Cover image for Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Title:
Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Personal Author:
Publication Information:
New Jersey : John Wiley & Sons, 2010
Physical Description:
xvii, 421 p. : ill. ; 24 cm.
ISBN:
9780471762546
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010215627 HF5548.37 K68 2010 Open Access Book Book
Searching...

On Order

Summary

Summary

Discusses all types of corporate risks and practical means of defending against them. Security is currently identified as a critical area of Information Technology management by a majority of government, commercial, and industrial organizations. Offers an effective risk management program, which is the most critical function of an information security program.


Author Notes

Daniel Minoli has been a network consultant to Teleport, DVI Communications, and Bellcore. recently played a key role in the foundation of two networking companies: Global Nautical Networks, a provider of mobile Internet and data services to marinas, and InfoPort Communications Group, an optical and Gigabit Ethernet metropolitan carrier. He has also taught at New York University, Stevens Institute of Technology, Carnegie-Mellon University, and Monmounth University. An author of best-selling books on telecommunications and data communications, he has written columns for ComputerWorld, NetworkWorld, and Network Computing. He is the author of Telecommunications Handbook, Second Edition, also published by Artech House.

050


Table of Contents

Prefacep. xiii
About the authorsp. xv
Part I Industry Practices in Risk Managementp. 1
1 Information Security Risk Management Imperatives and Opportunitiesp. 3
1.1 Risk Management Purpose and Scopep. 3
1.1.1 Purpose of Risk Managementp. 3
1.1.2 Text Scopep. 17
Referencesp. 24
Appendix 1A Bibliography of Related Literaturep. 25
2 Information Security Risk Management Definedp. 33
2.1 Key Risk Management Definitionsp. 33
2.1.1 Survey of Industry Definitionsp. 33
2.1.2 Adopted Definitionsp. 37
2.2 A Mathematical Formulation of Riskp. 40
2.2.1 What is Risk? A Formal Definitionp. 44
2.2.2 Risk in IT Environmentsp. 44
2.2.3 Risk Management Proceduresp. 49
2.3 Typical Threats/Risk Eventsp. 56
2.4 What is an Enterprise Architecture?p. 61
Referencesp. 65
Appendix 2A The CISSPforum/ISO27k Implementers Forum Information Security Risk List for 2008p. 66
Appendix 2B What is Enterprise Risk Management (ERM)?p. 71
3 Information security risk management standardsp. 73
3.1 ISO/IEC 13335p. 77
3.2 ISO/IEC 17799 (ISO/IEC 27002:2005)p. 78
3.3 ISO/IEC 27000 Seriesp. 78
3.3.1 ISO/IEC 27000, Information Technology-Security Techniques-Information Security Management Systems-Fundamentals and Vocabularyp. 79
3.3.2 ISO/IEC 27001:2005, Information Technology-Security Techniques-Specification for an information Security Management, System-p. 79
3.3.3 ISO/IEC 27002:2005, Information Technology-Security Techniques-Code of Practice for Information Security Managementp. 84
3.3.4 ISO/IEC 27003 Information Technology-Security Techniques-Information Security Management System Implementation Guidancep. 90
3.3.5 ISO/IEC 27004 Information Technology-Security Techniques-Information Security Management-Measurementp. 91
3.3.6 ISO/IEC 27005:2008 Information Technology-Security Techniques-Information Security Risk Managementp. 92
3.4 ISO/ICE 31000p. 92
3.5 NIST STANDARDSp. 94
3.5.1 NIST SP 800-16p. 96
3.5.2 NIST SP 800-30p. 99
3.5.3 NIST SP 800-39p. 101
3.6 AS/NZS 4360p. 105
Referencesp. 106
Appendix 3A Organization for Economic Cooperation and Development (OECD) Guidelines for the Security of Information Systems and Networks: Toward a Culture of Securityp. 107
4 A Survey of Available Information Security Risk Management Methods and Toolsp. 111
4.1 Overviewp. 111
4.2 Risk Management/Risk Analysis Methodsp. 114
4.2.1 Austrian IT Security Handbookp. 114
4.2.2 CCTA Risk Assessment and Management Methodology (CRAMM)p. 115
4.2.3 Dutch A&K Analysisp. 117
4.2.4 EBIOSp. 117
4.2.5 ETSI Threat Vulnerability and Risk Analysis (TVRA) Methodp. 119
4.2.6 FAIR (Factor Analysis of Information Risk)p. 122
4.2.7 FIRM (Fundamental Information Risk Management)p. 124
4.2.8 FMEA (Failure Modes and Effects Analysis)p. 125
4.2.9 FRAP (Facilitated Risk Assessment Process)p. 128
4.2.10 ISAMM (Information Security Assessment and Monitoring Method)p. 129
4.2.11 ISO/IEC Baselinesp. 130
4.2.12 ISO 31000 Methodologyp. 130
4.2.13 IT-Grundschutz (IT Baseline Protection Manual)p. 136
4.2.14 MAGERIT (Metodologia de Analisis y Gestion de Riesgos de los Sistemas de Informacion) (Methodology for Information Systems Risk Analysis and Management)p. 137
4.2.15 MEHARI (Méthode Harmonisée d'Analyse de Risques-Harmonised Risk Analysis Method)p. 142
4.2.16 Microsoft's Security Risk Management Guidep. 146
4.2.17 MIGRA (Metodologia Integrata per la Gestione del Rischio Aziendale)p. 152
4.2.18 NISTp. 153
4.2.19 National Security Agency (NSA) IAM / IEM / IA-CMMp. 153
4.2.20 Open Source Approachp. 155
4.2.21 PTA (Practical Threat Analysis)p. 158
4.2.22 SOMAP (Security Officers Management and Analysis Project)p. 160
4.2.23 Summaryp. 161
Referencesp. 162
5 Methodologies examples: COBIT and octavep. 164
5.1 Overviewp. 164
5.2 COBITp. 166
5.2.1 COBIT Frameworkp. 172
5.2.2 The Need for a Control Framework for IT Governancep. 173
5.2.3 How COBIT Meets the Needp. 175
5.2.4 COBIT's Information Criteriap. 175
5.2.5 Business Goals and IT Goalsp. 176
5.2.6 COBTT Frameworkp. 177
5.2.7 IT Resourcesp. 178
5.2.8 Plan and Organize (PO)p. 180
5.2.9 Acquire and Implement (AI)p. 180
5.2.10 Deliver and Support (DS)p. 180
5.2.11 Monitor and Evaluate (ME)p. 181
5.2.12 Processes Need Controlsp. 181
5.2.13 COBIT Frameworkp. 181
5.2.14 Business and IT Controlsp. 184
5.2.15 IT General Controls and Application Controlsp. 185
5.2.16 Maturity Modelsp. 187
5.2.17 Performance Measurementp. 194
5.3 OCTAVEp. 205
5.3.1 The OCTAVE Approachp. 205
5.3.2 The OCTAVE Methodp. 208
Referencesp. 210
Part II Developing Risk Management Teamsp. 211
6 Risk Management Issues and Organization Specificsp. 213
6.1 Purpose and Scopep. 213
6.2 Risk Management Policiesp. 216
6.3 A Snapshot of Risk Management in the Corporate Worldp. 219
6.3.1 Motivations for Risk Managementp. 224
6.3.2 Justifying Risk Management Financiallyp. 225
6.3.3 The Human Factorsp. 230
6.3.4 Priority-Oriented Rational Approachp. 232
6.4 Overview of Pragmatic Risk Management Processp. 234
6.4.1 Creation of a Risk Management Team, and Adoption of Methodologiesp. 234
6.4.2 Iterative Procedure for Ongoing Risk Managementp. 236
6.5 Roadmap to Pragmatic Risk Managementp. 236
Referencesp. 239
Appendix 6A Example of a Security Policyp. 239
7 Assessing Organization and Establishing Risk Management Scopep. 243
7.1 Assessing the Current Enterprise Environmentp. 244
7.2 Soliciting Support from Senior Managementp. 248
7.3 Establishing Risk Management Scope and Boundariesp. 259
7.4 Defining Acceptable Risk for Enterprisep. 260
7.5 Risk Management Committeep. 263
7.6 Organization-Specific Risk Methodologyp. 264
7.6.1 Quantitative Methodsp. 265
7.6.2 Qualitative Methodsp. 267
7.6.3 Other Approachesp. 269
7.7 Risk Waivers Programsp. 272
Referencesp. 274
Appendix 7A Summary of Applicable Legislationp. 275
8 Identifying Resources and Implementing the Risk Management Teamp. 280
8.1 Operating Costs to Support Risk Management and Staffing Requirementsp. 281
8.2 Organizational Modelsp. 286
8.3 Staffing Requirementsp. 287
8.3.1 Specialized Skills Requiredp. 290
8.3.2 Sourcing Optionsp. 291
8.4 Risk Management Toolsp. 295
8.5 Risk Management Servicesp. 296
8.5.1 Alerting and Analysis Servicesp. 296
8.5.2 Assessments, Audits, and Project Consultingp. 296
8.6 Developing and Implementing the Risk Management/ Assessment Teamp. 298
8.6.1 Creating Security Standardsp. 298
8.6.2 Defining Subject Matter Expertsp. 300
8.6.3 Determining Information Sourcesp. 300
Referencesp. 301
Appendix 8A Sizing Example for Risk Management Teamp. 302
Appendix 8B Example of Vulnerability Alerts by Vendors and CERTp. 331
Appendix 8C Examples of Data Losses-A One-Month Snapshotp. 336
9 Identifying Assets and Organization Risk Exposuresp. 338
9.1 Importance of Asset Identification and Managementp. 338
9.2 Enterprise Architecturep. 340
9.3 Identifying IT Assetsp. 346
9.4 Assigning Value to IT Assetsp. 353
9.5 Vulnerability Identification/Classificationp. 354
9.5.1 Base Parametersp. 360
9.5.2 Temporal Parametersp. 362
9.5.3 Environmental Parametersp. 363
9.6 Threat Analysis: Type of Risk Exposuresp. 367
9.6.1 Type of Risk Exposuresp. 368
9.6.2 Internal Team Programs (to Uncover Risk Exposures)p. 371
9.7 Summaryp. 371
Referencesp. 371
Appendix 9A Common Information Systems Assetsp. 372
10 Remediation planning and compliance reportingp. 377
10.1 Determining Risk Valuep. 377
10.2 Remediation Approachesp. 380
10.3 Prioritizing Remediationsp. 384
10.4 Determining Mitigating Timeframesp. 385
10.5 Compliance Monitoring and Security Metricsp. 387
10.6 Compliance Reportingp. 390
Referencesp. 391
Basic Glossary of Terms Used in This Textp. 392
Indexp. 415