Uploaded by Jon Doe

IS621 mod1

advertisement
Principles of Incident
Response and Disaster
Recovery, 3rd edition
Module 1: An Overview of Information
Security and Risk Management
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage.
All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website,
in whole or in part.
Module Objectives
By the end of this module, you should be able to:
1. Define and explain information security
2. Describe the role of information security policy in the organization
3. Identify and explain the basic concepts of risk management
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Introduction
According to the U.S. Federal Emergency Management Agency, between 40
and 60 percent of small businesses affected by a disaster either never reopen
or go out of business following the event.
According to the Syncsort State of Resilience Report, “Nearly half of
businesses experienced a failure requiring a high availability/disaster recovery
solution to resume operations. 35% lost a few minutes to an hour of data, 28%
lost a few hours and 31% lost a day or more.”
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Information Security
Information security, as defined by the Committee on National Security
Systems (CNSS), is the protection of information and its critical elements,
including the systems and hardware that use, store, and transmit that
information.
Confidentiality is the protection of information from disclosure or exposure to
unauthorized individuals or systems.
Integrity is the prevention of the corruption of information while it is being stored
or transmitted.
Availability describes how data is accessible and correctly formatted for use
without interference or obstruction.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
The CNSS Security Model
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
What is Information Security?
Information security (InfoSec) is the protection of the confidentiality, integrity,
and availability of information assets, whether in storage, processing, or
transmission, via the application of policy, education, training and awareness,
and technology.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Key Information Security Concepts (1 of 2)
In general, a threat is any event or circumstance that has the potential to
adversely affect operations and assets. The term “threat source” is commonly
used interchangeably with the more generic term “threat.”
An asset is the organizational resource that is being protected. An asset can be
logical, such as a Web site, software information, or data. An asset can also be
physical, such as a person, a computer system, hardware, or other tangible
objects.
A vulnerability is a potential weakness in an asset or its defensive control
system(s).
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Key Information Security Concepts (2 of 2)
An exploit is a technique used to compromise a system. There are two
common uses of the term in security.
• Threat agents may attempt to exploit a system or information asset by
using it illegally for their personal gains.
• An exploit can be a documented process to take advantage of a
vulnerability or exposure, usually in software, that is either inherent in the
software or created by the attacker.
An attack is an intentional or unintentional act that can damage or otherwise
compromise information and the systems that support it.
Defenders try to prevent attacks by applying controls, safeguards, or
countermeasures.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Key Concepts in InfoSec
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Threats to Information Security
Category of Threat
Compromises to intellectual property
Deviations in quality of service
Espionage or trespass
Forces of nature
Human error or failure
Information extortion
Sabotage or vandalism
Software attacks
Technical hardware failures or errors
Technical software failures or errors
Technological obsolescence
Theft
Attack Examples
Piracy, copyright infringement
Internet service provider (ISP), power, or
WAN service problems
Unauthorized access and/or data
collection
Fire, floods, earthquakes, lightning
Accidents, employee mistakes
Blackmail, information disclosure
Destruction of systems or information
Viruses, worms, macros, denial of service
Equipment failure
Bugs, code problems, unknown loopholes
Antiquated or outdated technologies
Illegal confiscation of equipment or
information
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
The Role of InfoSec Policy
in Developing Contingency Plans (CP) (1 of 2)
Much of what must be done in CP should be guided by, and reinforce,
organizational InfoSec policies.
Policy represents a formal statement of the organization’s managerial
philosophy—in the case of InfoSec policies, the organization’s InfoSec
philosophy.
Standards are more detailed statements of what must be done to comply with
policy.
Practices, procedures, and guidelines effectively explain how to comply with
policy.
Policies define what you must do and not do, whereas the other documents
focus on the “how.”
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
The Role of InfoSec Policy
in Developing Contingency Plans (2 of 2)
To produce a complete InfoSec policy portfolio, management should define and
implement three types of InfoSec policies:
• Enterprise information security policy (EISP)
• Issue-specific security policies (ISSP)
• Systems-specific security policies (SysSP)
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Policies, Standards, and Practices
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Enterprise Information Security Policy
An enterprise information security policy (EISP) is also known as a general
security policy, IT security policy, or information security policy.
The EISP is directly supportive of the mission, vision, and direction of the
organization and sets the strategic direction, scope, and tone for all security efforts.
The EISP guides the development, implementation, and management of the
security program.
The EISP also assigns responsibilities for the various areas of security.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Issue-Specific Security Policy
In general, the issue-specific security policy (ISSP) addresses specific areas of
technology and contains a statement about the organization’s position on a specific
issue.
There are a number of approaches to creating and managing ISSPs within an
organization:
• Independent ISSP documents, each tailored to a specific issue
• A single comprehensive ISSP document covering all issues
• A modular ISSP document that unifies policy creation and administration while
maintaining each specific issue’s requirements
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Elements of an Issue-Specific Security Policy
ISSPs vary from organization to organization, but in general, an effective ISSP
should contain the following elements:
• Statement of policy
• Authorized access and usage of technology
• Prohibited usage of technology
• Systems management
• Violations of policy
• Policy review and modification
• Limitations of liability
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Systems-Specific Policy
Systems-specific security policies (SysSPs) are frequently codified as standards
and procedures to be used when configuring or maintaining systems.
Systems-specific policies can be organized into two general groups:
• Managerial guidance SysSP—Created by management to guide the
implementation and configuration of technology
• Technical specification SysSP—Created by systems administration to
implement the managerial policy
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Guidelines for Effective Policy Development and
Implementation
For policies to be effective and legally defensible, they must be properly:
1.
Developed using industry-accepted practices, and formally approved by
management (Development)
2.
Distributed using all appropriate methods (Distribution)
3.
Read by all employees (Reading)
4.
Understood by all employees (Comprehension)
5.
Formally agreed to by act or affirmation (Compliance)
6.
Uniformly applied and enforced (Enforcement)
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Overview of Risk Management (1 of 2)
Contingency planning is usually considered to be part of the risk management
program process.
Risk management is the process of identifying vulnerabilities in an organization’s
information systems and taking carefully reasoned steps to ensure the
confidentiality, integrity, and availability of all the systems’ components.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Overview of Risk Management (2 of 2)
Risk management involves discovering and understanding answers to some key
questions with regard to the risk associated with an organization’s information
assets:
1.
Where and what is the risk (risk identification)?
2.
How severe is the current level of risk (risk analysis)?
3.
Is the current level of risk acceptable (risk evaluation)?
4.
What do I need to do to bring the risk to an acceptable level (risk treatment)?
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Components of Risk Management
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Sun Tzu
“If you know the enemy and know yourself, you need not fear the result of a
hundred battles. If you know yourself but not the enemy, for every victory gained
you will also suffer a defeat. If you know neither the enemy nor yourself, you will
succumb in every battle.”
Know Yourself
• Identify, examine, and understand the information and systems currently in
place within your organization.
Know The Enemy
• Identify, examine, and understand the threats facing the organization.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
RM Framework (1 of 2)
The RM framework is the overall structure of the strategic planning and design for
the entirety of the organization’s RM efforts.
The RM process is the identification, analysis, evaluation, and treatment of risk to
information assets, as specified in the RM framework.
In other words, the RM framework (planning) guides the RM process (doing), which
conducts the processes of risk assessment and risk treatment.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
RM Framework (2 of 2)
The RM framework consists of five key stages:
1.
Executive governance and support
2.
Framework design
3.
Framework implementation
4.
Framework monitoring and review
5.
Continuous improvement
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
RM Process
During the implementation phase of the RM framework, the RM plan guides the
implementation of the RM process, in which risk evaluation and remediation of key
assets are conducted.
The process includes the following tasks:
• Establishing the context
• Identifying risk
• Analyzing risk
• Evaluating risk to the organization’s key assets and comparing identified
uncontrolled risks against its risk appetite
• Treating the unacceptable risk
• Summarizing the findings
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Information Assets and Media
In the most general sense, an information asset is any asset that collects, stores,
processes, or transmits information, or any collection, set, or database of
information that is of value to the organization.
Some commercial RM applications separate information assets from media—
which in this context include hardware, integral operating systems, and utilities that
collect, store, process, and transmit information, leaving only the data and
applications designed to directly interface with the data as information assets for
the purposes of RM.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Classifying and Categorizing Information Assets
After the initial inventory is assembled, you must determine whether its asset
categories are meaningful to the organization’s risk management program.
The inventory should also reflect the sensitivity and security priority assigned to
each information asset.
A data classification scheme should be developed or reviewed to categorize these
information assets based on their sensitivity and security needs. For example:
• Confidential
• Internal
• Public
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Assessing Value in Information Assets
As each information asset is assigned to its proper category, posing the following
basic questions can help you develop the weighting criteria to be used for
information asset valuation or impact evaluation.
• Which information asset is most critical to the success of the organization?
• Which information asset generates the most revenue?
• Which information asset generates the highest profitability?
• Which information asset is the most expensive to replace?
• Which information asset is the most expensive to protect?
• Which information asset’s loss or compromise would be the most
embarrassing or cause the greatest liability?
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Weighted Factor Analysis Worksheet
Information Asset
Criterion 1:
Impact on
Revenue
Criterion 2:
Impact on
Profitability
Criterion 3: Weighted
Impact on
Score
Public
Image
30
100
Criterion weight (1–100); 30
40
must total 100
EDI Document Set 1—
0.8
0.9
0.5
75
Logistics bill of lading to
outsourcer (outbound)
EDI Document Set 2—
0.8
0.9
0.6
78
Supplier orders (outbound)
EDI Document Set 2—
0.4
0.5
0.3
41
Supplier fulfillment advice
(inbound)
Customer order via SSL
1
1
1
100
(inbound)
Customer service request
0.4
0.4
0.9
55
via e-mail (inbound)
Note: In the table, EDI = Electronic Data Interchange and SSL = Secure Sockets Layer.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Threat Assessment (1 of 2)
Armed with a properly classified inventory, you can assess potential weaknesses in
each information asset—a process known as threat assessment.
If you assume that every threat can and will attack every information asset, then
the project scope becomes too complex.
To make the process less unwieldy, each step in the threat identification and
vulnerability identification processes is managed separately and then coordinated
at the end.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Threat Assessment (2 of 2)
Answering the following questions can help you understand the various threats the
organization faces and their potential effects on an information asset:
• Which threats represent an actual danger to our information assets?
• Which threats are internal and which are external?
• Which threats have the highest probability of occurrence?
• Which threats have the highest probability of success?
• Which threats could result in the greatest loss if successful?
• Which threats is the organization least prepared to handle?
• Which threats cost the most to protect against?
• Which threats cost the most to recover from?
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Vulnerability Assessment
After the organization has identified and prioritized both its information assets and
the threats facing those assets, it can begin to compare information assets to
threats.
This review leads to the creation of a list of vulnerabilities that remain potential
risks to the organization.
This list is usually long and shows all the vulnerabilities of the information asset.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
The TVA Worksheet
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Assessment: Risk Analysis
Assessing the relative risk for each vulnerability is accomplished via a process
called risk analysis, which assigns a risk rating or score to each specific
vulnerability.
You can use the simple and popular risk model known as the Risk Management
Framework, which was developed and promoted by NIST, to evaluate the risk for
each information asset.
The model calculates the relative risk for each vulnerability based on existing
controls, and calculates the likelihood and impact of a threat event.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Likelihood
The likelihood of occurrence is a weighted risk factor based on an analysis of
the probability that a given threat is capable of exploiting a given vulnerability (or
set of vulnerabilities). (NIST)
Rank Description
Percent Likelihood
Example
0
Not Applicable 0% likely in the next 12 months Will never happen
1
Rare
5% likely in the next 12 months May happen once
every 20 years
2
Unlikely
25% likely in the next 12
May happen once
months
every 10 years
3
Moderate
50% likely in the next 12
May happen once
months
every 5 years
4
Likely
75% likely in the next 12
May happen once
months
every year
5
Almost Certain 100% likely in the next 12
May happen multiple
months
times a year
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Impact
The level of impact from a threat event is the magnitude of harm that can be expected
to result from the consequences of unauthorized disclosure, modification, or destruction
of information, or loss of information or information system availability. (NIST)
Rank Description
0
1
2
3
Example
Not applicable No impact
threat
Insignificant
No interruption, no
exposed data
Minor
Multi-minute interruption,
no exposed data
Moderate
Multi-hour interruption,
minor exposure of data
4
Major
5
Severe
One-day interruption,
exposure of data
Multi-day interruption,
major exposure of
sensitive data
Number of Productivity
Records
Hours Lost
N/A
N/A
Financial
Impact
N/A
0
0
0
0
2
$20,000
499
4
$175,000
5,000
8
$2,000,000
50,000
24
$20,000,000
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Determination (1 of 2)
For the purpose of relative risk assessment, risk equals likelihood times impact.
Asset
Vulnerability
Likelihood
Impact
Customer service
request via e-mail
(inbound)
Customer service
request via e-mail
(inbound)
Customer order
via SSL (inbound)
Customer order
via SSL (inbound)
E-mail disruption due to
hardware failure
3
3
Risk-Rating
Factor
9
E-mail disruption due to
software failure
4
3
12
Lost orders due to Web
server hardware failure
Lost orders due to Web
server or ISP service
failure
E-mail disruption due to
SMTP mail relay attack
2
5
10
4
5
20
1
3
3
Customer service
request via e-mail
(inbound)
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Determination (2 of 2)
(Table continues)
Asset
Vulnerability
Likelihood Impact
Customer service
request via e-mail
(inbound)
Customer service
request via e-mail
(inbound)
Customer order via
SSL (inbound)
E-mail disruption due to
ISP service failure
2
3
Risk-Rating
Factor
6
E-mail disruption due to
power failure
3
3
9
Lost orders due to Web
server denial-of-service
attack
Lost orders due to Web
server software failure
Lost orders due to Web
server buffer overrun
attack
1
5
5
2
5
10
1
5
5
Customer order via
SSL (inbound)
Customer order via
SSL (inbound)
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Evaluation
After the risk ratings are calculated for all TVA triples, the organization needs to
decide whether it can live with the analyzed level of risk—in other words, the
organization must determine its risk appetite. This is the risk evaluation stage.
For some organizations, a level of “10” is acceptable. For others, it may be too high
(or too low).
This value is used by the RM team to filter TVAs that do not exceed the value,
allowing the process team to focus its efforts on TVAs that do exceed the value.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Treatment/Risk Control Strategies (1 of 2)
Risk treatment, also known as risk control, is the process of doing something
about risk after the organization has identified risk, assessed it, evaluated it, and
then determined that the current level of remaining risk—the residual risk—is
unacceptable.
As risk treatment begins, the organization has a list of information assets with
currently unacceptable levels of risk; the appropriate strategy must be selected and
then applied for each asset.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Treatment/Risk Control Strategies (2 of 2)
The risk treatment strategies are as follows:
• Defense—Applying controls and safeguards that eliminate or reduce the
remaining uncontrolled risk
• Transference—Shifting risks to other areas or to outside entities
• Mitigation—Reducing the impact to information assets should an attacker
successfully exploit a vulnerability
• Acceptance—Understanding the consequences of choosing to leave an
information asset’s vulnerability facing the current level of risk, but only after a
formal evaluation and intentional acknowledgment of this decision
• Termination—Removing or discontinuing the information asset from the
organization’s operating environment
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Risk Treatment Cycle
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Managing Risk
Here are some rules of thumb for selecting a strategy:
• When a vulnerability exists in an important asset—Implement security controls
to reduce the likelihood of a vulnerability being exploited.
• When a vulnerability can be exploited—Apply layered protections,
architectural designs, and administrative controls to minimize the risk or
prevent the occurrence of an attack.
• When the attacker’s potential gain is greater than the costs of attack—Apply
protections to increase the attacker’s cost or reduce the attacker’s gain using
technical or managerial controls.
• When the potential loss is substantial—Apply design principles, architectural
designs, and technical and nontechnical protections to limit the extent of the
attack, thereby reducing the potential for loss.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Summary (1 of 3)
Now that the lesson has ended, you should have learned:
• Achieving an appropriate level of security for an organization depends on the
implementation of a multilayered system that works to protect information
assets from harm, unwanted access, and modification.
• Information assets have the characteristics of confidentiality when only the
people or computer systems with the rights and privileges to access the
assets are able to do so.
• Organizations face 12 general categories of threats that represent a clear
and present danger to an organization’s people, information, and systems.
• Policy represents a formal statement of the organization’s managerial
philosophy—in the case of information security policies, the organization’s
InfoSec philosophy.
• After policies are designed, created, approved, and implemented, the
technologies and procedures that are necessary to accomplish them can be
designed, developed, and implemented.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Summary (2 of 3)
• An enterprise information security policy (EISP) is a policy based on and
directly supportive of the mission, vision, and direction of the organization,
and it sets the strategic direction, scope, and tone for all security efforts.
• Issue-specific security policy (ISSP) addresses specific areas of technology
and contains a statement about the organization’s position on a specific
issue.
• One part of information security is risk management, which is the process of
identifying and controlling the risks to an organization’s information assets.
• You must identify, examine, and understand the information and systems
currently in place within your organization.
• Risk management is a complex operation that requires a formal
methodology. The RM framework is the overall structure of the strategic
planning and design for the entirety of the organization’s RM efforts, which
includes the processes of risk assessment and risk treatment.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Summary (3 of 3)
• The organization must understand its current levels of risk and determine
what, if anything, it needs to do to bring them down to an acceptable level in
alignment with the risk appetite specified earlier in the process.
• During the implementation phase of the RM framework, risk evaluation and
remediation of key assets are conducted. The process includes establishing
the context, identifying risk, and summarizing the findings.
• When an organization’s general management team determines that risks
from InfoSec threats need attention, it authorizes treatment of those risks
using one of five basic strategies: defense, transference, mitigation,
acceptance, or termination.
Whitman & Mattord, Principles of Incident Response and Disaster Recovery, 3rd Edition. © 2022 Cengage. All
Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole
or in part.
Download