Risk Assessment-Security Plan

advertisement
BAA 607
MIS MBA
Risk Assessment
Terminology
Threat: Something that can occur and cause damage to a valuable asset.
Vulnerability: An exposure in the system that can lead to a threat becoming realized.
Vulnerability level: The probability of the treat occurring.
Risk: Cost that occurs when a threat successfully exploits a vulnerability.
Risk Assessment: The process of identifying an organization’s assets and determining to what
extent each asset is vulnerable. The vulnerability level of the asset to each threat is
approximated. The threat associated with each asset is identified and the risk (expected annual
loss) associated with the threat is approximated. The Risk Assessment is then used to determine
what resources should be allocated to protect specific assets from the specified risk.
Not all threats can be anticipated, but most businesses can identify some of the threats they
may face.
Not all vulnerabilities can be identified, but businesses can anticipate some of these.
Risk Assessment for information systems is very important. Business managers working with
information system specialists can try to determine the points of vulnerability and the
vulnerability level of an asset. For our case study, we will use the three levels of likelihood:
High, Medium and Low. These levels will replace actual probabilities of occurrence. If the
vulnerability level is High, we will use a probability = 1 (sure to occur). If the vulnerability
level is Medium, we will use a probability level = .5 (occurs 50% of the time). If the
vulnerability level is Low, we will use a probability level = .1 (occurs 10% of the time).
As an example of how the Risk Assessment is used, if a threat has a vulnerability level that is
low (likely to occur no more than once a year) with a risk of a $1,000 loss to the organization for
each occurrence, then it would not be wise to spend $20,000 to protect against that threat.
However, if that same threat could occur at least once a day, then the potential annual risk is
more than $300,000 a year. In this case, spending $100,000 to control this threat might be
entirely appropriate.
Consider an on-line process system that processes 30,000 orders per day. The table below
illustrates the results of a Risk Assessment done on this system. The likelihood of each threat
occurring over a one-year period is expressed as: High, Medium, or Low. The next column
shows the amount of loss that might occur each time the exposure occurs. The expected annual
loss is then determined by multiplying the Loss per event by the Likelihood of occurrence.
Risk Assessment for an Order Processing Information System
Threat
Vulnerability Level
Risk per Occurrance
Power Failure
Embezzlement
User Error
Medium = .5
Low = .1
High = 1
$100,000
$25,000
$20,000
Expected Annual
Risk
$50,000
$2,500
$20,000
In the case above, there should be some controls built in to minimize the risk of power failure
and user errors because the Expected Annual Risk is high for these areas.
Your job is to perform a Risk Assessment for our Smith Volunteer Clinic. You may consider all
assets of the clinic, but concentrate in particular on the Information System assets. A Risk
Assessment should be conducted on each information system that is part of the organization.
After the Risk Analysis is performed, you may use the results to establish additional Security
Policies for the clinic. As an example of a security policy, suppose that through the Risk
Assessment process, you discover a high risk of unauthorized access to the computers using the
EMR software. You may then want to establish some security policies to prevent this
occurrence:
1) A unique account and password combination must be used to authenticate all users of the
information system. The account name must be used only by a single individual and the
password must be a secret know only to that individual.
2) When an account is no longer needed, it must be disabled.
3) Requests for changes in access permissions must be approved by a manager.
4) Passwords must expire after a certain period (three months)
This is a group project. Time outside of class will need to be devoted to this project.
Note that a Risk Assessment and Security Plan for an information systems is conducted after the
information system has been designed and implemented. You may assume that this has occurred
for the Smith Volunteer Clinic. Use the information systems that you identified in your systems
analysis process. You should now know exactly what information systems the Smith Volunteer
Clinic will use. Be sure to consider the four areas of security that we discussed in Meeting #4:
Physical Security, Data Security, Network Security, and Computer Security.
Name your file: Risk Assessment-Security Plan.Group#. Place this file in your Group folder
under Homework#5.
Download