Risk Management Process An organisation always has some vulnerabilities. Because of this, there will always be a risk to the organisation. If these risks are ignored or remained unsolved, huge losses can be affected to the organisation. For this, there is a process known as Risk Management Process (The process of managing risks to organizational operations, organizational assets or individuals resulting from the operation of an information system.) The risk management system mainly involves five stages and those are as follows: 1. 2. 3. 4. 5. To establish the context. To assess the risk. To treat the risk. To communicate and consult from the experts. To monitor and review the risks. Elaboration of the Stages of Risk Management 1. To establish the context It is necessary to ensure an effective risk management process. The extent of the process should be decided with the organisational goal. Risk criteria must be consistent with risk management policy. When defining the risk criteria, the factors to be considered should include the nature and type of the consequences or causes which can occur. 2. To assess the risk Risk assessment is used for describing the overall process or steps where we can identify the risk, analyse it and evaluate it. In other words, it looks at the damages occurred to the system and shows how to control or eliminate such damages from occurring again. a) Risk Identification- To find, list and describe the risk. b) Risk Analysis- To understand the background of the risk and to describe the risk. c) Risk Evaluation- To compare the given risk with an approximated risk to evaluate the importance of the risk. 3. To treat the risk In this stage, the risk is treated by taking appropriate measures to see what changes made to reduce or eliminate it. It can include avoiding of the risk, transfer of the risk based on their impacts and probability, reduction of the risk or to accept risks which have very low impact and probability. 4. To communicate and consult In this stage, an individual or an organisation can communicate with the consultants so that they can share their ideas and views about a particular process and discuss about it. Companies and organises communicate with the experts to get updates about any misjudgement in the risk management process. 5. To monitor and review This is the last stage of the process. Monitoring and reviewing are similar things, but the in these two is that monitoring is the regular process of analysing while reviewing is done mainly at the end of the process or one process at a time. This process is mainly done to ensure that the risk management process is running smoothly. By keeping these stages in mind, a design for cyber security program can be implemented in an organisation or a company in following ways: Implementations to design a cyber security program in an organisation The reputation of the company is dependent on the security of the system. The first priority must be given to create a proper security plan for managing the risks and threats to the system. I will go through the company’s previous security systems and check what were the problems because of which, the security systems were a failure. After checking the previous security systems, I will check the current security system and see what are its vulnerabilities. I will also make certain policies and protocols for this system which must be followed by my colleagues and staff members. The ideas of my colleagues will also be taken in consideration which will help to improve the security system. Once I have considered all the threats and vulnerabilities that can affect the system, then I will look for best security solutions such as Antivirus, Software, Firewalls, Strong passwords, etc. Finally, I will keep reviewing the steps and measures frequently that I have taken for the system. These are my implementations for designing a cyber security program and with the help of this I can ensure the safety of the system and the organisation. Sr . N o Item Asset value of one item in (Rs) Numbe r of Servers Total Asset value 1 Servers 10,00,00 0 31 1,60,00,00 0 2 Operating System cost Applicatio n software Network devices Security devices Power generating equipment Non-IT assets (Like furniture, etc.) 10,00,00 0 1 10,00,000 1 in 40 28,571.43 15,00,00 0 - 3 45,00,000 0.2 9,00,000 - 20,00,000 0.2 4,00,000 - - 25,00,000 0.2 5,00,000 12,00,00 0 2 24,00,000 0.05 1,20,000 - - 5,00,000 0.05 25,000 3 4 5 6 7 Exposure factor (Probability of occurrence ) 1 in 35 SLE Rate of occurrenc e of faults AR O ALE 4,57,142.8 6 4 servers in three months Once in six months 1 4,57,142.8 6 2 57,142.86 Once a month Once every six months Twice a month Once a year 12 1,08,00,00 0 8,00,000 1 1,20,00,00 0 1,20,000 Once in five years 0.2 0 Total ALE Sr No. Recommendations 1 Reduce (Low Impact \ High Probability) 2 Reduce (Low Impact \ High Probability) 3 Avoid (High Impact \ High Probability) 4 Avoid (High Impact \ High Probability) 5 Avoid (High Impact \ High Probability) 6 Reduce (Low Impact \ High Probability) 7 Non-IT Asset 2 24 Rs.2,42,34,285.7 Apart from that, the data centre has to be protected against floods and theft. The flood can damage the entire data centre and theft can lead to losses of Rs.10,000. In Pune, the probability of flood is once in 50 years and that of theft is 0.001 Flood Theft SLE 4,39,00,000 10,00,000 ARO 0.02 0.001 ALE 8,78,000 1000 Total=8,79,000 Total ALE ALE due to flood and theft Grand theft 2,42,34,285.7 8,79,000 Rs. 2,51,14,286