Title: Risk Assessment
1Lesson 3
- Risk Assessment
- and
- Risk Mitigation
2Objective 4
- At the end of Lesson 3, you will be able to
describe - several approaches to risk assessment,
- considerations in developing and selecting
countermeasures, - the importance of the management decision, and
- reasons why risk management is really an art
instead of a science
3The Variable Nature of the Elements of Risk
4Risk is Commonplace
5Qualitative Data
This is not a nice day
- Description of
- qualities,
- elements, or
- ingredients of a variable
6Quantitative Data
- Allows the variable to be measured
- Numerical values may be assigned based on
measured observations
o
Temp 75 F Humid 45 Bar 29.35"
7Purpose of Risk Assessment(Bottom Line)
- Permit managers to make reasoned decisions
regarding risk to the organizations mission
8Using Risk Management Terms -The Catcher at Risk
9Risk Assessment - Questions to Be Answered
- What is the relationship of the system to the
customers mission? - What are all of the undesirable events that could
happen and affect the mission? - How could they happen?
- Realistically, what are the chances of them
happening? - Suppose such an event happens, how much damage
could be done?
10Performing a Risk Assessment
- Define the purpose of the assessment
- Identify the product or system
- Select assessment approach
- Gather information
- Develop attack scenarios
- Estimate risk parameters
- Produce assessment report
11Define the Purpose of the Assessment
- What is the general situation?
- What decisions are to be made as a result of the
risk assessment? - Who will make the decisions?
12Identify and Bound the Product or System -
Decide on Scope or Depth of Assessment
13Organize for the Assessment
- Individual
- Individuals
- Group or team of individuals
- Groups
14Define Relationships
- How will individuals, groups, etc., work together
performing the tasks of - data collection
- analysis
- synthesis
- conclusions
- recommendations
15What do Analysts do?
- Identify threats and their characteristics
- Gather and exchange information
- Develop attack scenarios
- Confidentiality
- Integrity
- Availability
- Postulate potential consequences
- Impact on organization's mission
- Estimate risk parameters
16Information Sources
- Knowledge of Individual Members
- Computer Emergency Response Team Coordination
Center, etc. - Outside Experts
- Systems Administrators, Manager, etc.
- Users
- Threat Assessments and other Reports
17Threat Characteristics
Capability
(Given Capable)
Likelihood of Attack
Likelihood of Success
(Threat Value)
(Given Attempted and Capable)
Motivation
Willingness
18Threat Sources
- Nature - Historical
- Unintentional human error - Historical
- Technological failure - Historical
- Adversarial - Threat Assessment
19Adversarial Threat Characteristics
- Objectives - As opposed to ours
- Intentions
- Motivation to act
- Willingness to accept risk
- Willingness to accept cost
- Technical capability
- Resources
20Gather and Exchange Information
- Define What the System Does
- Define the Environment
- Determine Data Sensitivity
- Identify System Users
- Identify vulnerabilities
21Gather Information
- How does the system support the mission?
22Gather Information
23Gather Information
- Determine Data Sensitivity
- including its value to an adversary and
- value to the mission
24Gather Information
- Identify System Users
- and their need for the system and its information
25Gather Information
- Identify Potential Vulnerabilities
26Develop Attack Scenarios
- THREAT AGENTS
- - Adversarial
- - Nature
- - Human error
- - Technological failure
- TARGETS
- - Confidentiality
- - Integrity
- - Availability
- - Others
27Avenues of Attack
- Confidentiality Integrity Availability
- Network Connect Public Switch Public Power
- Application SW Communications Local Power
- Firewall UPS
- Remote Access
- Physical Access
- Insiders
- Crypto
- TEMPEST
28Determine Potential Consequences
- Impact on information system,
- resulting in impact on organization's mission
29Estimate Risk Parameters
- Likelihood of Success
- that a credible threat exists,
- with capability to attack, and
- the willingness and intention to do so
- Consequences
- the degree of damage resulting from an attack
30Assessing Risk
31Attack Scenario No. 1
Coalition Force ISs heavily dependent upon
Internet, few security features, lack procedural
discipline.
U.S. Forces IS
32Estimate of RiskAttack Scenario 1
Y-
CONSEQUENCE
Hi
o
A-1
Med
Lo
Lo
Med
Hi
X-
LIKELIHOOD OF SUCCESS
33Estimate of RiskAttacks 1 thru 8
Y-
CONSEQUENCE
Hi
o
o
o
o
A-5
A-1/3/4
Med
o
o
A-2/7
Lo
o
o
A-6
A-8
Lo
Med
Hi
X-
LIKELIHOOD OF SUCCESS
34Rating Overlay
Hi
H
H
M
Med
H
M
M
Lo
M
M
L
Lo
Med
Hi
35Likelihood of SuccessAttack Scenario 1
Y-
CONSEQUENCE
Hi
o
o
o
o
A-5
H
H
M
A-1/3/4
Med
o
o
H
M
M
A-2/7
Lo
o
o
A-6
A-8
M
M
L
Lo
Med
Hi
X-
LIKELIHOOD OF SUCCESS
36Risk Assessment Methodology
- Aids Decision Makers
- Promotes Discussion
- Focus on Most Serious Problems
- Early Identification of Risk
- Highlights Recurring Problems
- Aids Concurrent Engineering
37Risk Mitigation
COUNTERMEASURE
MGR
RISK
38Countermeasure Considerations
- What is the cost Vs. benefit?
- Are we creating another vulnerability?
- Are people involved? If so, will they
participate? - How long is the countermeasure needed?
- How long will the countermeasure be effective?
39Cost Vs.. Benefit
- Cost in
- dollars
- time to implement
- impact on operations
Results
40The Catcher at Risk
41Risk Mitigation - At What Cost?
42Creating New Vulnerabilities
- Law of unanticipated consequences
New Vulnerability
Risk Analyst
43People Considerations
- Are people involved? Will they participate in
the solution?
COUNTERMEASURE
USER
44Time Consideration
- How long is the countermeasure needed?
45Time Consideration
- How long will the countermeasure be effective?
46Risk Assessment Reality
- Are we sure of the threat?
- Have we identified all vulnerabilities?
- Have we considered all possible attacks?
- Is our estimate of consequence correct?
- Is all of this art or science?
47Never Ending Cycle
ASSESSING
MITIGATING
RISK