Monday, January 9, 2017

CyberSecurity: Risk Management - The Risk Assessment Process

In order to begin the risk assessment phase, the organization uses the list of information assets it has identified and prioritizes assets and the threats facing them to compare information assets to threats. The resulting list of vulnerabilities are those that remain risks to the organization. This list should be created for each information asset to document its vulnerability to each possible or likely attack. The best way found to do this documentation is the threat vulnerability asset, or TVA, Table.



As shown, it would list assets along the x-axis from most to least valuable and lists threats along the y-axis from most to least dangerous. At the intersection of the asset and threat pair, list the vulnerabilities that the threat might use to cause a loss to the asset. Now, we move onto assess the risk that exists in each of the TVA tables. Risk is commonly calculated as the likelihood that a threat to an asset will result in an adverse impact which is then multiplied by the consequences or impact of that attack.



That value is then increased by an estimate of how reliable our values of both likelihood and impact are, known as a confidence interval. Many approaches to assessing likelihood exist. One example of some likelihood ratings on a scale of 0 to 5 is shown here. Likewise, there are many ways to assess impact. Here is an example of some impact ratings on a scale of zero to five.

Start your future with a Data Analysis Certificate.   Online learning to jumpstart your future.  Python Specialization from University of Michigan

Before the organization can proceed with the final phase of risk management, activities, which is risk control, it needs to understand how much risk is acceptable to management. Some organizations have a very low tolerance for risk. Such as banking and other financial services firms. Other types of organization may tolerate more risk. The amount of risk that remains after all current levels are implemented is known as residual risk. Any organization may reach a point in the risk management process and find that the documented residual risk is low enough to accept being within the bounds of its risk appetite. They would end the current risk management cycle and document everything for the next cycle.



Once the organization has assessed the current level of risk facing its information assets and defined its risk appetite, it can move to the final phase of risk management. And that's called Risk Control. In the Risk Control phase, organizations employ one or more of the five strategies of risk control.
  1. Defense, which is applying safeguards that eliminate or reduce the remaining uncontrolled risk. 
  2. Transference, which is shifting risk to other areas or outside entities. 
  3. Mitigation, which is reducing the impact to information assets should an attacker successful exploit a vulnerability. 
  4. Acceptance. That's understanding the consequences of choosing to leave a risk uncontrolled and then formally accepting the risk that remains without an attempt at control. 
  5. And the final is termination. And that's removing or discontinuing the information asset from the organization's operating environment all together. 



Risk management is an essential process for every organization. There are many formalized models for risk management in the marketplace, and many organizations are using consulting resources to assist them in finding the optimum means to reduce operational risk.

22 comments:

  1. penetration testing The web site is lovingly serviced and saved as much as date. So it should be, thanks for sharing this with us.

    ReplyDelete
  2. Awesome and very informative article. You can contact us to prepare for FRM Part II Take participate in live classes in Kolkata

    ReplyDelete
  3. I like this article, Please shared related article for further information. You can contact us to prepare for FRM Part 1 FRM Part II Take participate in live classes in Kolkata

    ReplyDelete
  4. Nice article, very helpful to learn something new....Thank for sharing that great information.

    Risk Management Services

    ReplyDelete
  5. This comment has been removed by the author.

    ReplyDelete
  6. Hi! I just wish to offer you a big thumbs up for your great info you have right here on this post. I will be coming back to your site for more soon.Psychology Hack Hack Instagram

    ReplyDelete
  7. ENGINEERING RISK MANAGEMENT

    What is Project Risk? Uncertain events or Conditions Effect on the Project Objectives(Positive / Negative Effect) Types of Risk Business (risk to overall business)Delivery (risk to project delivery)Technical (specific to particular technology) Risk management concepts is the art and science of identifying, analyzing, and responding to risk factors throughout the life of a project and…

    to get more - https://myengineerings.com/engineering-risk-management/

    ReplyDelete
  8. wow great post I am glad to be here and read this post is make my day thanks I am very happy to be a part of this post
    Proxy Bunker
    libgen proxy
    torrentfunk proxy
    Isohunt Proxy

    ReplyDelete
  9. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. Governance Risk and compliance

    ReplyDelete
  10. This is so awesome!! Thanks for sharing your experience about Risk Engineering

    ReplyDelete
  11. Thanks for sharing such information about Risk Management.Cyber Radar University provide online Compliance and Risk Management Course.
    https://bit.ly/3q8QHOv

    ReplyDelete
  12. Wow, what a fantastic message. I am delighted to be here, and reading this post has brightened my day. I am delighted to be a part of this post...
    Cybersecurity Assessment

    ReplyDelete
  13. Thank you for writing such a fascinating essay. I sincerely appreciate the effort you devote to do all of the necessary research for your posts. This one was really enjoyable for me!!..
    cybersecurity assessment

    ReplyDelete
  14. Thanks for sharing informative content about the risk management specially the strategies to control the risk.

    ReplyDelete
  15. Great article! Thanks for sharing this blog informative. Risk Management Services.

    ReplyDelete
  16. The viability of Independent Recruiting as a homebased business is no longer a secret. With Entrepreneur magazine, Recruiter magazine, The Fordyce Letter and other authorities reporting on the success of this billion dollar industry, it is not surprising that individuals try to become independent recruiters everyday. The following are challenges new recruiters face and how to handle them. recruitment agencies in uk

    ReplyDelete
  17. I must say you have describe very good info for risk management and I found this info very useful for my Online MBA course which I am Pursuing form distance learning center and this was very helpful post. keep sharing.

    ReplyDelete
  18. The content was fabulous and very informative. Thanks for sharing such kind of a post.SIRA-approved CCTV company in Dubai

    ReplyDelete
  19. Thank you for sharing this insightful post on risk assessment and management. The thorough explanation of the TVA table and the detailed phases of risk control are incredibly useful for any organization aiming to protect its information assets. FYI Solutions offers the best cybersecurity services, ensuring that organizations can effectively manage and mitigate risks.

    ReplyDelete
  20. "Great post! I really appreciate the detailed insights you've shared here. The way you broke down the information made it easy to understand, and I found the examples particularly helpful."
    NEBOSH International Diploma

    ReplyDelete
  21. Interesting blog thank u for sharing informative blog IT Risk management services

    ReplyDelete