Risk Management on IS P L Pradhan Abstract: Risk management is the process of identifying vulnerabilities and threats to an organization’s infor or IT infrastructures in achieving business objectives and deciding what counter measures, if any, reducing the level of countermeasures and deciding which, if any, to take in reducing risk to an ap acceptable level, based on the value of the information resource to the organization. A summary shown in the equation as follows: Total Risk = Threats x Vulnerability x Asset Value Generally, risk can be transferred, reject, reduced or accepted at high, medium and low Level Risk. • Security risks start when the power is turned-on. At that point, security risks commence. The o with those security risks is via risk management • Risks can be identified & reduced, but never eliminated • No matter how secure you make a system, it can always be broken into given sufficient resourc motivation and money • People are usually cheaper & easier to compromise than advance technological safeguards Risk Management Nomenclature • • • • • • • Annualized loss expectancy (ALE) – Single loss expectance x annualized rate of occurrence = ALE Annualized rate of occurrence (ARO) – On an annualized basis, the frequency with which a threat is expected to occur Exposure factor – A measure of the magnitude of loss or impact on the value of an asset Probability – Chance or likelihood, in a finite sample, that an event will occur or that a specific loss value should the event occur Threat – An event, the occurrence of which cold have an undesired impart Safeguard – Risk reducing measure that acts to detect, prevent or minimize loss associated with the occ specified threat or category of threats Vulnerability – The absence or weakness of a risk-reducing safeguard Risk Assessment • Since you can’t protect yourself if you do not know what you are protecting against, a risk asse performed • A risk assessment answers 3 fundamental questions: – Identify assets - What I am trying to protect? – Identify threats - What do I need to protect against? – Calculating risks - How much time, effort & money am I willing to expend to obtain adequa • After risks are determined, you can then develop the policies & procedures needed to reduce t Identifying Assets • Tangibles – – – – Computers, communications equipment, wiring Data Software Audit records, books, documents • Intangibles – Privacy – Employe safety & health – Passwords – Image & reputation – Availability --Employee morale Identifying Threats – – – – – – – – – – – Earthquake, flood, hurricane, lightening Structural failure, asbestos Utility loss, i.e., water, power, telecommunications Theft of hardware, software, data Terrorists, both political and information Software bugs, virii, malicious code, SPAM, mail bombs Strikes, labor & union problems Hackers, internal/external Inflammatory usenet, Internet & web postings Employee illness, death Outbreak, epidemic, pandemic Calculating (quantifying) Risks • This is the hard part. Insurance & historical records may help, but your actuary is your best frie – How much damage did Kevin Mitnick do? Estimates range from $500,000 to $120,000,000 • Review the risks – Lists should be regularly updated – Small changes in operations or corporate structure can have significant risk implications – Changes such as location, vendor, M&A, etc., must be included into the risk factor Cost/benefit Analysis • Cost of a loss – Often hard to determine accurately • Cost of prevention – Long term/short term • Adding up the numbers – Output of an Excel spreadsheet listing assets, risks & possible losses – For each loss, know its probability, predicted loss & amount of money needed to – defend against the loss Security Awareness • Must be driven from the top-down • Must be comprehensive, all the way down to the floppy & hard copies • Education – Hard copies – Web-based – Training & education Security Management Planning • But most importantly, to be successful in selling security you must know your company’s or clie • Know what is important – Each industry has differing priorities Security management planning I Identify costs – Initial investment – ongoing costs Identify benefits – Help Desk reduction – Common data locations – Reduced Remote Access costs – Improve Business Partner access – Enhanced public perception Ernst & Young Cyberprocess Certification Security management planning II Identify potential losses if security is not properly implemented – Trade secrets – confidential information – personal e-mail – adverse publicity – viruses, worms, malicious Java and ActiveX applications – denial of service – hard drive reformats, router reconfigurations – – – – M&A financials hacked web pages breach of Human Resources information Security management planning III Management Procrastination Four primary reasons why the decision maker typically procrastinates in deciding whether to alloc commence the initiative: • Unable to understand or quantify security threats and technical vulnerabilities. This results in b paralysis. • Unable to measure (through quantitative or qualitative analysis) the severity and probability of ri • Begins the analysis with a preconceived notion that the cost of controls will be excessive or the technology does not exist. • Believes that the security solution will interfere with the performance or appearance of the busin Benefits: Minimize the risk factor at minimum level. Therefore, we can able to safeguard or protect the IS infrastructure/assets ( Data, Hardware, So from intruder, hacker and external vendor or contractor. The risk management & assessment method to ensure and achieve protection, data integrity, ef efficiencies must be designed implement as per requirement of business objective of an organiz Conclusion: In summary, the risk assessment process is about making decisions. The impact of a successful level of acceptable risk for any given situation is a fundamental policy decision. Likewise, vuln design issues and must be addressed during the design, development & implementation of info A fundamental problem of risk management then is to achieve a cost-effective balance between characteristics and the related countermeasures to threats and impact. References: 1). Information System audit & control by Ron Weber PHI ( Chap 7 P- 243-285) 2) CISSP Exam study guide by Shon Harrish DRP/BCP (Chap 9 P 591-603 ) 3). CISSP Exam study guide by Shon Harrish Security Mgmt Practices (Chap 4 P 57-92 ) 4) Mcl.ean, Kevin & Lenwatts ( 1996) Risk Analysis Methodology “ IS audit & contron Journal I 5). Essentail of System Administration O’ Reilly (Chap 10, P467- 485) & Chap 6 ( p201-243 ) 6). CISSP Exam cram by Coriolis ( Chap 4 p 61-77 ) 7) Software Engg by Pressman Chap 6 ( P 145- 162 ) 8) ISACA Monthly Journal Vol 2, 2003 Author: P L Pradhan, M. Sc (Phys), DCA, PG DBA, Sun Solaris Certified (UNIX) plpradhan@rediffm At present doing Ph D program on System Security Under Sambalpur University, Orissa, India Working Area: ( 18 Yr exp in System/IT) System Security, Risk Mgmt, Unix System Admini Solution ( Unix Oracle Database), ERP, Datacomm & Networking, Internet Technology, MIS and Design.