Lecture 4 and 5

In the realm of cybersecurity, Governance, Risk Management, and Compliance (GRC) serves as a fundamental framework. It guides organizations in implementing robust security measures by integrating critical elements:

Why is GRC important? Implementing GRC programs allows businesses to make better decisions in a risk- aware environment. An effective GRC strategy helps stakeholders set policies, comply with regulations, and align the entire company around shared values and actions. Benefits include data-driven decision-making and responsible operations.

Imagine your next professional interview, you have a business degree and the committee asks you: “How would you approach risk management?”

Introduction – Overview (1)

Organisations must design and create safe environments in which business processes and procedures can function.

Risk management: process of identifying and controlling risks facing an organisation – comprises three major undertakings:

  1. Risk identification: process of examining an organisation’s current IT security situation
  2. Risk assessment: determining the extent to which the assets are exposed or at risk
  3. Risk control: applying controls to reduce risks to an organisation’s data and information systems

alt text

Identify threats

Assess the risk

Develop mitigation strategies

Implement controls

alt text

Risk Identification

Risk Assessment

Risk Control

Risk management discussion point!

alt text

Risk identification (we now discuss the overall process)

Risk identification – a "project management" approach

alt text

alt text

1. People, procedures, and data asset identification

2. Hardware, software, and network asset identification

Information asset valuation

So we‘ve succeeded in identifying and we‘re confident we‘ve identified a comprehensive, mutually exlusive list of assets across the various functional areas. Now we have to value each of those assets.

Questions below (and others) help develop criteria for asset valuation

Which information asset:

alt text

Information asset prioritisation (most likely to have multiple valuation criteria – why? Who makes these criteria?)

alt text

Next step is: Identifying and prioritising threats

alt text

Then we need to analyse our vulnerabilities and prioritise them: Vulnerability analysis

Prioritising vulnerabilities

CVSS v4.0: https://www.first.org/cvss/v4.0/specification-document

alt text

TVA worksheet (a simple summary)

At end of risk identification process, there should be two lists:

alt text

Risk Assessment

Risk calculation – a ‘project’ approach (flow, feedback, control)

For the purpose of a simplistic relative risk assessment:

alt text

Calculating risk (text book approach – page 283)

alt text

Step 1: Loss frequency

First, we need to determine how probable it is that an attack is successful.

Loss frequency describes an assessment of the likelihood of an attack combined with expected probability of success given the current level of controls in place

Step 2: Loss Magnitude

We need to determine how much of an information asset could be lost in a successful attack

Loss magnitude (sometimes asset exposure)

Combines two components: (1) the value of information asset with (2) the percentage of asset lost in the event of a successful attack

Difficulties involve:

Clearly this step is also subject to possible error/uncertainty

Example in textbook

Information asset A is on online e ‐ commerce database. 10% chance of attack this year (1 attack every 10 years). 50% chance of success based on current asset vulnerabilities and protection mechanisms. Asset value is 50 (how is this derived) and 100% of the asset would be compromised by a successful attack. Assumption: data 90% accurate.

alt text

Information asset B is an internal personnel database behind a firewall. 1% chance of attack this year. 10% chance of success based on current asset vulnerabilities and protection mechanisms. Asset value is 25 on a scale of 1 to 100 and 50% of the asset would be compromised by a successful attack. Assumption: data 90% accurate.

alt text

Risk Assessment (2) - NIST

Risk assessment (3) – another approach

alt text

Vulnerability Discovery and Recording

Identify possible controls

alt text

Documenting the results of the risk assessment

alt text

Risk control strategies (5 of these)

Once ranked vulnerability risk worksheet complete, must choose one of five strategies to control each risk:

  1. Defend
  1. Transfer
  1. Mitigate
  1. Accept
  1. Terminate

alt text

Selecting a risk control strategy

Justifying controls

Cost Benefit Analysis

Several questions must be asked:

Once asset valuation is completed, we can calculate how much loss is expected from a single attack and how often these attacks occur. We can use the annualized loss expectancy (ALE) for this:

ALE = single loss expectancy (SLE) × annualized rate of occurrence (ARO)

In our previous Web site example, the ARO could be 0.50 ( how often is this?). This gives us ALE = $100,000 * 0.50 = $50,000

Consequently, this business can expect to lose $50,000 every year – this gives us a basis for expenditure

CBA = ALE(prior) – ALE(post) – ACS

Evaluation, assessment, and maintenance of risk controls

alt text

Qualitative versus quantitative risk control practices

alt text

Quantitative methods: Example

FAIR (Factor Analysis of Information Risks)

alt text