Skip to:Content
|
Bottom
Cover image for Information security risk assessment toolkit :   practical assessments through data collection and data analysis
Title:
Information security risk assessment toolkit : practical assessments through data collection and data analysis
Personal Author:
Publication Information:
Amsterdam : Boston : Elsevier, c2013
Physical Description:
xix, 258 p. : ill. ; 24 cm.
ISBN:
9781597497350
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010301425 QA76.9.A25 T354 2013 Open Access Book Book
Searching...
Searching...
30000010243230 QA76.9.A25 T354 2013 Open Access Book Book
Searching...

On Order

Summary

Summary

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention for risk treatment. This is the true value and purpose of information security risk assessments. Effective risk assessments are meant to provide a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. Information Security Risk Assessment Toolkit gives you the tools and skills to get a quick, reliable, and thorough risk assessment for key stakeholders.


Author Notes

Mark Ryan M. Talabis is a Manager within the Secure DNA Consulting practice
Jason L. Martin is the co-Founder and President of Secure DNA Consulting


Table of Contents

Acknowledgmentsp. xiii
About the Technical Editorp. xv
About the Authorsp. xvii
Introductionp. xix
Chapter 1 Information Security Risk Assessmentsp. 1
Introductionp. 1
What is Risk?p. 1
Going Deeper with Riskp. 3
Components of Riskp. 4
Putting it All Togetherp. 6
Information Security Riskp. 6
What is an Information Security Risk Assessment?p. 10
Why Assess Information Security Risk?p. 11
Risk Assessments and the Security Programp. 12
Information Risk Assessments Activities in a Nutshellp. 13
Drivers, Laws, and Regulationsp. 19
Federal Information Security Management Act of 2002 (FISMA)p. 19
Gramm-Leach-Bliley Act (GLBA)p. 21
Health Insurance Portability and Accountability Act (HIPAA)p. 22
State Governmentsp. 23
ISO 27001p. 23
Summaryp. 25
What is Risk?p. 25
What is an Information Security Risk Assessment?p. 25
Drivers, Laws, and Regulationsp. 26
Referencesp. 26
Chapter 2 Information Security Risk Assessment: A Practical Approachp. 27
Introductionp. 27
A Primer on Information Security Risk Assessment Frameworksp. 27
Do I Use an Existing Framework or Should I Use My Own?p. 28
Octavep. 28
Fairp. 35
NIST SP800-30p. 41
ISO 27005p. 49
A Comparison of the Major Activities for the Four Frameworksp. 51
A Comparison of the Major Activities for the Four Frameworks Based on Activitiesp. 52
Our Risk Assessment Approachp. 52
Summaryp. 62
Chapter 3 Information Security Risk Assessment: Data Collectionp. 63
Introductionp. 63
The Sponsorp. 64
The Project Teamp. 66
The Size and Breadth of the Risk Assessmentp. 66
Scheduling and Deadlinesp. 67
Assessor and Organization Experiencep. 67
Workloadp. 67
Data Collection Mechanismsp. 69
Collectorsp. 69
Containersp. 71
Executive Interviewsp. 73
Document Requestsp. 77
IT Asset Inventoriesp. 80
Asset Scopingp. 82
Interviewsp. 83
Asset Scoping Workshopsp. 83
Business Impact Analysis and Other Assessmentsp. 85
Critical Success Factor Analysisp. 85
The Asset Profile Surveyp. 86
Who Do You Ask for information?p. 87
How Do You Ask for the Information?p. 87
What Do You Ask for?p. 88
The Control Surveyp. 91
Who Do You Ask for Information?p. 91
How Do You Ask for Information?p. 92
What Do You Ask for?p. 92
Organizational vs. System Specificp. 93
Scale vs. Yes or Nop. 95
Inquiry vs. Testingp. 96
Survey Support Activities and Wrap-Upp. 97
Before and During the Surveyp. 97
Review of Survey Responsesp. 97
Post-Survey Verificationsp. 98
Consolidationp. 98
Chapter 4 Information Security Risk Assessment: Data Analysisp. 105
Introductionp. 105
Compiling Observations from Organizational Risk Documentsp. 106
Preparation of Threat and Vulnerability Catalogsp. 109
Threat Catalogp. 109
Vulnerability Catalogp. 110
Threat Vulnerability Pairsp. 112
Overview of the System Risk Computationp. 113
Designing the Impact Analysis Schemep. 114
Confidentialityp. 114
Integrityp. 116
Availabilityp. 117
Preparing the Impact Scorep. 118
Practical Tipsp. 121
Designing the Control Analysis Schemep. 122
Practical Tipsp. 126
Designing the Likelihood Analysis Schemep. 126
Exposurep. 127
Frequencyp. 132
Controlsp. 134
Likelihoodp. 135
Putting it Together and the Final Risk Scorep. 140
Chapter 5 Information Security Risk Assessment: Risk Assessmentp. 147
Introductionp. 147
System Risk Analysisp. 148
Risk Classificationp. 148
Risk Rankingsp. 151
Individual System Risk Reviewsp. 157
Threat and Vulnerability Reviewp. 162
Review Activities for Organizational Riskp. 167
Review of Security Threats and Trendsp. 168
Review of Audit Findingsp. 170
Review of Security Incidentsp. 171
Review of Security Exceptionsp. 172
Review of Security Metricsp. 173
Risk Prioritization and Risk Treatmentp. 175
Chapter 6 Information Security Risk Assessment: Risk Prioritization and Treatmentp. 177
Introductionp. 177
Organizational Risk Prioritization and Treatmentp. 178
Review of Security Threats and Trendsp. 178
Review of Audit Findingsp. 179
Review of Security Incidentsp. 179
Review of Security Exceptionsp. 180
Review of Security Metricsp. 180
System Specific Risk Prioritization and Treatmentp. 183
Issues Registerp. 187
Chapter 7 Information Security Risk Assessment: Reportingp. 195
Introductionp. 195
Outlinep. 196
Risk Analysis Executive Summaryp. 197
Methodologyp. 199
Organizationalp. 199
System Specificp. 201
Resultsp. 204
Organizational Analysisp. 204
System Specificp. 208
Risk Registerp. 224
Conclusionp. 228
Appendicesp. 229
Chapter 8 Information Security Risk Assessment: Maintenance and Wrap Upp. 233
Introductionp. 233
Process Summaryp. 233
Data Collectionp. 234
Data Analysisp. 234
Risk Analysisp. 235
Reportingp. 235
Key Deliverablesp. 235
Post Mortemp. 236
Scopingp. 237
Executive Interviewsp. 237
System Owners and Stewardsp. 238
Document Requestsp. 238
System Profile and Control Surveyp. 238
Analysisp. 239
Reportingp. 240
General Processp. 240
Indexp. 251
Go to:Top of Page