Risk is the possibility of something adverse happening.  Risk management is the process of assessing  risk, taking steps to reduce risk to an acceptable level and maintaining that  level of risk.  People manage risks  daily, recognize various threats to their best interests and take precautions to  guard against them or to minimize their effects.
The first step in assessing risk is to identify the system  under consideration, the part of the system that will be analyzed, and the  analytical method including its level of detail and formality. Risk has many  different components: assets, threats, vulnerabilities, safeguards, consequences, and likelihood.   This examination normally includes gathering data about the threatened  area and synthesizing and  analyzing the information to make it useful.   
A risk management effort should  focus on those areas that result in the greatest consequence to the organization  (i.e., can cause the most harm).  This  can be done by ranking threats and assets. A risk management methodology does  not necessarily need to analyze each of the components of risk separately.  For example, assets/consequences or  threats/likelihoods may be analyzed together.   
When analyzing risk, we should  concentrate on those threats most likely to occur and affect important assets.  The risk assessment is used to support two related functions: the acceptance of  risk and the selection of cost-effective controls.  To accomplish these functions, the risk  assessment must produce a meaningful output that reflects what is truly  important to the organization.  Limiting  the risk interpretation activity to the most significant risks is another way  that the risk management process can be focused to reduce the overall effort  while still yielding useful results.
The risk assessment is used to  support two related functions: the acceptance of risk and the selection of  cost-effective controls.  To accomplish  these functions, the risk assessment must produce a meaningful output that  reflects what is truly important to the organization.  Limiting the risk interpretation activity to  the most significant risks is another way that the risk management process can  be focused to reduce the overall effort while still yielding useful  results.
Risk mitigation involves the  selection and implementation of security controls to reduce risk to a level  acceptable to management, within applicable constraints.  The process of risk mitigation involves the  following activities: 
1. Selecting Safeguards - A primary function of computer  security risk management is the identification of appropriate controls.  In designing (or reviewing) the security of a  system, it may be obvious that some controls should be added (e.g., because they  are required by law or because they are clearly cost-effective).  It may also be just as obvious that other  controls may be too expensive (considering both monetary and nonmonetary  factors).
2. Accept Residual Risk - At some  point, management needs to decide if the operation of the computer system is  acceptable, given the kind and severity of remaining risks. It should take into  account the limitations of the risk assessment.   
3.  Implementing Controls and Monitoring Effectiveness - The safeguards selected need to be  effectively implemented.  Moreover, to  continue to be effective, risk management needs to be an ongoing process.  This requires a periodic reassessment and improvement of safeguards  and re-analysis of risks.  
One method of selecting safeguards uses a "what if" analysis.  With this method, the effect of adding  various safeguards (and, therefore, reducing vulnerabilities) is tested to see  what difference each makes with regard to cost, effectiveness, and other  relevant factors. Another method is to categorize types of safeguards and  recommend implementing them for various levels of risk.  For example, stronger controls would be  implemented on high-risk systems than on low-risk systems.
What Is a What  If Analysis?
A what  if analysis looks at the costs and benefits of various combinations  of controls to determine the optimal combination for a particular  circumstance.  In this simple example  (which addresses only one control), suppose that hacker break-ins alert agency  computer security personnel to the security risks of using passwords.  They may wish to consider replacing the  password system with stronger identification and authentication mechanisms, or  just strengthening their password procedures.   First, the status quo is  examined.  The system in place puts  minimal demands upon users and system administrators, but the agency has had  three hacker break-ins in the last six months. 
What if passwords are  strengthened?  Personnel may be  required to change passwords more frequently or may be required to use a numeral  or other non-alphabetic character in their password.  There are no direct monetary expenditures,  but staff and administrative overhead (e.g., training and replacing forgotten  passwords) is increased.  Estimates,  however, are that this will reduce the number of successful hacker break-ins to  three or four per year.
What if  stronger identification and authentication technology is used?  The agency may wish to implement stronger  safeguards in the form of one-time cryptographic-based passwords so that, even  if a password were obtained, it would be useless.  Direct costs may be estimated at $45,000, and  yearly recurring costs at $8,000.  An  initial training program would be required, at a cost of $17,500.  The agency estimates, however, that this  would prevent virtually all break-ins.
Computer security personnel use  the results of this analysis to make a recommendation to their management  officer, who then weighs the costs and benefits, takes into account other  constraints (e.g., budget), and selects a solution.
Good documentation of risk assessments will make later risk assessments less time consuming and, if a question arises, will help explain why particular security decisions were made.
 
 
 

No comments:
Post a Comment