Tutorial 4SD3043TutorsAnswers

advertisement
Tutorial and Lab 4 – SD3043
Risk management - security
1.
What is risk management?
Answer: Risk management is the process of discovering and assessing the risks to an
organization's operations and determining how those risks can be controlled or mitigated.
2.
List and describe the key areas of concern for risk management.
Answer: Risk identification, risk assessment, and risk control.
3.
Which community of interest usually provides the resources used when
undertaking information asset risk management?
Answer: The resources used when undertaking information asset risk management is usually
provided by all three communities: Information Security, Information Technology and
General Management.
4.
In risk management strategies, why must periodic review be a part of the
process?
Answer: Periodic reviews must be a part of the risk management strategies because threats are
constantly changing for a company. Also once any specific vulnerability is completely
managed by an existing control it no longer needs to be considered for additional controls.
5.
Why do networking components need more examination from an information
security perspective than from a systems development perspective?
Answer: Networking components need more examination from an information security
perspective than from a systems development perspective because networking subsystems are
often the focal point of attacks against the system.
6.
What value would an automated asset inventory system have for the risk
identification process?
Answer: An automated asset inventory system would be valuable to the risk identification
process because all hardware components are already identified – models, make and locations
– thus management can review for the most critical items and assess the values.
7.
How many categories should a data classification scheme include? Why?
Answer: An organization would need as many categories as necessary to include all of it’s
need to treat different groupings with the needed differing levels of care. The text uses four
categories as a good place to begin: Public, For official use only, Sensitive, and Classified.
8.
What are vulnerabilities?
Answer: Vulnerabilities are opportunities for a threat to become a real issue or problem.
9.
Describe the TVA (Threat Vulnerability Assets) worksheet. What is it used for?
Answer: A worksheet that combines a prioritized list of assets and their vulnerabilities and a
list prioritizing threats facing the organization. The resulting grid provides a convenient
method of examining the “exposure” of assets, allowing a simplistic vulnerability assessment.
10.
What are the four risk control strategies? Describe each control strategy.
Answer: Avoidance, Transference, Mitigation, and Acceptance. (see lecture slides)
11.
Describe how outsourcing can be used for risk transference.
Answer: Outsourcing can be used for risk transference when an organization chooses to hire
an ISP or a consulting organization to provide products and services for them like buying and
configuring servers, hiring their own webmasters, web system administrators and even
specialized security experts. This allows the organization to transfer risk associated with
management of these complex systems to another organization that has experience in dealing
with those risks. Benefit of outsourcing is that the provider is responsible for disaster recovery
and through service level arrangements is responsible for guarantying server and website
availability.
12.
What conditions must be met to ensure that risk acceptance has been used
properly?
Answer: The following conditions must be met to ensure that risk acceptance has been used
properly: the level of risk posed to the asset has been determined, the probability of attack and
the likelihood of a successful exploitation of a vulnerability has been assessed, the annual rate
of occurrence of such an attack has been approximated, the potential loss that could result
from attacks has been estimated, a thorough cost-benefit analysis has been performed, controls
using each appropriate type of feasibility have been evaluated, it has been decided that the
particular function, service, information, or asset did not justify the cost of protection.
13.
What is a cost-benefit analysis?
Answer: A cost benefit analysis is an evaluation of the worth of the information assets to be
protected and the loss in value if those information assets became compromised by the
exploitation of a specific vulnerability.
14.
What is the difference between benchmarking and baselining? What is the
difference between due diligence and due care?
Answer: Benchmarking is the process of comparing yourself versus other companies seeking
the same results; base lining is the process of standardizing yourself with your own results.
Due Diligence and Due Care occur when an organization adopt a certain minimum level of
security.
Independent Lab Exercises
1.
Using the Web, search for at least three tools to automate risk assessment.
Collect information on automated risk assessment tools. What do they cost?
What features do they provide? What are the advantages and disadvantages of
each one?
Answer: The solution to this exercise will be unique for each student and will vary over time.
2.
Read more details about the OCTAVE Method
www.cert.org/octave/omig.html
http://www.units.muohio.edu/mcs/information_security/Octave/vol1/whatisoct
.html
Write a short summary about this method.
Download