to include
assessing control effectiveness, documenting changes to the system and environment of
operation, conducting risk assessments and impact analyses, and reporting the security
and privacy posture of the system.
Lesson 3.10: Alignment with the Business
Skills Learned From This Lesson: Buy-in, RACI, Goals, Objectives
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
27
ENROLL THIS COURSE
●
●
●
●
●
●
●
●
●
●
The purpose of Information security is to support the business, to bring value for the
business.
IT Risk measured by impact of the risk on business operations.
Buy-in of senior management :
○ Risk management
○ Provide budget, authority and access needed
○ Support from senior management should be visible and active
Alignment with Business Goals and Objectives (it’s no matter fact are you going just for
certification or to work in an organization-you should understand context of organization)
Communicate with senior management about:
○ Vision and strategy
○ Lines of business, new technology, future growth, changes in priorities
Ensure risk is aligned with and integrated into strategy, vision and direction.
The Risk practitioner should seek to :
○ Understand the business
○ Listen to the strategy
○ Proactively seek out ways to secure new technologies and business process
○ Build relationships and communication infrastructure to weave risk management
into each business process and new projects
○ Be aware of and mitigate the risk of change
○ Work to create a culture that encourages participation of risk management into
business process
○ Understand past events
○
In order to effectively support the organization is to have a set of clearly defined set of
roles and responsibility.
A RACI chart is a simple matrix used to assign roles and responsibilities for each task,
milestone, or decision on a project.
RACI stands for Responsible, Accountable, Consulted, Informed. Each letter in the
acronym represents a level of task responsibility.
○ Responsible: This team member does the work to complete the task.
○ Accountable: This person delegates work and is the last one to review the task or
deliverable before it’s deemed complete.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
28
ENROLL THIS COURSE
○
○
Consulted: Every deliverable is strengthened by review and consultation from
more than one team member. Consulted parties are typically the people who
provide input based on either how it will impact their future project work or their
domain of expertise on the deliverable itself.
Informed: These team members simply need to be kept in the loop on project
progress, rather than roped into the details of every deliverable.
Three Lines of Defense - 3LoD
In order to design an efficient risk management system, the processes used to control the
company risks should be interconnected in a holistic system.
●
Notes
1. The first layer of defense- Management Control / Ownership:
The first layer of defense is implemented by the unit, component or business function that
performs daily operation activities, especially those that are the front lines of the organization. In
this case they are expected to:
●
●
●
●
Note
Ensure the conductive control environment in their business unit.
Implement risk management policies on their roles and responsibilities, especially in
activities that lead to corporate growth. They are expected to be fully aware of the risk
factors that should be considered in every decision and action.
Be able to execute effective internal control in their business units, as well as the
monitoring process and maintaining transparency in the internal control itself.
2. Second-tier defense - Risk Management
The second layer of defense is executed by risk management and compliance functions,
especially in structured risk management and compliance units e.g. department or risk
management and compliance units. In this case, they are expected to:
●
●
Note
Be responsible for risk management development, monitoring process and the
implementation of the company’s overall risk management.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
29
ENROLL THIS COURSE
●
●
Monitor and ensure that all business functions being implemented in accordance with
risk management policies and standard operating procedures that have been
established by the company.
Monitor and report to the department with the highest accountability on complete
company’s exposure to risks.
3. Third-tier defense Assurance / Internal Audit
The third layer of defense is implemented by both auditors and internal auditors the external
auditor. Role of the internal auditor is much more intense in this 3LD models because they are
part of the company that is independent by design. In this case, the internal auditors are
expected to:
●
●
●
Note
Review and evaluation of the design and implementation of risk management holistically.
Ensure the effectiveness of the first layer of defense and the second-tier.
Lesson 3.11: Risk Culture
Skills Learned From This Lesson: Risk Culture, Risk Communication, Skill, Skill, Skill
●
Risk culture is a system of values and behaviors present in an organization that shape
risk decisions of management and employees. One element of risk culture is a common
understanding of an organization and its business purpose. Employees must also
understand that risk and compliance rules apply to everyone as they work towards
business goals.
●
Risk Communication - Risk communication is the interactive exchange of information
about risks among risk assessors, managers, news media, interested groups, and the
general public.
The main purpose of communicating risks is to inform people about the potential hazards
related to a particular condition or activity. These hazards may be directly linked to a
●
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
30
ENROLL THIS COURSE
●
●
person, community or property. It involves a two-way exchange of information between
the parties likely to be affected
Communicating risks enables managers and the team members to determine the
probability of a risk materializing and its possible impacts. It allows analysts to
understand the difference between risks and hazards found in a particular area.
Sarah Tennyson: “Enterprise-wide risk management requires a shift in the behaviour and
mindset of employees across an organization. To realize the full benefits of improved
systems, tools, and analytical skills, people need to learn new ways of perceiving
situations, interpreting data, making decisions, influencing, and negotiating”
Lesson 3.12: Roles and Responsibilities
Skills Learned From This Lesson: Risk Prioritization, Risk Practitioner, Risk Roles,
Responsibility, Chief Risk Officer (CRO)
●
●
Risk Prioritization - A Risk Analysis may identify a number of risks that appear to be of
similar ranking or severity. When too many risks are clustered at or about the same
level, a method is needed to prioritize risk responses and where to apply limited
resources. In order to prioritize risk following parameters should be considered:
○ Cost of the response to reduce risk with tolerance levels
○ Capability to implement response ( usually refer to limited resources )
○ Effectiveness and efficiency of the response
Risk Roles and Responsibility - Recognizing that organizations have varying missions,
business functions, and organizational structures, there may be differences in naming
conventions for risk management roles and how risk management responsibilities are
allocated among organizational personnel. However, the basic functions remain the
same:
○ CIO - is a job title commonly given to the most senior executive in an enterprise
who works with information technology and computer systems, in order to
support enterprise goals. Primary focus is ​value delivery​.
○ Business management - The individuals with the business with roles related to
managing a program. Typically ​accountable​ for analyzing risks, maintaining risk
profile and risk-aware decisions.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
31
ENROLL THIS COURSE
Chief Risk Officer (CRO) - is the executive-level manager ​responsible​ for
maintaining risk, analyzing risk, maintaining risk profile and risk aware decisions.
○ CRO responsibilities include:
■ Managing the risk assessment process
■ Implementation of corrective actions
■ Communicate risk management issues
■ Supporting the risk management functions
Risk Practitioner - responsibility:
○ Develop, maintain, manage and execute a comprehensive process for
identifying, assessing, mitigating, monitoring and reporting on risk that may
impact on organizational performance.
○ Define Key Risk Identificator (KRI)
○ Report trends on risk profile to management to aid in decision making
○ Identify Key Performance Indicator (KPI)
○ Analyze performance indicator to determine the effectiveness of the control
environment
○ Report performance on control environment to management to aid in decision
making
○
●
Lesson 3.13: The Risk Register
Skills Learned From This Lesson: Risk register, Risk Awareness ProgramSkill
●
●
●
A risk register is a listing of all risk identified for the enterprise.
The risk register records:
○ All known risk
○ Priorities of risk
○ Likelihood of risk
○ Potential risk impact
○ Status of the risk mitigation plans
○ Contingency plans
○ Ownership of risk
The purpose of a risk register is to consolidate risk data into one place and permit the
tracking of risk.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
32
ENROLL THIS COURSE
○
●
●
●
The risk register allows management to refer to a single document to do the
following:
■ Gain insight into the outstanding risk issues.
■ Learn about the status of risk mitigation efforts.
■ Become aware of the emergence of newly identified and documented risk
○ The risk register contains all risk detected by various departments or activities of
the organization, including the following:
■ Risk identified in audits
■ Vulnerability assessments
■ Penetration tests
■ Incident reports
■ Process reviews
■ Management input
■ Risk scenario creation
■ Security assessments
Risk awareness is about acknowledging that risk is an integral part of the business. This
does not imply that all risks are to be avoided or eliminated, but rather that they are well
understood and known, IT risk issues are identifiable, and the enterprise recognises and
uses the means to manage them.
The Risk Awareness Program:
○ Creates understanding of risk, risk factors and types of risk
○ Should be tailored to the needs of the groups within an organization
○ Should not disclose vulnerabilities or ongoing investigations
Can server to mitigate risk through education on policy and procedure
Lesson 3.14: Risk Scenarios
Skills Learned From This Lesson: Skill, Skill, Skill
●
●
A risk scenario is a description of a possible event whose occurrence will have an
uncertain impact on the achievement of the enterprise’s objectives.
Risk scenario development provides a way of conceptualizing risk useful in the process
of risk identification.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
33
ENROLL THIS COURSE
●
●
●
Risk scenarios are also used to document risk in relation to business objectives or
operations impacted by events, making them useful as the basis for quantitative risk
assessment.
Risk scenario is a technique used to make risk more concrete and tangible and allow for
proper :
○ Bring realism
○ Provide insight
○ Awareness
○ Facilitate organizational engagement
○ Provide a tool to facilitate communication
○ Enhance risk management effort
○ Provide realistic view of risk
Risk scenario is characterized by:
○ Threat actor that can be:
■ Internal to the organization (employee, contractor)
■ External to the organization (competitor, business partner, regulator, act
of god)
○ Threat type:
■ Malicious,
■ Accidental,
■ Failure,
■ Natural,
○ Event
■ Disclosure,
■ Modification
■ Theft
■ Destruction
■ Bad design
■ Ineffective execution
■ Inappropriate use
○ Asset or Resource
■ People and organization
■ Process
■ Infrastructure or facilities
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
34
ENROLL THIS COURSE
●
●
●
■ IT infrastructure
■ Information
■ Application
○ Time
■ Duration
■ Timing of occurrence (critical or not)
■ Timing to detect
■ Timing to react
Risk Scenario - Event
○ Events - can be categorised along the vector which they affect:
■ Loss Events
■ Events generating the negative impact.
■ Vulnerability Events
■ Events contributing to the magnitude or frequency of loss events
occuring.
■ Threat Events
■ Circumstances or events that can trigger loss events
Risk scenarios may be derived via two different mechanisms:
○ Top-down approach​: From the overall business objectives, an analysis of the
most relevant and probable IT risk scenarios impacting the business objectives is
performed. If the impact criteria are well aligned with the real value drivers of the
enterprise, relevant risk scenarios will be developed.
○ Bottom-up approach​: A list of generic scenarios is used to define a set of more
concrete and customized scenarios, which are then applied to the individual
enterprise situation.
Risk scenario development is based on:
○ Describing a potential risk event
○ Documenting the factors and areas that may be affected by the risk event
○ Each scenario should be related to a business objective or impact.
○ Effective scenarios must focus on real and relevant potential risk events.
Lesson 3.15: Hardware and Software Risks
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
35
ENROLL THIS COURSE
Skills Learned From This Lesson: Hardware risk, Software risk, SDLC,
●
●
●
●
Hardware risk associated with:
○ Outdated hardware
○ Poorly maintained hardware
○ Misconfiguration hardware
○ Poor architecture
○ Lack of documentation
○ Lost, misplaced or stolen hardware
○ Hardware that is not discarded in a secure manner
○ Sniffing or capturing traffic
○ Physical access
○ Hardware failure
○ Unauthorized hardware
○ Notes
Software Risk
○ Software Development Life Cycle (SDLC), also referred to as the application
development life-cycle, is a process for planning, creating, testing, and deploying
an information system.
Phases in SDLC
Software associated risks:
○ Poor or no data validation
○ Exposure of sensitive data
○ Improper modification of data
○ Logic flaws
○ Software bugs
○ Lack of logs
○ Lack of version control
○ Loss of source code
○ Weak or lack of access control
○ Lack of operability with other software
○ Back doors
○ Poor coding practices ...
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
36
ENROLL THIS COURSE
Lesson 3.16: Network Risks
Skills Learned From This Lesson: Network, Monitor, Components, Architecture Skill, Skill, Skill
●
●
●
●
Risk associated with network:
○ Network configuration and management
○ Network equipment protection
○ Layered defence
○ Redundancy
○ Bandwidth
○ Usage of encryption for transmission of sensitive data
○ Encryption key management
○ Documentation of network architecture …
Risk associated with Network Components
○ Firewall
○ Router
○ Proxy
○ DNS
○ Switch
Risk associated with Network Architecture
○ Local Area Network (LAN)
○ Wide Area Network (WAN)
○ Virtual Area Network (VPN)
○ Demilitarized zone (DMZ)
○ Extranet
○ User Interface
Risk associated with utilities
○ Environmental utilities
■ Power interruptions
■ Losses
■ Generators
■ Batteries
■ HVAC
■ Water
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
37
ENROLL THIS COURSE
●
■ Secure operational
Risk associated with Software utilities
○ Use of outdated drivers
○ Unavailability of drivers
○ Use of insecure components
○ Unpatched vulnerabilities
In the world of informational security threats come from all different directions !!
Lesson 3.17: Emerging Risks
Skills Learned From This Lesson: Emerging risks, IT assessment, Threats, Vulnerabilities
●
New Threats and Vulnerabilities
○ Risk environment constantly changes
○ Work with owners do determine responses.
○ Ensure that new threats and vulnerabilities are evaluating during IT risk
assessment.
■ Employees
■ Contractors
■ Business partners
■ CyberCriminals
■ Nation state-sponsored attackers
■ Competition sponsored attackers
■ Hacktivist
■ Other ..still unknown
Lesson 3.18: 3rd Party Risks
Skills Learned From This Lesson: Outsourcing, Service Level Agreement (SLA)
●
Third-Party Management - Third-party management is the process whereby companies
monitor and manage interactions with all external parties with which it has a relationship.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
38
ENROLL THIS COURSE
●
Third-Party comes in all colors, shapes and flavours, starting from hardware, software,
Internet Provider Services, Cloud services, etc …The importance of having a complete
list of all third parties of an enterprise cannot be overstated. Keeping that in mind an
enterprise must identify potential threats and vulnerabilities introduced through
relationships with all third parties. This has become especially important given the
continued growth of outsourcing and offshoring, along with the increased scrutiny being
placed on third parties by regulators.
Module 4: ​Risk Assessment
Lesson 4.1: Risk Assessment Intro
Skills Learned From This Lesson: Risk Assessment, Risk Identification, Risk scenario
●
●
●
Domain 2 - Risk Identification Agenda -Exam Relevance
○ IT Risk Assessment 28% - (approximately 2 questions)
Analyze and evaluate IT risk to determine the likelihood and impact on business
objectives to enable risk-based decision making.
○ 2.1 Analyze risk scenarios based on organizational criteria (e.g., organizational
structure, policies, standards, technology, architecture, controls) to determine the
likelihood and impact of an identified risk.
○ 2.2 Identify the current state of existing controls and evaluate their effectiveness
for IT risk mitigation.
○ 2.3 Review the results of risk and control analysis to assess any gaps between
current and desired states of the IT risk environment.
○ 2.4 Ensure that risk ownership is assigned at the appropriate level to establish
clear lines of accountability.
○ 2.5 Communicate the results of risk assessments to senior management and
appropriate stakeholders to enable risk-based decision making.
○ 2.6 Update the risk register with the results of the risk assessment.
Learning Objectives:
○ Identify and apply risk assessment techniques
○ Analyze risk scenarios
○ Identify current state of controls
○ Assess gaps between current and desired states of the IT risk environment
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
39
ENROLL THIS COURSE
●
●
○ Communicate IT risk assessments result to relevant stakeholders
Risk Identification
○ The process of determining and documenting the risk that an enterprise faces
○ Documentation of assets and their value
Risk Assessment
○ A process used to identify and evaluate risk and its potential effects
○ Assessing critical functions and defining controls in place
Lesson 4.2: Tools and Techniques Part 1
Skills Learned From This Lesson: Tools, Techniques, Bowtie, Decision tree, Skill, skill skill
●
●
●
●
●
●
Technique used in Risk assessment :
○ Bow tie Analysis
○ Decision Tree Analysis
○ Cause and Effect Analysis
○ Business Impact Analysis (BIA)
○ Strength Weakness Opportunity Threats (SWOT) Analysis
○ Boston Consulting Group Matrix (BCG)
BOWTIE Analysis - A 'bowtie' is a diagram that visualizes the risk you are dealing with in
just one, easy to understand the picture. Bowtie Analysis taking into account:
○ Causes
○ Control Measures (Prevention / Proactive)
○ Risk / Hazard
○ Recovery Measures (Mitigation / Reactive )
○ Consequences
Decision Tree Analysis For Expected Monetary Value (EMV) -A decision tree is a
flowchart-like structure in which each internal node represents a "test" on an attribute
(e.g. whether a coin flip comes up heads or tails), each branch represents the outcome
of the test, and each leaf node represents a class label (decision taken after computing
all attributes). The paths from root to leaf represent classification rules.
A decision tree consists of three types of nodes:
Decision nodes – typically represented by squares
Chance nodes – typically represented by circles
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
40
ENROLL THIS COURSE
●
End nodes – typically represented by triangles
Lesson 4.3: Tools and Techniques Part 2
Skills Learned From This Lesson: Cause and effect, Fishbone, Ishakawa,
●
Cause and effect (fishbone or Ishikawa)
○ Ishikawa diagrams (also called fishbone diagrams, herringbone diagrams,
cause-and-effect diagrams, or Fishikawa) are causal diagrams created by Kaoru
Ishikawa that show the causes of a specific event.
○ The defect is shown as the fish's head, facing to the right, with the causes
extending to the left as fishbones; the ribs branch off the backbone for major
causes, with sub-branches for root-causes, to as many levels as required
●
Advantages
○ Highly visual brainstorming tool which can spark further examples of root causes
○ Quickly identify if the root cause is found multiple times in the same or different
causal tree
○ Allows one to see all causes simultaneously
○ Good visualization for presenting issues to stakeholders
Disadvantages
○ Complex defects might yield a lot of causes which might become visually
cluttering
○ Interrelationships between causes are not easily identifiable
●
●
SWOT Analysis - SWOT analysis (or SWOT matrix) is a​ ​strategic planning​ technique
used to help a person or organization identify strengths, weaknesses, opportunities, and
threats related to​ ​business​ competition or project planning.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
41
ENROLL THIS COURSE
●
●
●
Strengths and weakness are frequently internally-related, while opportunities and threats
commonly focus on the external environment. The name is an acronym for the four
parameters the technique examines:
○ Strengths: characteristics of the business or project that give it an advantage
over others.
○ Weaknesses: characteristics of the business that place the business or project at
a disadvantage relative to others.
○ Opportunities: elements in the environment that the business or project could
exploit to its advantage.
○ Threats: elements in the environment that could cause trouble for the business or
project.
BCG Matrix - Boston Consulting Group - created to evaluate the strategic position of the
business brand portfolio and its potential. (https://www.bcg.com)
The growth share matrix was built on the logic that market leadership results in
sustainable superior returns. Ultimately, the market leader obtains a self-reinforcing cost
advantage that competitors find difficult to replicate. These high growth rates then signal
which markets have the most growth potential.
○ Each of the four quadrants represents a specific combination of relative market
share, and growth:
■ Low Growth, High Share. Companies should milk these “cash cows” for
cash to reinvest.
■ High Growth, High Share. Companies should significantly invest in these
“stars” as they have high future potential.
■ High Growth, Low Share. Companies should invest in or discard these
“question marks,” depending on their chances of becoming stars.
■ Low Share, Low Growth. Companies should liquidate, divest, or reposition
these “pets”
Lesson 4.4: Business Impact Analysis
Skills Learned From This Lesson: Skill, skill skill
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
42
ENROLL THIS COURSE
●
●
●
Business impact analysis (BIA) is a systematic process to determine and evaluate the
potential effects of an interruption to critical business operations as a result of a disaster,
accident or emergency. Having that in mind you should:
○ Identifies and prioritizes all business
○ Determine and identify mission / business process and recovery criticality based
on :
■ Impact of a system disruption to those critical systems
■ Determine outage impact and estimated downtime
○ Risk identification:
■ Internal vs 3rd Party
■ Probability and impact
○ Identity resource requirement to resume critical process soon as possible
○ Identify recovery priorities for system resources
Business Impact Assessment Priorities :
○ Create In-depth list of business process and their impact on the organization,
make sure that business process are always interconnected.
○ Often delegated to individual departments for accuracy and buy-in
○ Criticality is driven by the amount of lost the organization will suffer if the
resource is unavailable.
○ MTD / MTO - Maximum Tolerable Downtime / Outage Maximum time that an
enterprise can support processing in alternate mode.
○ RTO - The amount of time allowed for the recovery of a business function or
resource after a disaster occurs.
○ RPO - Recovery Point Objective - Tolerance for data loss
○
Business impact analysis document (template) should have:
○ Business Unit Name
○ Head Count - Number of full time staff in the business unit :
○ Parent Process - Brief description of the principal activities the unit performs, e.g.
sales, contractor, interface
○ Priority Rank - Subjective ranking of parent process according to criticality to the
business unit
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
43
ENROLL THIS COURSE
○
○
○
○
Recovery Time Objective - Timeline needed to recover the parent process work
should be restored following a disruption.
Recovery Point Objective - Point in time to which parent process work should be
restored following a disruption
Parent Process Depends On - Names of organization and/or processes the
parent process needs for formal operations
Parent Process required by - Names of organizations and / or process that need
the sub-process for normal operations
Lesson 4.5: Controls Assessment
Skills Learned From This Lesson: Skill, skill skill
●
●
After Business impact analysis, assessment controls already in place, should give us an
overall picture about controls, and purpose of controls. Below we have usual ways to
assess the controls:
○ Audits (internal or external)
○ Control tests - used to test one of more specific types of risk
○ Incident reports (follow up and lesson learn)
○ IT operation feedback
○ Logs: Valuable but underutilized
○ Media reports
Risk Control Analysis
○ Threat and misuse case modeling
■ Misuse case modeling looks at all the possible errors, mistakes or ways a
system can be misused
■ Threat modeling examines the ways a system can be attacked and used
for the purpose for which the system was never intended
○ Root Cause analysis - Establish the origins of events (root cause) to learn from
consequences
■ Pre-mortem: a facilitated workshop where the group is told to pretend that
the project has failed and then they are to discuss why it has failed.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
44
ENROLL THIS COURSE
Lesson 4.6: Stride Threat Modeling
Skills Learned From This Lesson: STRIDE, Threat, Software Development
●
●
●
Threat Modeling - Spoofing, Tampering, Repudiation, Information Disclosure, Denial of
Service, Escalation of Privilege.
Used in software development - Risk assessment
Tools for software threat modeling:
○ Microsoft Threat model tool (more on Microsoft web
https://docs.microsoft.com/en-us/azure/security/develop/threat-modeling-tool​)
○ OWASP Dragon (​https://threatdragon.org​)
Lesson 4.7: Gap Analysis
Skills Learned From This Lesson: Gap, Analysis, CMMI, CMU, maturity level
●
●
●
●
In management literature, gap analysis involves the comparison of actual performance
with potential or desired performance. Gap analysis identifies gaps between the
optimized allocation and integration of the inputs (resources), and the current
allocation-level.Gap analysis involves determining, documenting and improving the
difference between business requirements and current capabilities.
First step in Gap analysis should be determining business objectives and goals.
Depending on objectives and goals, gap analysis should compare current state of risk,
controls and try to improve current state.
CMMI - Capability Maturity Model Integration (CMMI) is a process level improvement
training and appraisal program. Administered by the CMMI Institute, a subsidiary of
ISACA, it was developed at Carnegie Mellon University (CMU). It is required by many
United States Department of Defense (DoD) and U.S. Government contracts, especially
in software development. CMU claims CMMI can be used to guide process improvement
across a project, division, or an entire organization. Version 2.0 was published in 2018.
Web site of CMMI​ ​https://cmmiinstitute.com/
CMMI defines the following maturity levels for processes:
○ Initial,
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
45
ENROLL THIS COURSE
●
○ Managed,
○ Defined,
○ Quantitatively Managed, and
○ Optimizing
Gap Analysis should track Key Indicators such as:
○ KPIs - Key Performance Indicators - A performance indicator or key performance
indicator (KPI) is a type of performance measurement. KPIs evaluate the success
of an organization or of a particular activity (such as projects, programs, products
and other initiatives) in which it engages.
○ KRIs - Key Risk Indicators - A key risk indicator (KRI) is a measure used in
management to indicate how risky an activity is. Key risk indicators are metrics
used by organizations to provide an early signal of increasing risk exposures in
various areas of the enterprise.
○ KGIs - Key Goal Indicators - a measure that tells management, after the fact,
whether an IT process has achieved its business requirements and is usually
expressed in terms of information criteria.
Lesson 4.8: Risk Analysis Methodologies
Skills Learned From This Lesson: Assessment, Quantitative, Qualitative
○
Risk Assessment types are:
■ Quantitative
■ Quantitative assessments typically employ a set of methods,
principles, or rules for assessing risk based on the use of
numbers—where the meanings and proportionality of values are
maintained inside and outside the context of the assessment.
■ More experience required than with Qualitative
Assessment
■ Involves calculation to determine a dollar value associated
with each risk event.
■ Business decisions are made on this type of analysis
■ Goal is to the dollar value of a risk and use that amount to
determine what the best controls is for particular asset
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
46
ENROLL THIS COURSE
■
■
■
Brought to you by:
■ Necessary for a cost benefit analysis.
Formulas and Terms:
■ (AV) -Asset Value - Dollar figure that represent what the
asset is worth to the organization.
■ (EF) Exposure factor is the subjective, potential
percentage of loss to a specific asset if a specific threat is
realized.
■ (SLE) - Single-loss expectancy (SLE) is the monetary
value expected from the occurrence of a risk on an asset.
Computed using SLE = asset value x exposure factor.
■ (ARO) - Annual Rate of Occurrence - How often the threat
is expected to materialize
■ (ALE) - The annualized loss expectancy (ALE) is the
product of the annual rate of occurrence (ARO) and the
single loss expectancy (SLE). It is mathematically
expressed as: ARO = ALE * SLE
■ (TCO) - Total Cost of Ownership is total cost of
implementing a safeguard. Often in addition to initial cost ,
there are ongoing maintenance as well.
■ (ROI) - Return of Investment - Amount of money saved by
implementation of safeguard. Sometimes referred as the
value of the safeguard / control.
Qualitative
■ Qualitative assessments typically employ a set of methods,
principles, or rules for assessing risk based on nonnumerical
categories or levels (e.g., very low, low, moderate, high, very
high). This type of assessment supports communicating risk
results to decision makers.
■
Semi-qualitative,
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
47
ENROLL THIS COURSE
■
semi-quantitative assessments typically employ a set of methods,
principles, or rules for assessing risk that uses bins, scales, or
representative numbers whose values and meanings are not
maintained in other contexts. This type of assessment can provide
the benefits of quantitative and qualitative assessments.
Lesson 4.9: Risk Assessment Report
Skills Learned From This Lesson: Report, IT Risk, Skill, skill skill
●
●
●
●
●
●
The report which contains the results of performing a risk assessment or the formal
output from the process of assessing risk.
Result of risk assessment should indicate gaps between current risk state and desired
state
Risk assessment report should provide management documentation of risk along with
recommendations for addressing any outstanding risk issues
○ Justifiable and linked with the results of the risk assessment
○ Document process used and results of the risk assessment
○ State risk level and priorities
Each risk must be at a level in the organization where they can make necessary
decisions and can be accountable
Ownership with an individual is needed for accountability
IT RISK Assessment Report include:
○ Objectives of the risk assessment process
○ Scope and description of the area subject to assessment
○ External context and factors affecting risk assessment
○ Risk assessment criteria
○ Risk assessment methodology used
○ Resources and references used
○ Identification of risk, threats and vulnerabilities
○ Assumptions used in the risk assessment
○ Potential of unknown factors affecting assessment
○ Result of risk assessment
○ Recommendations and conclusions
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
48
ENROLL THIS COURSE
●
Communicating the IT Risk Assessment Results
○ Results should be compiled into a report to senior management ( try to avoid
technical terms and use only management terms if it's possible)
○ Report should list all risk (risk register) along with severity and owner
○ Provide ​recommendation​ on what action to take
Module 5: ​Risk Mitigation
Lesson 5.1: Risk Mitigation Reduction
Skills Learned From This Lesson: Risk response, Risk Mitigation
●
Domain 3—Risk Response and Mitigation
Determine risk response options and evaluate their efficiency and effectiveness to manage
risk in alignment with business objectives.
3.1 Consult with risk owners to select and align recommended risk responses with
business objectives and enable informed risk decisions.
3.2 Consult with, or assist, risk owners on the development of risk action plans to ensure
that plans include key elements (e.g., response, cost, target date).
3.3 Consult on the design and implementation or adjustment of mitigating controls to
ensure that the risk is managed to an acceptable level.
3.4 Ensure that control ownership is assigned to establish clear lines of accountability.
3.5 Assist control owners in developing control procedures and documentation to enable
efficient and effective control execution.
3.6 Update the risk register to reflect changes in risk and management’s risk response.
3.7 Validate that risk responses have been executed according to the risk action plans.
●
Aligning Risk Response with Business Objectives
○ Management is always responsible for evaluating and responding to the risk
recommendations included in the risk report provided following risk assessment.
○ Management must always be aware of the drivers for risk management, such as
compliance with regulations and the need to support and align the risk response
with business priorities and objectives.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
49
ENROLL THIS COURSE
●
●
●
Risk Response Options
○ Risk mitigation​ - with appropriate control measures or mechanism
○ Risk avoidance​ - terminate the activity that give rise to it.
○ Risk transfer​ - to another party ( usually an insurance company)
○ Risk acceptance​ - accept the risk.
Risk mitigation​ means action is taken to reduce the frequency and/or impact of a risk.
○ May require the use of several controls until it reaches level of risk acceptance or
risk tolerance
○ Examples of risk mitigation
■ Strengthening overall risk management practices, such as implementing
sufficiently mature risk management processes
■ Deploy new technical, management or operational controls that reduce
either the likelihood or impact of an adverse event
■ Installing a new access control system
■ Implementing policies or operational procedures
■ Using compensating controls
Risk Avoidance​ means exiting the activities or conditions that give rise to risk
○ Applies when no other risk response is adequate
○ Examples of risk avoidance :
■ Relocating a data center away from a region with significant natural
hazards.
■ Declining to engage in a very large project when the business case shows
a notable risk of failure
■ Declining not to use a certain technology or software package because it
would prevent future expansion.
Lesson 5.2: Risk Mitigation Transference and Acceptance
Skills Learned From This Lesson: Risk Acceptance,Risk Transfer, Risk Sharing
●
Risk Acceptance
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
50
ENROLL THIS COURSE
○
●
A conscious decision made by senior management to recognize the existence of
risk and knowingly decide to allow ( assume) the risk to remain without (further)
mitigation
■ Management response for impact of the risk event
○ Defined as the amount of risk that senior management has determined is within
acceptable or permissible bounds
■ Not the same as risk ignorance / rejection, which is the failure to identify
or acknowledge risk
○ Risk tolerance-​ An exception when senior management decides to exceed risk
acceptance levels
Risk Transfer / Sharing​ - is a decision to reduce loss through sharing the risk of loss
with another organization (Purchasing insurance)
○ Partnership with another organization are an example
○ Decision should be reviewed on a regular basis
Lesson 5.3: Information Security Concepts
Skills Learned From This Lesson:Information security program, Information security practices
●
●
●
As defined by ISACA the goal of this domain is to:” Develop and maintain an information
security program that identifies, manages and protect the organization’s assets while
aligning to information security strategy and business goals, thereby supporting and
effective security posture.”
Information Security Program - encompasses all the activity and resources that
collectively provide information security services to an organization. NotesNotesNotes
○ Is best coordinated by COO, as this individual should properly see the need for
balance between information security and business operations.
Key Information Security Program Elements :
○ Technology - is often seen by enterprise management as a way to resolve
security threats and risk.
○ People -Represents a human collective and must take into account values,
behaviors and biases.
○ Process - Include formal and informal mechanisms to get things done.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
51
ENROLL THIS COURSE
●
Essential Information Security Practices
○ Management Commitment
○ Risk Management
○ Asset inventory and management
○ Change Management
○ Incident Response and Management
○ Configuration Management
○ Training and Awareness
○ Continuous Audit
○ Metrics and Measurement
○ Vulnerability Assessment
○ Penetration Testing
○ Application Security Testing
○ Device Management
○ Log Monitoring, Analysis and Management
○ Secure Development
Lesson 5.4: Security Program Requirements
Skills Learned From This Lesson: Security program, Risk Management, Conceptual
●
●
●
●
Must be enterprise wide, there should not be separate programs for IT, Finance etc ..
Enterprise security architecture at conceptual, logical, functional and physical level holistic.
Must manage risk to an acceptable level. Board of directors, senior management should
define risk appetite, and we should manage risk to an acceptable level.
Must be defined in business language (terms) to help non-technical stakeholders
understand and endorse program goals.
Must provide security related feedback to business owners and stakeholders.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
52
ENROLL THIS COURSE
Lesson 5.5: Essential Elements of an Information Security Program
Skills Learned From This Lesson: Metrics, Security Program, IS Objectives
●
●
●
●
Well planned Information Security strategy, aligned with business goals
Objective of the Information Security program is to implement the strategy in the most
cost-effective manner possible, while maximizing support of business functions and
minimizing operational disruptions.
It is essential to determine the forces that drive the business need for information
security program. Primary drivers could be :
○ Increasing requirements for regulatory compliance
○ Higher frequency and cost related to security incidents
○ Business process or objectives that may be increased organizational risk…
Information security Program should :
○ Provide strategic alignment with business objectives
○ Use Risk management as the foundation for security related decisions
○ Deliver Value to stakeholders (direct or indirect )
○ Manger resources effectively and efficiently
○ Provide integration with other assurance functions ( operational security, physical
security, facility security ….)
○ Use performance measurement to provide a means of measuring progress and
monitoring.
○ Metrics must be developed at multiple levels, including strategic, management
and operational levels.
○ Metrics should be defined and agreed on by management.
Lesson 5.6: Introduction to Information Security Frameworks - ISO 27002
Skills Learned From This Lesson: ISO 2700x, COBIT 5/ 2019
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
53
ENROLL THIS COURSE
●
●
●
●
●
●
●
●
The information security management framework is a conceptual representation of and
information security management structure. It should define technical, operational,
administrative and managerial components of program.
○ More Notes
The ISO/IEC 27000 family of information security standards
The ISO 27000 family of information security management standards is a series of
mutually supporting information security standards that can be combined to provide a
globally recognised framework for best-practice information security management.
The security standard ISO/IEC 27001:2015 Information Security Management System
(ISMS) and the accompanying code of practice 27002:2015 provide widely accepted
framework and approach to information security management. ISO/IEC 27001 standard
can be mapped to COBIT, but are less business oriented, less comprehensive and do
not provide complete tool sets.
COBIT 2019 - provides comprehensive framework with focus on helping enterprises
create optimal value from IT by maintaining a balance between realising benefits and
optimizing risk levels and resource use.
While COBIT 5 provide 5 key principles for governance and management of enterprise
IT, COBIT 2019 provide 6 key principles.
Cobit 2019 - Key Principles :
○ Provide Stakeholder Value
○ Holistic Approach
○ Dynamics Governance System
○ Governance Distinct from Management
○ Tailored to Enterprise Needs
○ End to End Governance System
COBIT 2019 - improves on prior version of COBIT in following areas:
○ Flexibility and openness
○ Currency and relevance
○ Prescriptive application
○ Performance management of IT
Lesson 5.7: Information Security Frameworks
Skills Learned From This Lesson: Frameworks,
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
54
ENROLL THIS COURSE
●
Components of Information Security Framework
○ Operational components
■ Operational components of security program are the ongoing
management and administrative activities that must be performed to
provide the required level of security assurance. They are generally
conducted on daily to weekly timeline.
○ Management components
■ They will include strategic implementation activities such as standards
development or modification, policy reviews and oversight of initiatives or
program executions. Those activities generally take place less frequently
than operational components.
○ Administrative components
■ Information security management must address the same business
administration activities as other business units, such as budgeting
planning, total cost of ownership (TCO) analysis, return on investment
(ROI).
○ Educational Components - Information security management activities must
include employee education and awareness regarding security risk. Awareness
training is often integrated with employee initial training. However it’s
recommended to re-educate employees at least once per year.
Lesson 5.8: Information Security Architecture !!! NOTE !!! First 30 sec of this video is without
any signal !!! NOTE !!!
Skills Learned From This Lesson: Architecture, Type of Architecture
●
●
Purpose of Architecture - Infrastructure comprises the computing platforms, Hardware,
Software, FirmWare, Networks and it supports a wide range of applications, to meet
business objectives. Once infrastructure is designed and deployed, the infrastructure
should be secure.
Types of Architecture:
○ Business- defines the business strategy, governance, organization and key
business processes.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
55
ENROLL THIS COURSE
○
○
○
Data - describes the relationship between integrated components ensuring that
data assets are stored, ordered, managed and used in systems.
Application - provides blueprint for individual application to be deployed, their
interactions and relationships.
Technology - describes the architectural design principles, components,
relationships and supporting infrastructure.
Lesson 5.9: Security Operations Events Monitoring
Skills Learned From This Lesson: Operations, Components, Monitoring
●
●
●
●
Operational components of security program are the ongoing management and
administrative activities that must be performed to provide the required level of security
assurance. They are generally conducted on daily to weekly timeline.
Security operation components include:
○ Event Monitor
○ Vulnerability Management
○ Secure engineering and development
○ Network Protection
○ Endpoint protection and management
○ Identity and access management
○ Security incident management and BCP
○ Security Awareness training
○ Managed security service providers
○ Data Security
○ Cloud resources Management
Event Monitoring - event monitoring is practice of eaming events that are occuring on
information systems, including applications, operating systems, database management
systems, end user devices, or any type and kind of network device, are being aware of
what is going on throughout the entire operating environment.
○ Monitoring is a continuous process, which ensures that all events are recorded
and can be investigated later if necessary.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
56
ENROLL THIS COURSE
○
●
Log review is detailed and systematics form of monitoring which are logged
information is analyzed for some specific pattern, abnormal, unauthorised
..activities.
○ Logs can be collected from different sources relevant to security. Manually review
and monitoring logs is time consuming action, so administrators often use
automatic tools for collecting and monitor logs.
○ SIEM - Security Information and Event Monitor is one of the tools used to
automate monitoring of systems. SIEM can collect different types of logs and
store in one location for future review.
Vulnerability Management -refers to identifying vulnerabilities, evaluating them, and
taking steps to mitigate risk, associated with them. Major elements of vulnerability
management are routine vulnerability scans and periodic vulnerability assessments.
Lesson 5.10: Secure Engineering and Threat Modeling
Skills Learned From This Lesson: Secure Engineering, Development, STRIDE
●
●
Security should be a concentracion at every state of a system development , including
the SDLC (Software Development Life Cycle). The SDLC is not a methodology per se,
but rather a description of the phases in the life cycle of a software application. The
SDLC adheres to important phases that are essential for developers—such as planning,
analysis, design, and implementation.
The Security Development Lifecycle (SDL) is a security assurance process that is
focused on software development. Every organization is different in many ways,
however, every organization should take care about:
○ Requirements - Security and privacy requirements analysis should be performed
on project level and include minimal security requirements, just before any code
has been performed.
○ Preliminary analysis:
■ Conduct the preliminary analysis
■ Propose alternative solutions
■ Cost benefit analysis
○ Systems analysis, requirements definition - Define project goals into defined
functions and operations of the intended application.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
57
ENROLL THIS COURSE
●
●
●
■ Collection of facts
■ Scrutiny of the existing system
■ Analysis of the proposed system
○ Systems design - desired features and operations are described in detail.
○ Development - Real coding beginning here.
○ Integration and testing - All pieces of software, bringing together on test
environment for test and checked for bugs.
○ Acceptance, installation, deployment - final step for the development, deployed
into production.
○ Maintenance- During the maintenance system is assessed to ensure it does not
become obsolete.
○ Evaluation - post-implementation review.
○ Disposal - In this phase, plans are developed for discontinuing the use of system
information, hardware, and software and making the transition to a new system.
Some of the sSDLC:
○ Microsoft Security Development Lifecycle https://www.microsoft.com/en-us/securityengineering/sdl
○ NIST 800-160 Volume 1
https://csrc.nist.gov/publications/detail/sp/800-160/vol-1/final
○ OWASP SAMM -​ ​https://www.owasp.org/index.php/OWASP_SAMM_Project
Secure engineering and Development - STRIDE
STRIDE is a model of threats developed by Praerit Garg and Loren Kohnfelder at
Microsoft for identifying computer security threats. It provides a mnemonic for security
threats in six categories:
Threats
Mitigation
Spoofing
Authenticity
Tampering
Integrity
Repudiation
Non-repudiabi
lity
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
58
ENROLL THIS COURSE
Information disclosure (privacy breach or
data leak)
Confidentiality
Denial of service
Availability
Elevation of privilege
Authorization
Lesson 5.11: Protecting the Network - Segmentation
Skills Learned From This Lesson: Segmentation, Intranet, Extranet, DMZ,
●
●
●
●
●
Networks are not typically configured as one large collection of systems. Usually
systems are collected (segmented) into smaller organization units. These smaller group
of systems, smaller networks (subnets) can be used to:
○ Boosting performance
○ Reducing communication problems
○ Providing security
Intranet is a private network, designed to host the same services as Internet ( web portal,
email services, IM ..etc) and is not accessible from anyone from the internet.
Extranet ( often named as DMZ or perimeter network) is a cross between Internet and
intranet.
Firewall - network device used to filter traffic. There is a various places to implement this
device, usually it is implemented between internal and external network. Firewalls are
effective against unrequested traffic and connection from outside of network.
There are different types of firewalls, depends on the service they provide :
○ Static packet-filtering firewalls
○ Application level Gateway firewalls
○ Circuit-level gateway firewalls
○ Stateful inspection Firewalls
○ Next-gen Firewalls
○ Deep packet inspection firewalls.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
59
ENROLL THIS COURSE
●
AirGap is another way to segment networks from the outside world. N​etwork security
measure employed on one or more computers to ensure that a secure​ ​computer network
is physically isolated from unsecured networks.
Lesson 5.12: Protecting the Network - Wireless Security
Skills Learned From This Lesson: WEP, WPA, WPA2,WPA3
●
●
●
●
●
●
●
Wireless networking is a popular method for connecting home systems as well as
corporate systems. Main reasons are easy / fast deployment, and relatively low cost of
implementations.
WEP - Wired Equivalent Privacy is defined by IEEE 802.11 standard. Designed to
provide the same level of security and encryption on wireless networks as is found on
wired / cabled networks. WEP uses a predefined shared secret key. Secret key is static
and shared among all wireless access points and device interfaces. Soon as its
released, WEP was cracked. Today WEP can be cracked in less than a minute.
WPA - Wi-FI Protected Access was designed as a replacement for WEP. Wi-Fi
Protected Access is based on LEAP and TKIP and often use secret passphrase for
authentication
○ LEAP - Lightweight Extensible Authentication Protocol- Cisco proprietary
alternative to TKIP for WPA.
○ TKIP - Temporal Key Integrity Protocol, designed as a replacement for WPA,
without replacement of legacy wireless hardware.
WPA 2 - It is a new encryption scheme known as CCMP ( Counter Mode Cipher Block
Chaining Message Authentication Code Protocol) based on AES encryption.
AES - The Advanced Encryption Standard (AES), also known by its original name
Rijndael, established by the U.S. National Institute of Standards and Technology (NIST)
in 2001.
WPA 3 - In January 2018, the Wi-Fi Alliance announced WPA3 as a replacement to
WPA2, the new standard uses an equivalent 192-bit cryptographic strength in WPA3 Enterprise mode and still mandates the use of CCMP-128 (AES-128 in CCM mode) as
the minimum encryption algorithm in WPA3-Personal mode.
Authentication - WPA, WPA2 and WPA 3 standards support enterprise authentication
known as 802.1X / EAP.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
60
ENROLL THIS COURSE
○
EAP - Extensible Authentication Protocol is not mechanism of authentication it
is rather framework for authentication. EAP enable different methods to be used
with existing wireless or point-to-point connection technologies.
Lesson 5.13: Protecting the Network - Services
Skills Learned From This Lesson: DNS, Pharming, DHCP, LDAP
●
●
●
●
●
DNS - The Domain Name System (DNS) is a hierarchical and decentralized naming
system for computers, services, or other resources connected to the Internet or a private
network. Main purpose of DNS is to translate domain name to an IP address. It is
essential to have in TCP/IP networks Name System to provide IP’s.
○ Widely used attack to DNS is pharming. Pharming is combination of Phishing and
Farming, similar to phishing, where a website's traffic is manipulated and
confidential information is stolen. In case where DNS cache is poisoning it is
possible to route virus-free or malware-free computer to malicious server.
The Dynamic Host Configuration Protocol (DHCP) is a network management protocol
used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address
and other network configuration parameters to each device on a network so they can
communicate with other IP networks.
○ Misuse of DHCP can be:
■ Unauthorized DHCP servers providing false information to clients
■ Unauthorized clients gaining access to resources
■ Resource exhaustion attacks from malicious DHCP clients
LDAP - The Lightweight Directory Access Protocol is an open, vendor-neutral, industry
standard application protocol for accessing and maintaining distributed directory
information services over an Internet Protocol (IP) network.
Web services - are usually exposed to external network. Exposure of services outside of
internal network bring to us some degree of risk. Regular testing of web services,
vulnerability or pen-test of web services shrink attack surface, and hardening our overall
security.
Mail services - regular vulnerability scanning and pentesting raise our security bar.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
61
ENROLL THIS COURSE
Lesson 5.14: Protecting the Network - Through Detection and Network Access Control
Skills Learned From This Lesson: NAC (Network Access Control), SHV (System Health
Validator)
●
●
●
Network Access Control (NAC) is a solution that uses a set of protocols to define and
implement a policy that describes how to secure access to network nodes by devices
when they initially attempt to access the network.
Goals of NAC:
○ Prevent / reduce zero -day attack
○ Enforce security policies throughout the network
○ Use identifiers to perform access control
NAC works in two ways, either preadmison philosophy, postadmison philosophy or both.
○ Preadmison philosophy - end-stations are inspected prior to being allowed on
the network
○ Postadmision philosophy - NAC makes enforcement decisions based on user
actions, after those users have been provided with access to the network.
Lesson 5.15: Data and Endpoint Security
Skills Learned From This Lesson: Endpoint, Data Security,
●
●
Endpoint security is a security concept every individual device must maintain local
security (End device is responsible for its own security)
○ Traditional security has depended on network border entries, however this is not
best practice anymore. Threats exist inside of network as well as outside of
internal network.
○ Every endpoint device should have an appropriate combination of security
controls such as antivirus/malware software, local firewall, IDS/IPS ...
Best practice (some of) for hardening security on endpoint device include :
○ Remove unnecessary services
○ Patch OS and software used on endpoint device
○ Review default settings (configuration settings, passwords..)
○ Rename guest and admin account
○ Install Antimalware and monitoring software …
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
62
ENROLL THIS COURSE
●
Data Security​ - In order to protect data we always appreciate CIA triads and appropriate
controls for protecting.
○ Confidentiality
■ Data at rest - Encryption - controls we should implement to protect data
at rest. Data stored on hard drive, SSD .. use encryption.
■ Data in motion - To protect data in motion we should use TLS (transport
Layer Protocol ) cryptographic protocol design to provide communication
security over communication channels.
■ Data in use - probably the hardest part for securing data.
Recommendation for securing data in use is homomorphic encryption.
○ Homomorphic encryption - Homomorphic encryption is a form of encryption that
allows computation on ciphertexts, generating an encrypted result which, when
decrypted, matches the result of the operations as if they had been performed on
the plaintext.
○ Integrity - ​control used to provide integrity are
■ Hash / Message digest -A hash function is any function that can be used
to map data of arbitrary size to fixed-size values.The values returned by a
hash function are called hash values, hash codes, digests, or simply
hashes. Most popular algorithms are MD5, SHA and CRC32.
○ Availability - ​Our data should be available most of the time. To achieve this we
use redundancy on all levels in our network and servers.
Lesson 5.16: Selecting a Mitigation Strategy
Skills Learned From This Lesson: ​Controls Design​, ​Cost Benefit Analysis
●
●
Controls Design and Implementation - Controls are any technology, process, practice,
policy, standards that serve to regulate any activity to manage risk. Controls can be:
○ Proactive - Proactive controls acting in advance of a future situation, rather than
just reacting.
○ Reactive - implement controls when some unexpected / unwanted events occur.
Vulnerabilities associated with New Controls - New controls always present new risk and
new vulnerabilities. Implementation of new controls should consider :
○ Effectiveness of recommended options
○ Compatibility with existing controls
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
63
ENROLL THIS COURSE
●
●
○ Legislation and regulation
○ Organizational policy and standards
○ Operational structure and culture
Cost Benefit Analysis - If the cost of the implementation controls exceed the benefit of
mitigating the risk, organizations should consider to accept the risk rather then
implement control. Cost Benefit Analysis helps organizations to get a monetary view of
risk and then determine implementation of the controls.
Return on Investment - ROI is often used as a method to justifying an investments,
however, it can be difficult to determine the cost of the controls because it is hard to
predict the likelihood of an impact.
Lesson 5.17: Types of Mitigating Controls
Skills Learned From This Lesson: Controls categories
●
●
●
Control methods
Control Categories
○ Preventive -Inhibit attempts to violate security policy and include such controls as
access control enforcement, encryption and authentication.
○ Detective - warn of violations or attempting violation if security policy.
○ Corrective- remediate vulnerabilities.
○ Compensatory - compensate or increased risk by adding control steps that
mitigate risk.
○ Deterrent - provide warnings that can deter potential compromise.
Managing risk throughout the system /software development life cycle -(covered in deep
in lesson 5.10: Secure Engineering and Threat Modeling)
Lesson 5.18: Identity and Access Management
Skills Learned From This Lesson: Identity management, Access Management, IAM
●
Identity and Access Management is all about granting and revoking privileges to access
to data or systems. Focus of Identity and Access Management is identification,
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
64
ENROLL THIS COURSE
●
●
●
●
●
●
●
authentification, authorization and accountability. It is more than just which user have
access which files or services.
Identification is a process of subject claiming an identity
Authorization verifies the identity of the subject by comparing one or two factor against a
database of valid identities such as user accounts.
Identity proofing - In the organizations, new employees prove their identity with
appropriate documentation. (something you have- driver licences, passport, SSN, etc ..)
Registration is more or less similar to any organization.
Account provisioning - in the organization, account provisioning should be done via
Active Directory automatically ( will be ideal).
Accountability - Auditing, monitoring and logging provide accountability by ensuring that
subject can be held accountable for their actions.
Authentication Factors - there are three methods of authentication known as types of
factors:
○ Type1 - Something you know (usually - passwords, PIN, passphrase)
○ Type2- Something you have (Physical device - usually smartcard, hardware
token, memory card … )
○ Type3- Something you are (physical characteristics of person identified with
different types of biometrics)
Process of provisioning users should include de-provisioning also. Following the same
principle of provisioning, deprovisioning should be also automated task.
Lesson 5.19: Third Party Governance
Skills Learned From This Lesson: Governance, Third party, Process
●
●
You can transfer RISK, but you cannot transfer LIABILITY.
Important aspect of security and risk governance is rules and process, when we are
dealing with third party.
○ Third party providers are typically:
○ ISP providers
○ Outsourced operation
○ Trading partners
○ Merged or acquired organization
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
65
ENROLL THIS COURSE
●
●
Some services (from providers) are under the direct control of IT/ Security teams, some
of them are under the direct control of other departments. Risk practitioner should be
informed and understand business requirements.
Managing risk to an acceptable level can pose challenges and may require various
controls
Lesson 5.20: Policies, Procedures, Standards, and Guidelines
Skills Learned From This Lesson: Policies, Procedures, Standards and Guidelines
●
●
●
●
●
Policies - high level statements, of an organization's beliefs, goals, and objectives and
general means and a general means for their attainment for a specific subject area.
Three main types of policies exist:
○ The Corporate Security Policy can be thought of as a blueprint for the whole
organization’s security program.It is strategic plan for implementing security in
the organization.
○ A System Specific policy is concerned with a specific or individual computer
system.It is meant to present the approved software, hardware, and hardening
methods for that specific system.
○ An Issue-specific policy is concerned with a certain functional aspect that may
require more attention.
Procedures - outline the specifics of how policies, standards and guidelines will actually
be implemented in the operating environment.
Standards - mandatory activities, actions, rules or regulations designed to provide
policies with a support structure and specific direction.
Guidelines - more general statements that provide a framework within which to
implement procedures. Guidelines are recommendations (“Best Practice”).
Baselines - minimum acceptable security configuration for a system or process.
Lesson 5.21: Certification and Accreditation
Skills Learned From This Lesson: TCSEC, ITSEC, CC
●
Certification - technical evaluation of the product’s security mechanisms in a particular
environment. Once having passed the certification process, the system is verified.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
66
ENROLL THIS COURSE
●
●
●
●
●
●
●
Accreditation - a formal declaration by an Authorisation Official AO ( title that has
replaced Designated Accrediting Authority - DAA) that information systems are approved
to operate at an acceptable level of risk based on the implementation of an approved set
of technical, managerial, and procedural safeguards. Once accredited, the system is
now validated.
○ More Notes
Traditional Evaluation Criteria
○ TCSEC - Trusted Computer System Evaluation Criteria is a standard that sets
basic requirements for assessing the effectiveness of computer security controls.
The TSEC was used to evaluate classify, and select computer systems for
processing, storage and retrieval of sensitive or classified information. Frequently
referred to as the “Orange Book” issued from DoD in USA. TCSEC define four
division D,C,B,and A, where A is the highest security. TCSEC replaced by
Common Criteria international standard in 2005.
○ TCSEC evaluates Confidentiality
ITSEC - Information Technology Security Evaluation Criteria, is a structured set of
criteria for evaluating computer security within products and systems. In 1990 a number
of Europian countries agreed to recognize the validity of ITSEC evaluations.
○ Evaluates Confidentiality, Integrity and Availability
Common Criteria (CC) - Common Criteria for Information Technology Security
Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC
15408) for computer security certification. ISO/IEC 15408-1:2009 establishes the general
concepts and principles of IT security evaluation and specifies the general model of
evaluation given by various parts of ISO/IEC 15408 which in its entirety is meant to be
used as the basis for evaluation of security properties of IT products.
Protection Profile (PP) – a document, typically created by a user or user community,
which identifies security requirements for a class of security devices (for example, smart
cards used to provide digital signatures, or network firewalls) relevant to that user for a
particular purpose.
Target of Evaluation (TOE) – the product or system that is the subject of the evaluation.
The evaluation serves to validate claims made about the target.
Security Target (ST) – the document that identifies the security properties of the target of
evaluation. The ST may claim conformance with one or more PPs. The TOE is evaluated
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
67
ENROLL THIS COURSE
●
●
●
●
●
against the SFRs (Security Functional Requirements) established in its ST, no more and
no less.
Security Functional Requirements (SFRs) – specify individual security functions which
may be provided by a product. The Common Criteria presents a standard catalogue of
such functions.
Evaluation Assurance Level (EAL) – the numerical rating describing the depth and rigor
of an evaluation. Each EAL corresponds to a package of security assurance
requirements.Common Criteria lists seven levels, with EAL 1 being the most basic and
EAL 7 being the most stringent.
Common Criteria Evaluation Assurance Levels:
○ EAL 1- Functionally tested
○ EAL 2- Structurally tested
○ EAL 3- Methodically tested and checked
○ EAL 4- Methodically designed, tested, and reviewed
○ EAL 5- Semi formally designed and tested
○ EAL 6- Semi formally verified designed and tested
○ EAL 7- Formally verified designed and tested
Metrics - a measurement of process or entity based on its performance in relation to
desired objectives.
Monitoring is continuous or regular evaluation of system or control to determine its
operation or effectiveness. Can be quantitative or qualitative.
The November 1981 issue of Management Review contained a paper by George T. Doran
called There's a S.M.A.R.T. way to write management's goals and objectives. It discussed the
importance of objectives and the difficulty of setting them.
Ideally speaking, each corporate, department, and section objective should be:
●
●
●
Specific – target a specific area for improvement.
Measurable – quantify or at least suggest an indicator of progress.
Assignable – specify who will do it.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
68
ENROLL THIS COURSE
●
●
Realistic – state what results can realistically be achieved, given the available resources.
Time-related – specify when the result(s) can be achieved.
Module 6: ​Risk Monitoring and Control Mitigation
Lesson 6.1: Risk, Control Monitoring, and Reporting
Skills Learned From This Lesson: Monitoring Control, Control Assessments
A risk response is designated and implemented based on a risk assessment that was
conducted at a single point in time. Changing the nature of risk and associated controls,
ongoing monitoring is an essential step of the Risk Management Life Cycle. Some of the
reasons for monitoring are:
●
●
●
●
●
Controls can become less effective
The operational environment may change, and
New threats, technologies and vulnerabilities may emerge
Monitoring Controls
○ The purpose of control monitoring is to verify whether the control is effectively
addressing the risk.
○ The purpose of risk monitoring is to collect, validate and evaluate goals and
metrics, to monitor that process are performing as expected, and to provide
reporting.
○ Monitoring may be done though self-assessment or independent assurance
reviews.
○ The risk practitioner should encourage management and process owners to
positive ownership of control improvement.
The steps for monitoring controls are:
○ Identify and confirm risk control owners and stakeholders
○ Engage with stakeholders and communicate the risk and information security
requirements and objectives for monitoring and reporting
○ Align and continually maintain the information security
○ Establish the information security monitoring process and procedure.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
69
ENROLL THIS COURSE
○
●
Agree on life cycle management and change control process for information
security monitoring and reporting
○ Request, prioritize and allocate resources for monitoring information security.
Result of Control Assessments
○ Timeliness of the reporting
■ Are data received in time to take corrective action?
○ Skill of the data analyst
■ Does the analyst have skills to properly evaluate control?
○ Quality of monitoring data available
■ Are the monitoring data accurate and complete?
○ Quantity of data to be analyzed
■ Can the risk practitioner find the important data in the midst of all the
other log data available ?
Lesson 6.2: Key Risk Indicators (KRIs)
Skills Learned From This Lesson: KRI, Criteria for KRI
●
●
●
Risk indicators are metrics capable of showing that the enterprise is subject to, or has a
high probability of being subject to, a risk that exceeds the defined risk appetite
Benefits to the enterprise:
○ Provide an early warning (forward-looking) signal that a high risk is emerging to
enable management to take proactive action (before the risk actually becomes a
loss).
○ Provide a backward-looking view on risk events that have occurred, enabling risk
responses and management to be improved.
○ Enable the documentation and analysis of trends.
○ Provide an indication of the enterprise’s risk appetite and tolerance through
metric setting (i.e., KRI thresholds)
○ Increase the likelihood of achieving the enterprise’s strategic objectives.
○ Assist in continually optimising the risk governance and management
environment.
Criteria to select KRIs include:
○ Impact—Indicators for risks with high business impact are more likely to be KRIs.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
70
ENROLL THIS COURSE
○
●
●
Effort to implement, measure and report—For different indicators that are
equivalent in sensitivity, the one that is easier to measure is preferred.
○ Reliability—The indicator must possess a high correlation with the risk and be a
good predictor or outcome measure.
○ Sensitivity—The indicator must be representative for risk and capable of
accurately indicating variances in the risk.
Examples of KRI’s:
○ Quantity of unauthorized equipment or software detected in scan.
○ Number of instances of SLAs exceeding threshold.
○ High average downtime due to operational incidents.
○ Average time to deploy new security patches to servers.
○ Excessive average time to research and remediate operations incidents
○ Number of desktops/laptops that do not have current antivirus signatures or have
not run a full scan within scheduled periods.
KRI support:
○ Risk appetite
○ Risk identification
○ Risk mitigation
○ Risk culture
○ Risk measurement and reporting
○ Regulatory compliance
Lesson 6.2: Tools for Risk Monitoring
Skills Learned From This Lesson: Tools, SIEM, LOGS
●
Data Collections and Extraction Tools and Technique
○ Audit report
■ Internal
■ External
○ Incident reports
○ User feedback
○ Observation
○ Interviews with management
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
71
ENROLL THIS COURSE
●
●
●
○ Security report
○ Logs
Data Collection - LOG
○ Analysing of log data should answer on :
■ Are the controls operating correctly ?
■ Are the risk strategy and controls aligned with business strategy and
priorities ?
■ Are the controls flexible enough to meet changing threats ?
■ Is the risk management effort aiding in reaching corporate objectives?
■ Is the awareness of risk and compliance embedded into user behaviors ?
○ Logs may contain sensitive information and may be needed for forensic purposes
○ Logs should not contain too much information
Security Information and Event Management (SIEM), software products and services
combine security information management (SIM) and security event management
(SEM). They provide real-time analysis of security alerts generated by applications and
network hardware.
External Sources of Information:
○ Media report
○ CERT - Computer Emergency Response Team
○ Security company reports
○ Regulatory bodies
○ Peer organizations
CRISC Certification Job Practice – Effective 2015
The job practice domains and task and knowledge statements are as follows:
Domain 1—IT Risk Identification (27%)
Domain 2—IT Risk Assessment (28%)
Domain 3—Risk Response and Mitigation (23%)
Domain 4—Risk and Control Monitoring and Reporting (22%)
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
72
ENROLL THIS COURSE
Domain 1—IT Risk Identification
Identify the universe of IT risk to contribute to the execution of the IT risk management strategy
in support of business objectives and in alignment with the enterprise risk management (ERM)
strategy.
1.1 Collect and review information, including existing documentation, regarding the
organization’s internal and external business and IT environments to identify potential or
realized impacts of IT risk to the organization’s business objectives and operations.
1.2 Identify potential threats and vulnerabilities to the organization’s people, processes and
technology to enable IT risk analysis.
1.3 Develop a comprehensive set of IT risk scenarios based on available information to
determine the potential impact to business objectives and operations.
1.4 Identify key stakeholders for IT risk scenarios to help establish accountability.
1.5 Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for
and incorporated into the enterprise-wide risk profile.
1.6 Identify risk appetite and tolerance defined by senior leadership and key stakeholders to
ensure alignment with business objectives.
1.7 Collaborate in the development of a risk awareness program, and conduct training to ensure
that stakeholders understand risk and to promote a risk-aware culture.
Domain 2—IT Risk Assessment
Analyze and evaluate IT risk to determine the likelihood and impact on business objectives to
enable risk-based decision making.
2.1 Analyze risk scenarios based on organizational criteria (e.g., organizational structure,
policies, standards, technology, architecture, controls) to determine the likelihood and impact of
an identified risk.
2.2 Identify the current state of existing controls and evaluate their effectiveness for IT risk
mitigation.
2.3 Review the results of risk and control analysis to assess any gaps between current and
desired states of the IT risk environment.
2.4 Ensure that risk ownership is assigned at the appropriate level to establish clear lines of
accountability.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
73
ENROLL THIS COURSE
2.5 Communicate the results of risk assessments to senior management and appropriate
stakeholders to enable risk-based decision making.
2.6 Update the risk register with the results of the risk assessment.
Domain 3—Risk Response and Mitigation
Determine risk response options and evaluate their efficiency and effectiveness to manage risk
in alignment with business objectives.
3.1 Consult with risk owners to select and align recommended risk responses with business
objectives and enable informed risk decisions.
3.2 Consult with, or assist, risk owners on the development of risk action plans to ensure that
plans include key elements (e.g., response, cost, target date).
3.3 Consult on the design and implementation or adjustment of mitigating controls to ensure that
the risk is managed to an acceptable level.
3.4 Ensure that control ownership is assigned to establish clear lines of accountability.
3.5 Assist control owners in developing control procedures and documentation to enable
efficient and effective control execution.
3.6 Update the risk register to reflect changes in risk and management’s risk response.
3.7 Validate that risk responses have been executed according to the risk action plans.
Domain 4—Risk and Control Monitoring and Reporting
Continuously monitor and report on IT risk and controls to relevant stakeholders to ensure the
continued efficiency and effectiveness of the IT risk management strategy and its alignment to
business objectives.
4.1 Define and establish key risk indicators (KRIs) and thresholds based on available data, to
enable monitoring of changes in risk.
4.2 Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk
profile.
4.3 Report on changes or trends related to the IT risk profile to assist management and relevant
stakeholders in decision making.
4.4 Facilitate the identification of metrics and key performance indicators (KPIs) to enable the
measurement of control performance.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
74
ENROLL THIS COURSE
4.5 Monitor and analyze key performance indicators (KPIs) to identify changes or trends related
to the control environment and determine the efficiency and effectiveness of controls.
4.6 Review the results of control assessments to determine the effectiveness of the control
environment.
4.7 Report on the performance of, changes to, or trends in the overall risk profile and control
environment to relevant stakeholders to enable decision making.
CRISC Knowledge Statements
1. laws, regulations, standards and compliance requirements
2. industry trends and emerging technologies
3. enterprise systems architecture (e.g., platforms, networks, applications, databases and
operating systems)
4. business goals and objectives
5. contractual requirements with customers and third-party service providers
6. threats and vulnerabilities related to:
6.1. business processes and initiatives
6.2. third-party management
6.3. data management
6.4. hardware, software and appliances
6.5. the system development life cycle (SDLC)
6.6. project and program management
6.7. business continuity and disaster recovery management (DRM)
6.8. management of IT operations
6.9. emerging technologies
1.
2.
3.
4.
5.
methods to identify risk
risk scenario development tools and techniques
risk identification and classification standards, and frameworks
risk events/incident concepts (e.g., contributing conditions, lessons learned, loss result)
elements of a risk register
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
75
ENROLL THIS COURSE
6. risk appetite and tolerance
7. risk analysis methodologies (quantitative and qualitative)
8. organizational structures
9. organizational culture, ethics and behavior
10. organizational assets (e.g., people, technology, data, trademarks, intellectual property)
and business processes, including enterprise risk management (ERM)
11. organizational policies and standards
12. business process review tools and techniques
13. analysis techniques (e.g., root cause, gap, cost-benefit, return on investment [ROI])
14. capability assessment models and improvement techniques and strategies
15. data analysis, validation and aggregation techniques (e.g., trend analysis, modeling)
16. data collection and extraction tools and techniques
17. principles of risk and control ownership
18. characteristics of inherent and residual risk
19. exception management practices
20. risk assessment standards, frameworks and techniques
21. risk response options (i.e., accept, mitigate, avoid, transfer) and criteria for selection
22. information security concepts and principles, including confidentiality, integrity and
availability of information
23. systems control design and implementation, including testing methodologies and
practices
24. the impact of emerging technologies on design and implementation of controls
25. requirements, principles, and practices for educating and training on risk and control
activities
26. key risk indicators (KRIs)
27. risk monitoring standards and frameworks
28. risk monitoring tools and techniques
29. risk reporting tools and techniques
30. IT risk management best practices
31. key performance indicator (KPIs)
32. control types, standards, and frameworks
33. control monitoring and reporting tools and techniques
34. control assessment types (e.g., self-assessments, audits, vulnerability assessments,
penetration tests, third-party assurance)
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
76
ENROLL THIS COURSE
35. control activities, objectives, practices and metrics related to:
41.1. business processes
41.2. information security, including technology certification and accreditation practices
41.3. third-party management, including service delivery
41.4. data management
41.5. the system development life cycle (SDLC)
41.6. project and program management
41.7. business continuity and disaster recovery management (DRM)
41.8. IT operations management
41.9. the information systems architecture (e.g., platforms, networks, applications,
databases and operating systems)
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
77
CRISC Glossary
78
ENROLL THIS COURSE
Certified in Risk and Information
Systems Control (CRISC) Glossary
Created By: Cassandra Brunetto, Teaching Assistant
1.
ISACA​ - is a nonprofit, independent association that advocates for professionals
involved in information security, assurance, risk management and governance.
2.
Risk management​ - a detailed process of identifying factors that could damage or
disclose data, evaluating those factors in light of data value and countermeasure cost, and
implementing cost-effective solutions for mitigating or reducing risk.
3.
Risk​ - the possibility or likelihood that a threat will exploit a vulnerability to cause harm to
an asset.
4.
Asset​ - a resource that is valuable to an organization and must be protected.
5.
Threat​ - any potential occurrence that may cause an undesirable or unwanted outcome
for an organization or for a specific asset..
6.
Vulnerability​ - a weakness in a system.
7.
Impact​ - the severity of damage, sometimes expressed in dollars (value).
8.
Risk Governance ​- applies the principles of good governance to the identification,
assessment, management and communication of risks.
9.
Four main objectives of Risk Governance​:
·
1. Establish and maintain a common risk view.
·
2. Integrate risk management into the enterprise.
·
3. Make risk-aware business decisions.
·
4. Ensure that risk management controls are implemented and operating
correctly.
10. Risk assessment​ - A point-in-time evaluation of potential risks. It looks at the current
situation and then attempts to determine what risks exist and how to address them.
11. Inherent risk​ - is a category of threat that arises from the organization's human activity or
physical environment.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
79
ENROLL THIS COURSE
12. Residual risk​ - the risk that remains once countermeasures are implemented. Residual
risk comprises threats to specific assets against which upper management choose not to
implement a safeguard.
13. Secondary risk​ - a risk that arises as a direct result of implementing a risk response.
14. Risk appetite​ - amount and type of risk that an organization is willing to pursue or retain.
15. Risk tolerance​ - levels of risk, types of risk, and degree of risk uncertainty that are
acceptable.
16. Risk profile ​- a chronological record of a risk’s current and historical risk state information.
17. Risk threshold​ - measure of the level of uncertainty or the level of impact at which a
stakeholder may have a specific interest. Below that risk threshold, the organization will
accept the risk. Above that risk threshold, the organization will not tolerate the risk.
18. Risk capacity​ - refers to the maximum amount of risk that an organization is able to
tolerate.
19. Threat agent​ - intentionally exploits vulnerabilities. Threat agents are usually people, but
they could also be programs, hardware, or systems.
20. Exploit​ - defined way to breach the security of information systems through vulnerability.
21. Security control​ - anything that removes or reduces a vulnerability or protects against one
or more specific threats.
22. Systemic risk​ - is a category of risk that describes threats to a system, market or
economic segment.
23. Confidentiality​ - is the concept of the measures used to ensure the protection of the
secrecy of data, objects, or resources. The goal of confidentiality is to prevent or minimize
unauthorized access to data.
24. Integrity​ - is the concept of protecting the reliability and correctness of data. Integrity
protection prevents unauthorized alterations of data..
25. Availability​ - means authorized subjects are granted timey and uninterrupted access to
objects. Availability protection controls support sufficient bandwidth and timeliness of
processing as deemed necessary by the organization or situation.
26. User account provisioning​ - is a business process for creating and managing access to
resources in an information technology (IT) system.
27. Identification -​ is the process by which a subject professes an identity and accountability
is initiated.
28. Authentication ​- the process of verifying or testing that the claimed identity is valid.
29. Authorization​ - the process of authorization ensures that the request activity or access to
an object is possible given the rights and privileges assigned to the authenticated identity..
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
80
ENROLL THIS COURSE
30. Accountability​ - relies on the capability to prove a subject’s identity and track their
activities.
31. User account deprovisioning​ - is the part of the employee life cycle in which access
rights to software and network services are taken away. Deprovisioning typically occurs
when an employee leaves a company or changes roles within the organization.
32. Nonrepudiation​ - ensures that the subject of an activity or event cannot deny that the
event occurred.
33. Data classification​ - is the primary means by which data is protected based on its need
for secrecy, sensitivity, or confidentiality
34. Project Management Institute (PMI)​ - advances careers, improves organizational
success and further matures the profession of project management through globally
recognized standards, certifications, resources, tools, academic research, publications,
professional development courses and networking opportunities.
35. Qualitative Analysis​ - assigns subjective and intangible values to the loss of an asset.
36. Quantitative Analysis​ - assigns real dollar figures to the loss of an asset.
37. ISACA Risk IT Framework​ - fills the gap between generic risk management frameworks
and detailed (primarily security-related) IT risk management frameworks. It provides an
end-to-end, comprehensive view of all risks related to the use of IT and a similarly thorough
treatment of risk management, from the tone and culture at the top, to operational issues..
38. Risk Management Lifecycle​ ·
1. IT Risk Identification
·
2. IT Risk Assessment
·
3. Risk Response and Mitigation
·
4. Risk and Control Monitoring and Reporting
39. ISO/IEC 27005:2018​ - this document provides guidelines for information security risk
management. This document supports the general concepts specified in ISO/IEC 27001 and
is designed to assist the satisfactory implementation of information security based on a risk
management approach..
40. Risk Analysis Steps:
·
1. Risk Identification
·
2. Risk Estimation
·
3. Risk Evaluation
·
4. Risk Response (treat, tolerate, transfer, terminate)
41. NIST Special Publication 800-39​ - the purpose of Special
Publication 800-39 is to provide guidance for an integrated, organization-wide program for
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
81
ENROLL THIS COURSE
managing information security risk to organizational operations (i.e., mission, functions, image,
and reputation), organizational assets, individuals, other organizations, and the Nation resulting
from the operation and use of federal information systems.
42. Risk framing​ - the set of assumptions, constraints, risk tolerances, and priorities/trade-offs
that shape an organization’s approach for managing risk. Risk framing is informed by the
organizational governance structure, financial posture, legal/regulatory environment,
investment strategy, culture, and trust relationships established within and among
organizations.
43. Risk assumptions​ - assumptions about the threats, vulnerabilities, consequences/impact,
and likelihood of occurrence that affect how risk is assessed, responded to, and monitored
over time.
44. Risk constraints​ - constraints on the risk assessment, response, and monitoring
alternatives under consideration.
45. Risk factors​ - threats, vulnerabilities, impact, or likelihood.
46. Threat source​ - The intent and method targeted at the intentional exploitation of a
vulnerability or a situation and method that may accidentally exploit a vulnerability.
47. Threat event​ - provides guidance on the level of detail with which the events are
described. Organizations also identify conditions for when to consider threat events in risk
assessments..
48. Risk assessment​ - A penetration test in which the tester has no prior knowledge of the
network infrastructure that is being tested.
49. NIST Special Publication 800-30 ​- the purpose of Special Publication 800-30 is to provide
guidance for conducting risk assessments of federal information systems and organizations,
amplifying the guidance in Special Publication 800-39.
50. Key risk indicator (KRI)​ - is a metric for measuring the likelihood that the combined
probability of an event and its consequence will exceed the organization's risk appetite and
have a profoundly negative impact on an organization's ability to be successful.
51. Key performance indicators (KPI)​ - are business metrics used by corporate executives
and other managers to track and analyze factors deemed crucial to the success of an
organization.
52. Tiers of organizational risk assessment:
·
Tier 1 - Organization
·
Tier 2 - Mission/business processes
·
Tier 3 - Information systems
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
82
ENROLL THIS COURSE
53. Risk model​ - define the risk factors to be assessed and the relationships among those
factors.
54. Assessment approaches​ - quantitative, qualitative, or semi-quantitative.
55. Analysis approaches​ - differ with respect to the orientation or starting point of the risk
assessment, level of detail in the assessment, and how risks due to similar threat scenarios
are treated. An analysis approach can be: (i) threat-oriented; (ii) asset/impact-oriented; or
(iii) vulnerability oriented.
56. Risk assessment process:
·
1. How to prepare for risk assessments
·
2. How to conduct risk assessments
·
3. How to communicate risk assessment results to key organizational
personnel
·
4. How to maintain the risk assessments over time
57. Risk assessment methodology​ - typically includes: (i) a risk assessment process; (ii) an
explicit risk model, defining key terms and assessable risk factors and the relationships
among the factors; (iii) an assessment approach (e.g., quantitative, qualitative, or
semi-qualitative), specifying the range of values those risk factors can assume during the
risk assessment and how combinations of risk factors are identified/analyzed so that values
of those factors can be functionally combined to evaluate risk; and (iv) an analysis approach
(e.g., threatoriented, asset/impact-oriented, or vulnerability-oriented), describing how
combinations of risk factors are identified/analyzed to ensure adequate coverage of the
problem space at a consistent level of detail.
58. RACI Model​ - clearly lays out roles and responsibilities for any activity or group of activities
(R = Responsible; A = Accountable; C = Consulted; I = Informed).
59. Risk culture​ - a term describing the values, beliefs, knowledge, attitudes and
understanding about risk shared by a group of people with a common purpose.
60. Risk prioritization​ - in the risk prioritization step, the overall set of identified risk events,
their impact assessments, and their probabilities of occurrences are "processed" to derive a
most-to-least-critical rank-order of identified risks. A major purpose of prioritizing risks is to
form a basis for allocating resources.
61. Risk register​ - is used to identify potential risks in a project or an organization, sometimes
to fulfill regulatory compliance but mostly to stay on top of potential issues that can derail
intended outcomes. The risk register includes all information about each identified risk, such
as the nature of that risk, level of risk, who owns it and what are the mitigation measures in
place to respond to it.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
83
ENROLL THIS COURSE
62. Risk trigger​ - identifies the risk symptoms or warning signs. It indicates that a risk has
occurred or is about to occur.
63. Contingency planning​ - refers to interim measures to recover information system services
after a disruption. Interim measures may include relocation of information systems and
operations to an alternate site, recovery of information system functions using alternate
equipment, or performance of information system functions using manual methods..
64. Risk scenario​ - is comprised of: threat actor, threat type, event, asset affected by the risk
event, and the time (duration of event, criticality of asset, lag between event and
consequence, etc.).
65. Tangible assets ​- are physical assets such as equipment, plant, hard-copy documents
and cash.
66. Intangible assets​ - elements that you usually can't put your hands around but are still
subject to quantification. Types of intangible assets are intellectual property, such as trade
secrets, copyright, patents, trademarks.
67. Firewall​ - Software or hardware used to filter traffic into or out of a network. A firewall can
be a dedicated physical device or an additional application running on a system such as a
desktop computer.
68. Data validation​ - checking the accuracy and quality of source data before using,
importing, or otherwise processing data.
69. Virtual private network (VPN)​ - created by building a secure communications link
between two nodes, emulating the properties of a point-to-point private link. A VPN can be
used to facilitate secure remote access into a network, securely connect two networks
together, or create a secure data tunnel within a network.
70. Encryption​ - the process of converting plaintext data into cipher text data to prevent loss
of confidentiality. The process is reversed by decrypting the cipher text data with to create
the original plaintext data.
71. Demilitarized zone (DMZ)​ - A perimeter network used to host resources on the Internet
(such as web servers, email servers, or FTP servers). The DMZ provides a layer of
protection for the resources that would not be available if they were placed directly on the
Internet.
72. Service level agreement (SLA)​ - ensures that organizations providing services to internal
and/or external customers maintain an appropriate level of service agreed upon by both the
service provider and the vendor..
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
84
ENROLL THIS COURSE
73. Bow tie analysis method​ - is a risk evaluation method that can be used to analyse and
demonstrate causal relationships in high risk scenarios. The method takes its name from the
shape of the diagram that you create, which looks like a men’s bowtie.
74. Decision tree ​- is a decision support tool that uses a tree-like graph or model of decisions
and their possible consequences, including chance event outcomes, resource costs, and
utility. It is one way to display an algorithm that only contains conditional control statements.
75. Cause and effect analysis​ - helps in understanding the ‘cause and effect’ relationship for
solving a problem. It is a very helpful tool as it gives a pictorial representation of what is the
cause of a problem or a phenomenon, what factors have a high/low impact to those
problem/phenomena and how can the situation be resolved.
76. Business impact analysis (BIA)​ - is the formal method for determining how a disruption
to the IT system(s) of an organization will impact the organization’s requirements,
processes, and interdependencies with respect to the business mission.
78. SWOT analysis​ - SWOT (strengths, weaknesses, opportunities, and threats) analysis is a
framework used to evaluate a company's competitive position and to develop strategic
planning. SWOT analysis assesses internal and external factors, as well as current and
future potential.
79. BCG matrix​ - is a corporate planning tool, which is used to portray a firm’s brand portfolio
or SBUs on a quadrant along relative market share axis (horizontal axis) and speed of
market growth (vertical axis) axis.
80. Expected monetary value (EMV)​ - is a risk management technique to help quantify and
compare risks in many aspects of the project. EMV is a quantitative risk analysis technique
since it relies on specific numbers and quantities to perform the calculations, rather than
high-level approximations like high, medium and low.
81. Root cause analysis​ - attempts to determine the underlying weakness or vulnerability that
allowed the incident to be realized.
82. Maximum tolerable downtime (MTD)​ - describes the total time a system can be
inoperable before an organization is severely impacted.
83. Recovery time objective (RTO)​ - describes the maximum time allowed to recover
business or IT systems.
84. Recovery point objective (RPO)​ - is the amount of data loss or system inaccessibility
(measured in time) that an organization can withstand.
85. Threat modeling​ - a way of prioritizing threats to an application.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
85
ENROLL THIS COURSE
86. STRIDE​ - is often used in relation to assessing threats against applications or operating
systems. STRIDE is an acronym standing for the following: Spoofing, Tampering,
Repudiation, Information disclosure, Denial of service, and Elevation of privilege.
87. Gap analysis​ - is a method of assessing the differences in performance between a
business' information systems or software applications to determine whether business
requirements are being met and, if not, what steps should be taken to ensure they are met
successful.
88. Capability Maturity Model Integration (CMMI)​ - is a proven set of global best practices
that drives business performance through building and benchmarking key capabilities.
89. Delphi Technique ​ - is a forecasting process framework based on the results of multiple
rounds of questionnaires sent to a panel of experts.
90. Probability-impact matrix​ - a two-dimensional framework for determining the significance
of a risk based on both probability and impact.
91. Cost-benefit analysis​ - is a process businesses use to analyze decisions. The business
or analyst sums the benefits of a situation or action and then subtracts the costs associated
with taking that action.
92. Asset value (AV)​ - is the value of the asset you are trying to protect.
93. Exposure factor (EF)​ - is the percentage of value an asset lost due to an incident.
94. Single loss expectancy (SLE)​ - is the cost of a single loss.
95. Annual rate of occurrence (ARO)​ - is the number of losses you suffer per year.
96. Annualized loss expectancy (ALE)​ - is your yearly cost due to a risk.
97. Total cost of ownership (TCO)​ - is the total cost of a mitigating safeguard.
98. Return on investment (ROI)​ - is the amount of money saved by implementing a
safeguard.
99. Risk acceptance​ - some risks may be accepted: in some cases, it is cheaper to leave an
asset unprotected due to a specific risk rather than make the effort (and spend the money)
required to protect it.
100. Risk mitigation ​- mitigating the risk means lowering the risk to an acceptable level.
101. Risk transference​ - is sometimes referred to as the “insurance model.”
102. Risk avoidance ​- if the risk analysis discovers high or extreme risks that cannot be easily
mitigated, avoiding the risk (and the project) may be the best option.
103. ISO/IEC 27001 ​- is the international standard that describes best practice for an ISMS
(information security management system).
104. ISO/IEC 27002​ - is the international standard that outlines best practices for implementing
information security controls.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
86
ENROLL THIS COURSE
105. COBIT ​- Control Objectives for Information and related Technology is a control framework
for employing information security governance best practices within an organization. COBIT
was developed by ISACA.
106. Vulnerability management ​- management of vulnerability information.
107. Certification ​- a detailed inspection that verifies whether a system meets the documented
security requirements.
108. Accreditation​ - the data owner’s acceptance of the risk represented by a system.
109. Packet filter​ - each filtering decision must be made on the basis of a single packet. There
is no way to refer to past packets to make current decisions.
110. Stateful firewalls​ - have a state table that allows the firewall to compare current packets
to previous ones.
111. Proxy firewalls​ - act as intermediary servers. Proxies terminate connections.
112. Application-layer proxy firewalls ​- operate up to layer 7 of the OSI model.
Application-layer proxies can make filtering decisions based on application-layer data, such
as HTTP traffic, in addition to layers 3 and 4.
113. Wired Equivalent Privacy (WEP) ​- an early attempt to provide 802.11 wireless security.
WEP has been proved to be critically weak: new attacks can break any WEP key in minutes.
114. Wi-Fi Protected Access 2 (WPA2) ​- a full implementation of 802.11i. By default, WPA2
uses AES encryption to provide confidentiality, and CCMP (Counter Mode BC MAC
Protocol) to create a Message Integrity Check (MIC).
115. 802.1X​ - Port-based Network Access COntrol, layer 2 authentication.
116. RADIUS ​- Remote Authentication Dial In User Service protocol is a third-party
authentication system.
117. DNS ​- Domain Name System, a distributed global hierarchical database that translated
names to IP addresses, and vice versa.
118. DHCP ​- Dynamic Host Configuration Protocol, assigns temporary IP address leases to
systems, as well as DNS and default gateway configuration.
119. LDAP​ - Lightweight Directory Access Protocol, open protocol for interfacing and querying
directory service information provided by network operating systems. Uses port 389 via TCP
or UDP.
120. Pharming ​- when an attacker redirects one website’s traffic to another bogus and possibly
malicious website by modifying a DNS server or hosts file.
121. Cache poisoning​ - The impact of a maliciously constructed response can be magnified if
it is cached either by a web cache used by multiple users or even the browser cache of a
single user. If a response is cached in a shared web cache, such as those commonly found
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
87
ENROLL THIS COURSE
in proxy servers, then all users of that cache will continue to receive the malicious content
until the cache entry is purged.
122. Network access control (NAC)​ - is a concept of controlling access to an environment
through strict adherence to and implementation of security policy.
123. System hardening​ - is a collection of tools, techniques, and best practices to reduce
vulnerability in technology applications, systems, infrastructure, firmware, and other areas.
124. Non-repudiation​ - means a user cannot deny (repudiate) having performed a transaction.
125. TLS​ - Transport Layer Security, the successor to SSL.
126. IPsec​ - Internet Protocol Security, a suite of protocols that provide a cryptographic layer to
both IPv4 and IPv6.
127. Administrative controls​ - implemented by creating and following organizational policy,
procedure, or regulation.
128. Technical controls​ - are implemented using software, hardware, or firmware that restricts
logical access on an information technology system.
129. Physical controls ​- are implemented with physical devices, such as locks, fences, gates,
security guards, etc.
130. Preventive controls ​- prevent actions from occurring. It applies restrictions to what a
potential user, either authorized or unauthorized, can do.
131. Detective controls ​- are controls that alert during or after a successful attack.
132. Corrective controls ​- work by “correcting” a damaged system or process.
133. Recovery controls ​- after a security incident has occurred, recovery controls may need to
be taken in order to restore functionality of the system and organization.
134. Deterrent controls​ - deter users from performing actions on a system.
135. Compensating controls​ - are additional security controls put in place to compensate for
weaknesses in other controls.
136. Request for quote (RFQ) ​- is a solicitation for goods or services in which a company asks
suppliers to submit a price quote and bid on the chance to fulfill certain tasks or projects. An
RFQ, also known as an invitation for bid (IFB), is usually the first step in submitting a request
for proposal (RFP).
137.​ ​Request for proposal (RFP)​ - is a project funding announcement posted by a business or
organization for which companies can place bids to complete the project.
138. Memorandum of agreement (MOA)​ - also known as a memorandum of understanding, is
a formal business document used to outline an agreement made between two separate
entities, groups or individuals.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
88
ENROLL THIS COURSE
139. Organizational policy​ - focuses on issues relevant to every aspect of an organization.
140. Issue-specific policy​ - focuses on specific network service, department, function, or
other aspect that is distinct from the organization as a whole.
141. System-specific policy​ - focuses on individual systems or types of systems and
prescribes approved hardware and software, outlines methods for locking down a system,
and even mandates firewall or other specific security controls.
142. Security policy​ - is a document that defines the scope of security needed by the
organization and discusses the assets that require protection and the extent to which
security solutions should go to provide the necessary protection.
143. Standards​ - define compulsory requirements for the homogenous use of hardware,
software, technology, and security controls.
144. Baseline ​- defines a minimum level of security that every system throughout the
organization must meet.
145. Guideline ​- offers recommendations on how standards and baselines are implemented
and serves as an operational guide or both security professionals and users.
146. Procedures​ - is a detailed, step-by-step how-to document that describes the exact actions
necessary to implement a specific security mechanism, control, or solution.
147. TCSEC ​- Trusted Computer System Evaluation Criteria, created in the 1980s as the
Department of Defense (DoD) worked to develop and impose security standards for the
systems it purchased and used.
148. ITSEC ​- Information Technology Security Evaluation Criteria, a European model
developed in 1990 and used through 1998.
149. Common Criteria ​- represents a more or less global effort that involves everybody who
worked on TCSEC and ITSEC as well as other global players. The Common Criteria defines
various levels of testing and confirmation of systems’ security capabilities, and the number
of the level indicates what kind of testing and confirmation has been performed.
150. Target of evaluation (TOE)​ - any system being evaluated.
151. Protection profiles (PPs)​ - specify for a product that is to be evaluated (the TOE) the
security requirements and protections, which are considered the security desires or the “I
want” from a customer.
152. Security targets​ ​(STs)​ - specify the claims of security from the vendor that are built into a
TOE.
153. Evaluation assurance level (EAL)​ - provide a method for comparing vendor systems that
is more standardized.
Brought to you by:
Develop your team with the ​fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
89
ENROLL THIS COURSE
154. Security event and incident management (SEIM)​ - is the process of identifying,
monitoring, recording and analyzing security events or incidents within a real-time IT
environment. It provides a comprehensive and centralized view of the security scenario of
an IT infrastructure.
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
90
ENROLL THIS COURSE
References
Trust In, and Value From, Information Systems. (n.d.). Retrieved from
https://www.isaca.org/Pages/default.aspx
Prowse, D. (2015). CompTIA Security SY0-401 Academic Edition. Indianapolis, IN: Pearson.
Conrad, E., Misenar, S., & Feldman, J. (n.d.). CISSP Study Guide Third Edition.
Chapple, M., Stewart, J. M., & D. G. (n.d.). CISSP Official Study Guide Eighth Edition.
Indianapolis, IN: John Wiley & Sons.
What is Risk Governance? (n.d.). Retrieved from
https://irgc.org/risk-governance/what-is-risk-governance/
Joint Task Force Transformation Initiative. (2018). Guide for Applying the Risk Management
Framework to Federal Information Systems: A Security Life Cycle Approach (No. NIST
Special Publication (SP) 800-37 Rev. 2). National Institute of Standards and Technology.
A Guide to the Project Management Body of Knowledge (PMBOK® Guide) — Fifth Edition
ISO/IEC TR 38502:2017 - Information technology — Governance of IT — Framework and
model
ISO/IEC 16085:2006 - Systems and software engineering — Life cycle processes — Risk
management
Bugajenko, O. (n.d.). Risk Capacity vs. Risk Appetite. Retrieved from
https://study.com/academy/lesson/risk-capacity-vs-risk-appetite.html
ISO/IEC 27039:2015 - Information technology — Security techniques — Selection, deployment
and operations of intrusion detection and prevention systems (IDPS)
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
91
ENROLL THIS COURSE
What is systemic risk? - Definition from WhatIs.com. (n.d.). Retrieved from
https://searchcompliance.techtarget.com/definition/systemic-risk
What is user account provisioning? - Definition from WhatIs.com. (n.d.). Retrieved from
https://searchsecurity.techtarget.com/definition/user-account-provisioning
The Risk IT Framework . (n.d.). Retrieved from
http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/The-Risk-IT
-Framework.aspx
Joint Task Force Transformation Initiative. (2011). Managing Information Security Risk:
Organization, Mission, and Information System View (SP) 800-39 Rev. 1). National Institute
of Standards and Technology.
Gibson, D. (2012). SSCP systems security certified practitioner: Exam guide. New York:
McGraw-Hill Education.
Joint Task Force Transformation Initiative. (2012). Guide for conducting risk assessments (No.
NIST Special Publication (SP) 800-30 Rev. 1). National Institute of Standards and
Technology.
What is key risk indicator (KRI)? - Definition from WhatIs.com. (n.d.). Retrieved from
https://searchcio.techtarget.com/definition/key-risk-indicator-KRI
What is key performance indicators (KPIs)? - Definition from WhatIs.com. (n.d.). Retrieved from
https://searchbusinessanalytics.techtarget.com/definition/key-performance-indicators-KPIs
RACI Charts. (n.d.). Retrieved from https://racichart.org/the-raci-model/
Risk culture. (n.d.). Retrieved from
https://www.theirm.org/knowledge-and-resources/thought-leadership/risk-culture.aspx
Risk Impact Assessment and Prioritization. (2015, April 10). Retrieved from
https://www.mitre.org/publications/systems-engineering-guide/acquisition-systems-engineeri
ng/risk-management/risk-impact-assessment-and-prioritization
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
92
ENROLL THIS COURSE
Ray, S., & Ray, S. (2019, June 21). Guide to Using a Risk Register (Example Included).
Retrieved from https://www.projectmanager.com/blog/guide-using-risk-register
Swanson, M. (2011). Contingency planning guide for federal information systems (Vol. 800).
DIANE Publishing.
What is Data Validation: Definition. (n.d.). Retrieved from
https://www.informatica.com/services-and-training/glossary-of-terms/data-validation-definitio
n.html
Krutz, R. L., & Vines, R. D. (2007). The CISSP and CAP prep guide. Indianapolis, IN: Wiley.
The history of bowtie. (n.d.). Retrieved from
https://www.cgerisk.com/knowledgebase/The_history_of_bowtie
Brid, R. (2018, October 26). Decision Trees - A simple way to visualize a decision. Retrieved
from
https://medium.com/greyatom/decision-trees-a-simple-way-to-visualize-a-decision-dc506a40
3aeb
What is Ishikawa?: The Fishbone Diagram: Ishikawa Diagram. (2018, November 26). Retrieved
from https://www.6sigma.us/etc/what-is-ishikawa-fishbone-diagram/
Grant, M. (2019, July 11). How SWOT (Strength, Weakness, Opportunity, and Threat) Analysis
Works. Retrieved from https://www.investopedia.com/terms/s/swot.asp
Jurevicius, O. (2013, May 01). How to Focus on the Stars with a Clever BCG Matrix. Retrieved
from https://www.strategicmanagementinsight.com/tools/bcg-matrix-growth-share.html
Use Expected Monetary Value (EMV) to Determine Risk Impact. (n.d.). Retrieved from
https://tenstep.com/use-expected-monetary-value-emv-to-determine-risk-impact/
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
93
ENROLL THIS COURSE
What is gap analysis? - Definition from WhatIs.com. (n.d.). Retrieved from https://searchcio.tec
htarget.com/definition/gap-analysis
CMMI Institute. (n.d.). Retrieved from https://cmmiinstitute.com/cmmi/intro
Twin, A. (2019, June 25). How the Delphi Method Works. Retrieved from
https://www.investopedia.com/terms/d/delphi-method.asp
Assessing Risk Probability: Impact Alternative Approaches. (n.d.). Retrieved from
https://www.pmi.org/learning/library/assessing-risk-probability-impact-alternative-approaches
-8444
Kenton, W. (2019, June 23). How Cost-Benefit Analysis Process Is Performed. Retrieved from
https://www.investopedia.com/terms/c/cost-bemnefitanalysis.asp
ISO 27001, the international information security standard. (n.d.). Retrieved from
https://www.itgovernanceusa.com/iso27001
ISO 27002. (n.d.). Retrieved from https://www.itgovernanceusa.com/iso27002
Cache Poisoning. (n.d.). Retrieved from https://www.owasp.org/index.php/Cache_Poisoning
What is Systems Hardening? (n.d.). Retrieved from
https://www.beyondtrust.com/resources/glossary/systems-hardening
Kenton, W. (2019, May 07). RFQ Revealed. Retrieved from
https://www.investopedia.com/terms/r/request-for-quote.asp
Kenton, W. (2019, April 15). How Requests for Proposal (RFP) Work. Retrieved from
https://www.investopedia.com/terms/r/request-for-proposal.asp
US Legal, Inc. (n.d.). Memorandum of Agreement Law and Legal Definition. Retrieved from
https://definitions.uslegal.com/m/memorandum-of-agreement/
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
94
ENROLL THIS COURSE
What is Security Incident and Event Management (SIEM)? - Definition from Techopedia. (n.d.).
Retrieved from
https://www.techopedia.com/definition/4097/security-incident-and-event-management-siem
Brought to you by:
Develop your team with the ​ fastest growing catalog​ in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
95
96
Download