SlideShare une entreprise Scribd logo
1  sur  20
BÜROTEX GmbH
                Vishal Sharma
          Information Security
Consultant/Solution Developer
RISK
It is the uncertainty of outcome whether
positive opportunity or negative threat.

Some commonly Known terms:

   Asset : It is something which should be protected

   Asset Valuation: It is a value assigned to an asset
    based on actual cost and nonmonetary expenses
   Threats : Any occurrence that could cause an undesirable
    or unwanted outcome for an organization for a specific threat


   Vulnerability: The absence of weakness of a safeguard
    or countermeasure


   Exposure: It is being susceptible to asset loss because of
    a threat
   Safeguard: A safeguard or a countermeasure, is
    anything that removes a vulnerability


   Attack: An exploitation of a vulnerability by a threat
    agent


   Breach : The occurrence of a security mechanism being
    bypassed
Threats
               • Exploits

Assets                       Vulnerabilities
• Whch are                   • Which
  endangered
                               results in
  by




Safeguard
                              Exposure
• Which
                              • Which is
  protects
               Risk
               • Which is
                 mitigated
                 by
Factors for Asset Valuation:

   Purchase Cost
   Development Cost
   Administrative Cost
   Maintaining or Upkeep Cost
   Cost in Acquiring asset
   Cost to protect or sustain asset
   Value to Owners and users
   Value to Competitors
   Intellectual property or equity Value
   Market valuation
   Replacement Cost
   Productivity enhancement or degradation
   Operational cost of asset presence and Loss
   Liability of asset loss
   Usefulness
Next logical step is to calculate Threats:

   Viruses
   Cascade errors and Dependency Faults
   Criminal activities by authorized users
   Movements
   Intentional Attacks
   Reorganization
   Authorized user illness
   Hackers
   User errors
   Natural Disasters
   Physical Damage
   Misuse of data, resource, or services
   Changes or compromises to data
    classification or security policies
   Government, political, or military intrusions
    or restrictions
   Processing errors, buffer overflows
   Personal privilege abuse
   Temperature extremes
   Energy anomalies
   Loss of data
   Information Warfare
   Bankruptcy or alteration/ interruption of
    business activity
   Coding/programming errors
   Intruders
   Environmental factors
   Equipment Failures
   Physical Theft
   Social Engineering
Risk Analysis

   Quantitative : It results in Concrete Probability
    Percentage


   Qualitative: This is more scenario based, it requires:
       Brainstorming
       Delphi Technique
   Story boarding
   Focus groups
   Surveys
   Questionnaires
   Checklists
   One-on-one Meetings
   Interviews
Quantative Analysis, major steps involved:

   Countermeasures for each threat

   Calculate the changes to Aro and ALE based on
    applied counter measure

   Perform a cost benefit analysis of each counter
    measure for each asset
 AV : Inventory assets and sign a Value
 EF : Calculate exposure factors, possible threat

        of each individual asset
 SLE: Single Loss Expectancy,

 ARO: Annualized rate of occurrence

 ALE: Annualized Loss expectancy
Cost Functions

   Exposure factors : % loss, if specific asset were
  violated by a realized risk
 SLE : AV*EF
   ARO : It could be derived from historical records,
  statistical analysis or guess work. Basically it‘s a
  probability determination
 ALE : SLE*ARO
   ACS : Annual cost of safeguard, € per year, which
    involves following factors:

    Cost of   purchase, development and licensing
    Cost of   implementation and customization
    Cost of   annual operation, maintenance, administration and
    so on
    Cost of   annual repairs and upgrades
Productivity improvement or loss
    Changes to environment
    Cost of testing and evaluation


   Value or benefit of a safe guard:   =(ALE1-ALE2) – ACS
Note :

    Value of safeguard to the Company =
    (ALE before Safegaurd –
    ALE after implementing safeguard) –
    (Annual cost of Safeguard)
Thank You

Contenu connexe

Tendances

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)Jan Wong
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
Osprey Bank Risk
Osprey Bank RiskOsprey Bank Risk
Osprey Bank Riskpakelly
 
Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks Hernan Huwyler, MBA CPA
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Riskphanleson
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software securityMarco Morana
 

Tendances (14)

Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)L008 Disaster Recovery Plan (2016)
L008 Disaster Recovery Plan (2016)
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Osprey Bank Risk
Osprey Bank RiskOsprey Bank Risk
Osprey Bank Risk
 
Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
Ch07 Managing Risk
Ch07 Managing RiskCh07 Managing Risk
Ch07 Managing Risk
 
Chaiyakorn
ChaiyakornChaiyakorn
Chaiyakorn
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Insurance
InsuranceInsurance
Insurance
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Business cases for software security
Business cases for software securityBusiness cases for software security
Business cases for software security
 

En vedette (7)

Deepak Jaiswal Resume2
Deepak Jaiswal Resume2Deepak Jaiswal Resume2
Deepak Jaiswal Resume2
 
Ict homework
Ict homeworkIct homework
Ict homework
 
Risø energy report 10
Risø energy report 10Risø energy report 10
Risø energy report 10
 
Presentation Guaraní Partnership
Presentation Guaraní PartnershipPresentation Guaraní Partnership
Presentation Guaraní Partnership
 
Open Data und interaktive Datenvisualisierungen
Open Data und interaktive DatenvisualisierungenOpen Data und interaktive Datenvisualisierungen
Open Data und interaktive Datenvisualisierungen
 
RA FACE 2011
RA FACE 2011RA FACE 2011
RA FACE 2011
 
Sexualidad segun el plan de dios
Sexualidad segun el plan de diosSexualidad segun el plan de dios
Sexualidad segun el plan de dios
 

Similaire à Risk Management

Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
CHAPTER 1Risk Management FundamentalsCopyright © 202
CHAPTER 1Risk Management FundamentalsCopyright © 202CHAPTER 1Risk Management FundamentalsCopyright © 202
CHAPTER 1Risk Management FundamentalsCopyright © 202EstelaJeffery653
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteHernan Huwyler, MBA CPA
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalManoj Agarwal
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411Scott Althouse
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTri Phan
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 

Similaire à Risk Management (20)

Testing
TestingTesting
Testing
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
CHAPTER 1Risk Management FundamentalsCopyright © 202
CHAPTER 1Risk Management FundamentalsCopyright © 202CHAPTER 1Risk Management FundamentalsCopyright © 202
CHAPTER 1Risk Management FundamentalsCopyright © 202
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security InstituteTips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
File000170
File000170File000170
File000170
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
SecurityExchange2009-Key Note
SecurityExchange2009-Key NoteSecurityExchange2009-Key Note
SecurityExchange2009-Key Note
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
 
Rational application-security-071411
Rational application-security-071411Rational application-security-071411
Rational application-security-071411
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 

Dernier

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Dernier (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Risk Management

  • 1. BÜROTEX GmbH Vishal Sharma Information Security Consultant/Solution Developer
  • 2. RISK It is the uncertainty of outcome whether positive opportunity or negative threat. Some commonly Known terms:  Asset : It is something which should be protected  Asset Valuation: It is a value assigned to an asset based on actual cost and nonmonetary expenses
  • 3. Threats : Any occurrence that could cause an undesirable or unwanted outcome for an organization for a specific threat  Vulnerability: The absence of weakness of a safeguard or countermeasure  Exposure: It is being susceptible to asset loss because of a threat
  • 4. Safeguard: A safeguard or a countermeasure, is anything that removes a vulnerability  Attack: An exploitation of a vulnerability by a threat agent  Breach : The occurrence of a security mechanism being bypassed
  • 5. Threats • Exploits Assets Vulnerabilities • Whch are • Which endangered results in by Safeguard Exposure • Which • Which is protects Risk • Which is mitigated by
  • 6. Factors for Asset Valuation:  Purchase Cost  Development Cost  Administrative Cost  Maintaining or Upkeep Cost  Cost in Acquiring asset  Cost to protect or sustain asset  Value to Owners and users
  • 7. Value to Competitors  Intellectual property or equity Value  Market valuation  Replacement Cost  Productivity enhancement or degradation  Operational cost of asset presence and Loss  Liability of asset loss  Usefulness
  • 8. Next logical step is to calculate Threats:  Viruses  Cascade errors and Dependency Faults  Criminal activities by authorized users  Movements  Intentional Attacks  Reorganization
  • 9. Authorized user illness  Hackers  User errors  Natural Disasters  Physical Damage  Misuse of data, resource, or services  Changes or compromises to data classification or security policies  Government, political, or military intrusions or restrictions
  • 10. Processing errors, buffer overflows  Personal privilege abuse  Temperature extremes  Energy anomalies  Loss of data  Information Warfare  Bankruptcy or alteration/ interruption of business activity
  • 11. Coding/programming errors  Intruders  Environmental factors  Equipment Failures  Physical Theft  Social Engineering
  • 12. Risk Analysis  Quantitative : It results in Concrete Probability Percentage  Qualitative: This is more scenario based, it requires: Brainstorming Delphi Technique
  • 13. Story boarding  Focus groups  Surveys  Questionnaires  Checklists  One-on-one Meetings  Interviews
  • 14. Quantative Analysis, major steps involved:  Countermeasures for each threat  Calculate the changes to Aro and ALE based on applied counter measure  Perform a cost benefit analysis of each counter measure for each asset
  • 15.  AV : Inventory assets and sign a Value  EF : Calculate exposure factors, possible threat of each individual asset  SLE: Single Loss Expectancy,  ARO: Annualized rate of occurrence  ALE: Annualized Loss expectancy
  • 16. Cost Functions  Exposure factors : % loss, if specific asset were violated by a realized risk  SLE : AV*EF  ARO : It could be derived from historical records, statistical analysis or guess work. Basically it‘s a probability determination  ALE : SLE*ARO
  • 17. ACS : Annual cost of safeguard, € per year, which involves following factors: Cost of purchase, development and licensing Cost of implementation and customization Cost of annual operation, maintenance, administration and so on Cost of annual repairs and upgrades
  • 18. Productivity improvement or loss Changes to environment Cost of testing and evaluation  Value or benefit of a safe guard: =(ALE1-ALE2) – ACS
  • 19. Note : Value of safeguard to the Company = (ALE before Safegaurd – ALE after implementing safeguard) – (Annual cost of Safeguard)