Risk Management
Site: | Saylor Academy |
Course: | CS406: Information Security |
Book: | Risk Management |
Printed by: | Guest user |
Date: | Wednesday, 2 April 2025, 1:41 AM |
Description
Read this page and watch the video to learn more about the purpose of risk management and the four stages of the risk management process. Before you move on, make sure you have a good understanding of the formulas, and that you are able to use the formulas on this page to calculate single loss expectancy (SLE), annual rate of occurrence (ARO), and annual loss expectancy (ALE).
Table of contents
- Introduction
- Key Terms
- Instruction
- The Risk Management Process
- Risk Inventory
- Risk Management Benefits and Motivation
- Tangible and Intangible Asset Valuation
- Tangible Assets
- Intangible Asset Valuation
- Methods for Managing Risk
- Asset Valuation Example Review
- Single Loss Expectancy (SLE)
- Annual Rate of Occurrence (ARO)
- Annual Loss Expectancy (ALE)
- Qualitative Risk Analysis
- Risk Mitigation
- Security Control Selection Principles
- Countermeasure Selection Considerations: Review
- Calculating Risk Exposure
- Statement of Applicability (SOA)
- Summary
Introduction
The principle of risk includes three ideas: it examines an event, and then combines its probability with its potential impact. When examining risk two questions are always examined: what is the probability that a particular event will occur? And what negative impact would this event have if it actually occurred? Risk is measured by combining the results of these two questions. A high risk event would have both a high probability combined with a significant negative impact if it occurred. The concept of measuring risk must always be focused on the future.Lesson Objectives
By the end of this lesson, you will be able to:- Explain the purpose of risk management.
- Discuss the impact of the Target Corporation data breach.
- Demonstrate the ability to incorporate risk management principles and best practices into an organization – wide plan.
- Explain the methods of managing risks.
- Perform a quantitative risk assessment analysis.
- Perform a qualitative risk assessment analysis.
Source: National Information Security and Geospatial Technologies Consortium (NISGTC), https://www.edjet.com/scorm-content/edjet-prod-uploads/1bbb6bd2940fd96497953e96a7011e315c141cf3/771aacefbe2ed9e16b17173a36b691df/story_content/WebObjects/6MLNkf2prXH/lesson02/index.html This work is licensed under a Creative Commons Attribution 3.0 License.
Key Terms
Term | Definition |
Risk management | the process of identifying, assessing, and prioritizing organizational risk |
Risk | The potential of losing something that is of value to an organization |
Risk assessment | the process of analyzing risk |
Risk analysis | analysis uses information to identify possible sources of risk and identify threats or events that could have a harmful impact |
Countermeasures | A measure taken to counter or offset a threat |
Threat | A danger that exploits a vulnerability to breach security |
Security controls | Safeguards or countermeasures implemented to minimize security risks. |
Compliance | Obligations to external authorities and information security reviews |
Asset | Any resource, product, system, process, or any other organizational resource that has value to an organization |
Tangible assets | Assets that have a physical presence and an identifiable value |
Intangible assets | Assets that are not physical but still represent a value to the organization’s image, its operations, and the ability to compete in the market |
Quantitative Risk Analysis | This type of risk analysis assigns independent, objective, numeric monetary values to the elements of risk assessment and the assessment of potential losses |
Single Loss Expectancy (SLE) | The estimate of the amount of damage that an asset will suffer due to a single incident |
Exposure Factor (EF) | A potential percent of loss to a specific asset if a particular threat is realized. This is regarded as a subjective measure |
Annual Rate of Occurrence (ARO) | the number of times per year that an incident is likely to occur |
Annual Loss Expectancy (ALE) | the yearly financial impact to the organization from a particular risk |
Qualitative Risk Analysis | Evaluates the impact or effect of threats on the business process or the goals of the organization with a scenario-oriented, carefully reasoned risk assessment |
Risk mitigation | Reducing the severity of a loss or the likelihood of the loss from occurring |
Risk Exposure | A quantifiable loss potential |
Instruction
Risk Management
Risk management is the process of identifying, assessing, and prioritizing organizational risk. Risk management also includes the creation of organizational processes to address loss exposures, monitor risk control and mitigate the impact of potential
risk to the organization. Natural disasters, human error, accidents, legal liabilities, and deliberate attacks from an adversary all pose some degree of risk. This lesson will introduce the concepts and processes associated with risk management.
Risk management and risk assessment are major components of Information Security Management (ISM). The ISO 27000 framework defines risk management as a process that includes four activities:
- risk assessment
- risk acceptance
- risk treatment
- risk communications
Risk management includes all of the related activities that an organization carries out in order to assess, evaluate and respond to organizational risk. Risk assessment is the process of analyzing risk. This can be performed using a quantitative or qualitative approach. One measures the actual financial impact, the other measures impact on the organization's operations and reputation.
Figure 1 – Components of risk management
Risk analysis uses information to identify possible sources of risk and identify threats or events that could have a harmful impact. Risk analysis also includes the implementation of controls that estimates the risk. A risk evaluation compares the estimated risk with a set of risk criteria. This is done in order to determine how significant the risk really is and helps to prioritize the risks. Risk response is the approach taken to mitigate the threat and reduce the risk impact.
The video, Managing IT Risk: Trends in Global Information Security (12:55), discusses the most important challenges for IT professionals to mitigate the threats that organizations now face in a dynamic technology environment.
The Risk Management Process
The risk management process consists of three stages:- Risk analysis/assessment. This stage is designed to inventory or identify risk and classification of risk. Within the first stage, each risk event identified is recorded and examined to determine likelihood, current value of the asset and vulnerability exposure.
- Risk response. The risk response stage requires the planning of processes and procedures to address each risk item identified in the first stage. These processes and procedures are typically called controls.
- Evaluating and monitoring the implemented controls. This stage requires the organization to document, review and make continuous improvements or changes to manage risk.
Figure 2 – The risk management process
Risk Inventory
The risk inventory is done to create a checklist of potential risks to evaluate the likelihood of occurrence. Some organizations develop risk checklists based on past experiences. These checklists can be helpful in building a more comprehensive list. Identifying the sources of risk by category is another method for exploring potential risk. Some examples of categories for potential risks include the following:
- Equipment/Technical
- Human Factors
- System Vulnerabilities
- Malicious Attacks
- Theft
- Weather/Natural Disasters
- Financial/Cost
- Contractual
- Political/Legal
- Environmental/Physical
For example, a human factor risk would include the inability to find an employee with the skills needed to properly complete a task or protect resources.
Risk Management Benefits and Motivation
Besides identifying the risks facing an organization, a risk management program enables the organization to assess the impact risks can have on organization-wide performance and processes. Therefore, risk management not only provides risk evaluation, but can identify whether adequate controls are in place to mitigate risks effectively. The real benefit and motivation come down to cost. The process is designed to identify the optimal level of security at the minimum cost. It typically comes down to the cost of the countermeasure versus the cost of the security failure.Figure 3 – Cost versus security level trade – off
At point A, the cost of security failure is high, while the level of security assurance is low. At point B, there is too much money being spent to provide security assurance. At point D, the cost of security failures is equal to the cost of the security measures. Point D is optimal since the cost of both failures and security measures are minimized and security assurance is maximized.
Tangible and Intangible Asset Valuation
An "asset" is any resource, product, system, process, or any other organizational resource that has value to an organization. As such, all assets must be protected. Assets can be physical/tangible items, such as equipment or computers, and they can also be non-tangibles, such as information or intellectual property.Figure 4 – Tangible assets versus intangible assets
Tangible Assets
Tangible assets are those assets that have a physical presence. The risk analysis can identify a real value. These types of assets are valued based on the original or replacement cost.These types of assets often depreciate to zero for accounting purposes. Common ways to calculate tangible assets would include:
- Original cost minus depreciation
- Actual market value based on market research
- Installation cost
- Impact on operations
Intangible Asset Valuation
Intangible assets are not physical, but still represent value to the organization's image, its operations, and ability to compete in the marketplace. Intangible assets include:
- Trademarks
- Copyrights
- Patents
- Intellectual property
- Formulas
- Brand recognition
- Brand reputation
Methods for Managing Risk
Risks should be ranked based on financial or operational impact and likelihood of occurrence. The results of this assessment will align risk events in one of four risk response categories:
- Mitigate risk – activities with a high likelihood of occurring, but financial impact is small. The best response is to use management control systems to reduce the risk of potential loss.
- Avoid risk – activities with a high likelihood of loss and large financial impact. The best response is to avoid the activity.
- Transfer risk – activities with low probability of occurring, but with a large financial impact. The best response is to transfer a portion or all of the risk to a third party by purchasing insurance, hedging, outsourcing, or entering into partnerships.
- Accept risk – if cost – benefit analysis determines the cost to mitigate risk is higher than the cost to bear the risk, the best response is to accept and continually monitor the risk.
Figure 7 – Methods for managing risk
Asset Valuation Example Review
To conduct an asset valuation, answer the following questions:
- How can the level of impact be measured?
- What are the cost implications to the business?
- How can you determine what effect this event has on sales, IT, customer reputation, and employees?
- What possible regulatory issues does the company face?
- What is the best response to handle this situation in the future?
Quantitative Risk Analysis
This type of risk analysis assigns independent, objective, numeric monetary values to the elements of risk assessment and the assessment of potential losses.
EVERYTHING gets a dollar value!
Standardized calculation of risk is based on the impact of each occurrence and frequency of occurrence. The overall approach to quantitative risk analysis is illustrated in Figure 8.
Figure 8 – Quantitative risk analysis approach
Single Loss Expectancy (SLE)
SLE is the estimate of the amount of damage that an asset will suffer due to a single incident.Asset categories include people, facilities, equipment, materials, information, activities, and operations.
Figure 9 – Single Loss Expectancy calculation
The following formula is used to calculate the single loss expectancy:
Single Loss Expectancy = Asset Value * Exposure Factor
Exposure Factor (EF) is expressed as a percentage of the asset value. If loss can be limited to one type, the impact on the asset by percentage of the asset value lost can be determined.
Annual Rate of Occurrence (ARO)
ARO is the number of times per year that an incident is likely to occur. Knowing the adversaries' intent, capability, and motivation will help determine the ARO.ARO = Incidents / Year
Annualized Rate of Occurrence is number of incidents per year.
Figure 10 – Annual rate of occurrence calculation
Annual Loss Expectancy (ALE)
ALE provides an estimate of the yearly financial impact to the organization from a particular risk.This helps determine how much money the organization is justified in spending on countermeasures in order to reduce the likelihood or impact of an incident.
Annualized Loss Expectancy = Single Loss Expectancy * Annual Rate of Occurrence
ALE = SLE * ARO
Qualitative Risk Analysis
A qualitative risk analysis evaluates the impact or effect of threats on the business process or the goals of the organization and has the following characteristics:
- Scenario oriented
- A carefully reasoned risk assessment is performed
Although qualitative security risk equation variables are expressed as numerical values, these values are considered ordinal numbers which correspond to High > Medium > Low. There is no metric that determines a distance between categories. For example, Low is not twice as good as High.
Tables are used as the "formula" for determining qualitative security risks, as shown in Figure 11.
Figure 11 – Qualitative risk analysis matrix
The team then defines each of the qualitative values for probability and impact. The values in the table are the result of multiplying the probability value by the impact value. Read the article, Qualitative Risk Analysis and Assessment for more information.
Risk Mitigation
Risk mitigation involves reducing the severity of the loss or the likelihood of the loss from occurring. There are many technical controls that can be used to mitigate risk including authentication systems, file permissions and firewalls. Organization and security professionals must understand that risk mitigation can have both positive and negative impact on the organization. Good risk mitigation finds a balance between negative impact of countermeasures and controls and the benefit of risk reduction. A shorter-term strategy is to accept the risk, in the sense of accepting the necessity for creating contingency plans for that risk.Modern software development methodologies reduce risk by developing and delivering software incrementally and providing regular updates and patches to address vulnerabilities and misconfigurations.
Outsourcing services can be an example of risk reduction. Hiring specialists to perform critical tasks to reduce risk can be a good decision and yield greater results with less long term investment. The ISO framework identifies several ways to manage risk:
- Accept – periodically re-assess risks that are accepted in ongoing processes as a normal feature of business operations and modify mitigation measures.
- Reduce – design a new business process with adequate built-in risk control and containment measures from the start.
- Transfer – transfer risks to an external agency (a service level agreement or insurance company).
- Avoid – avoid risks altogether would include measures such as physically disconnecting from the Internet.
Figure 12 – Ways to deal with risk
These strategies are not mutually exclusive. A good risk mitigation plan can include two or more strategies.
Security Control Selection Principles
The total cost of a control includes the following:
- Selection
- Construction and replacement
- Acquisition (materials and mechanisms)
- Maintenance and testing
- Non-trivial operating cost
- Potential side effects
- Environmental modifications
- Impact on operations
Countermeasure Selection Considerations: Review
Applying criteria for selection will assist in measuring the true costs of implementing that countermeasure. Take the case of an ATM at a bank. The following questions should be asked:- What are the 'real' costs of changing security controls?
- How would a chip and pin solution be calculated effectively? What would need to be considered?
- What other options may have been considered instead of chip and pin? Shutting down ATMs? Biometrics? More physical security?
There are seven possible functions that a security countermeasure can fulfill.
- Control access
- Help assess the attack
- Delay the attack
- Deter an attack
- Detect an attack
- Respond to the attack
- Collect evidence of the attack
Various countermeasures can perform one or more of these functions.
Calculating Risk Exposure
Risk exposure is a calculation done as part of a risk assessment. Read How to Calculate Risk Exposure Value.Using a Qualitative Risk Analysis, risk exposure is the Probability of the risk occurring multiplied by the total loss on Risk Occurrence. The risk exposure is the potential for financial loss. A quantitative risk analysis is shown in Table 1.
Table 1: Calculation of Annualized Loss Expectancy
Table 1: Calculation of Annualized Loss Expectancy
Asset | Threat | Asset Value | EF | SLE | ARO | ALE |
---|---|---|---|---|---|---|
File Server | Virus every year | $15,000 | .20 | 3,000 | ½ (.5) | 1,500 |
Operation Center | Hurricane every 10 years | $1,000,000 | .90 | 900,000 | 1/5 (.2) | 180,000 |
EF – Exposure Factor SLE – Single Loss Expectancy ARO – Annualized Rate of Occurrence ALE – Annualized Loss Expectancy
Formulas:
- SLE = Asset Value * EF
- ARO = Incidents / Year
- ALE = SLE * ARO
Statement of Applicability (SOA)
The statement of applicability is a document that identifies the controls chosen for an organization's environment. The SOA is derived from the risk assessment and explains how and why these controls are appropriate.Read The importance of Statement of Applicability for ISO 27001 which discusses why an SOA is needed and why it is useful.