Chat with us, powered by LiveChat In week 4, describe a plan of action and its impact on creating a risk management plan.? ??You must use at least one scholarly resource. Every discussion posting must be properly APA forma - Writeedu

In week 4, describe a plan of action and its impact on creating a risk management plan.? ??You must use at least one scholarly resource. Every discussion posting must be properly APA forma

 In week 4, describe a plan of action and its impact on creating a risk management plan.    You must use at least one scholarly resource. Every discussion posting must be properly APA formatted. 

CHAPTER 9

Identifying and Analyzing Risk Mitigation Security Controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com.

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Learning Objective(s) and Key Concepts

Identify risk mitigation security controls and develop a risk mitigation plan.

In-place and planned controls

Families of controls defined by NIST

Procedural, technical, and physical controls

Learning Objective(s)

Key Concepts

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

In-Place Controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Installed in an operational system

Replace in-place controls that don’t meet goals

Three primary objectives of controls:

Prevent

Recover

Detect

Planned Controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Those that have been approved but not yet installed

Identify planned controls before approving others

Vulnerabilities that planned controls mitigate still exist

Evaluate effectiveness of a planned control through research

Control Categories

Some controls are categorized using either of the following methods:

NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations

Implementation method—Three implementation methods are used to categorize controls:

Procedural controls

Technical controls

Physical controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

NIST Control Families

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Access Control (AC)

Audit and Accountability (AU)

Awareness and Training (AT)

Configuration Management (CM)

Contingency Planning (CP)

Identification and Authentication (IA)

Incident Response (IR)

Maintenance (MA)

Media Protection (MP)

Personnel Security (PS)

NIST Control Families (Cont.)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Physical and Environment Protection (PE)

Planning (PL)

Program Management (PM)

Risk Assessment (RA)

Assessment, Authorization, and Monitoring (CA)

System and Communications Protection (SC)

System and Information Integrity (SI)

System and Services Acquisition (SA)

Personally Identifiable Information Processing and Transparency (PT)

Supply Chain Risk Management (SR)

Procedural Control Examples

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Policies and procedures

Security plans

Insurance and bonding

Background and financial checks

Procedural Control Examples (Cont.)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Data loss prevention program

Education, training, and awareness

Rules of behavior

Software testing

Policies and Procedures

Written documents that provide guidelines and rules for an organization

Policy: A high-level document that provides overall direction without details

Procedure: Provides the detailed steps needed to implement a policy

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Policy examples:

Acceptable use policy (AUP)

Vulnerability scanning policy

Removable media policy

Procedure examples:

AUP procedure

Vulnerability scanning procedures

Removable media enforcement

Security Plans

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Business continuity plan (BCP)

Helps an organization prepare for different types of emergencies

Disaster recovery plan (DRP)

Provides the details for recovering one or more systems after a disaster

Backup plan

Identifies data valuable to the organization and specifies storage and retention requirements

Incident response plan

Documents how an organization should respond to a security incident

Insurance and Bonding

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Insurance policies specify shared responsibilities between the insurance company and the customer

Fire and flood

Business interruption

Errors and omissions

Bonding covers against losses by

Theft

Fraud

Dishonesty

Background and Financial Checks

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Initiation – Existing architecture and security systems are documented and a risk assessment is conducted

Acquisition and Development – A more complete risk assessment is completed and a baseline security level is established

Implementation and Testing – The new system is installed and unit and integration tests are conducted

Operation and Maintenance – Longest phase; systems are continuously monitored, incidents are addressed and a business continuity plan is created

Sunset or Disposal – Old systems must be removed without exposing the organization to addition risk during the migration to a new system

13

Background checks

Financial checks

Internet resources

Commonly include police and FBI checks, which will identify any criminal behavior

A person with a poor credit rating may be viewed suspiciously

Google and Facebook may expose problematic behavior

Data Loss Prevention Program

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Loss of confidentiality

Occurs when unauthorized entities view a company's data

Loss due to corruption

Can occur many ways, have reliable backups to mitigate

Education, Training, and Awareness

Controls aren’t effective if employees don’t know what they are or how to implement them

Awareness programs are generic and apply to all personnel

Logon or welcome banners

Emails

Posters

Training can be generic for all personnel or specialized and targeted at specific groups

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Rules of Behavior

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Document that lets users know what they can and cannot do with systems

Users must read and/or sign the document to indicate they understand the rules

Common elements in a rules of behavior document:

Privacy

List of restricted activities

Email usage

Protection of credentials

Consequences or penalties for noncompliance

Software Testing

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Organizations that develop software should have a policy that mandates software testing

Goal is to reduce the number of undiscovered bugs in the software

Types of software testing include data range and reasonableness checks

Technical Control Examples

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Logon identifier

Session time-out

System logs and audit trails

Data range and reasonableness checks

Firewalls and routers

Encryption

Public key infrastructure

Firewalls and Routers

Control traffic by allowing some traffic and blocking other traffic

Router provides basic filtering of traffic based on:

Internet protocol (IP) addresses

Ports

Some protocols

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Encryption

Changes plaintext data into ciphered data

Example: "password" is in plaintext may look like this in encrypted form: MFIGs3x/$6o0D

Data can be encrypted at rest or when transferred

Encryption algorithms are designed to make decryption too difficult and take too much time to make it worthwhile

Encryption is classified as either:

Symmetric

Asymmetric

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Public Key Infrastructure (PKI)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Some elements of a PKI

Certificate authority

Issues and manages certificates; can be public, such as VeriSign, or private

Certificates

Used for identification and to aid in encryption

Public and private keys

Data encrypted with one key can be decrypted only with the matching key

Web of trust

Ensures that the binding between a public key and its owner is authentic

Public Key Infrastructure (Cont.)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Physical Control Examples

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Locked doors, guards, CCTV

Fire detection and suppression

Water detection

Temperature and humidity detection

Electrical grounding and circuit breakers

Temperature and Humidity Detection

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Best Practices for Risk Mitigation Security Controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Ensure the control is effective

Review controls in all areas

Review NIST SP 800-53 families

Redo a risk assessment if a control has changed

Summary

In-place and planned controls

Families of controls defined by NIST

Procedural, technical, and physical controls

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

10/9/2020

26

,

CHAPTER 10

Planning Risk Mitigation Throughout an Organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com.

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Learning Objective(s) and Key Concepts

Identify risk mitigation security controls and develop a risk mitigation plan.

Scope of a risk management plan

Legal and compliance issues, including operational impacts

Assessing security countermeasures and safeguards

How to identify risk mitigation and risk reduction elements for an organization

Learning Objective(s)

Key Concepts

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Where Should an Organization Start with Risk Mitigation?

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Identify assets

High

Medium

Low

Identify and analyze threats and vulnerabilities

Evaluate the controls to determine what controls to implement

What Is the Scope of Risk Management for an Organization?

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Critical business operations

Mission-critical business systems, applications, and data access

Seven domains of a typical IT infrastructure

Information systems security gap

Customer service delivery

Critical Business Operations

A business impact analysis (BIA) helps an organization identify the impact on the business if various risks occur

BIAs identify the maximum acceptable outage (MAO), the maximum amount of time a system or service can be down before the mission is affected

When completing a BIA of a specific service or function, ask:

How does this service affect the organization’s profitability?

How does this service affect the organization’s survivability?

How does this service affect the organization’s image?

How will an outage affect employees?

How will an outage affect customers?

When does this service need to be available?

What is the MAO of the service?

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Customer Service Delivery

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Service level agreement (SLA) identifies an expected level of performance; includes the minimum uptime or the maximum downtime

Organizations use SLAs as a contract between a service provider and a customer

SLA can identify monetary penalties if the terms aren’t met

Internal customer services:

Email services

Internet access

Network access

Server applications, such as database servers

Access to internal servers, such as file servers

Desktop computer support

Mission-Critical Business Systems, Applications, and Data Access

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Critical business functions (CBFs)

Any function considered vital to an organization

Critical success factors (CSFs)

Any element necessary to perform the mission of an organization

Mission-Critical Business Systems, Applications, and Data Access (Cont.)

Critical business functions: making the purchase

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Mission-Critical Business Systems, Applications, and Data Access (Cont.)

Critical business functions: receiving funds

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Mission-Critical Business Systems, Applications, and Data Access (Cont.)

Critical business functions: shipping the product

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Seven Domains of a Typical IT Infrastructure

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Information Systems Security Gap

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

The difference between the controls that are in place and the controls that are needed

Gap analysis reports are often used when dealing with legal compliance

Combined with a remediation plan, the gap analysis report identifies how to close a security gap

Understanding and Assessing the Impact of Legal and Compliance Issues on an Organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Compliance is a mitigation control

Assessing the impact of compliance issues:

Identify what compliance issues apply to organization

Assess impact of issues on business operations

Legal Requirements, Compliance Laws, Regulations, and Mandates

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Health Insurance Portability and Accountability Act (HIPAA)

Sarbanes-Oxley Act (SOX)

Federal Information Security Management Act (FISMA) (2002)

Federal Information Security Modernization Act (FISMA) (2014)

Family Educational Rights and Privacy Act (FERPA)

Children’s Internet Protection Act (CIPA)

Payment Card Industry Data Security Standard (PCI DSS)

Gramm-Leach-Bliley Act (GLBA)

General Data Protection Regulation (GDPR)

Assessing the Impact of Legal and Compliance Issues on an Organization’s Business Operations

CIPA requires a technology protection measure (TPM)

Proxy server used as a TPM

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Payment Card Industry Data Security Standard (PCI DSS) Principles and Requirements

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall

Requirement 2: Do not use defaults, such as default passwords

Protect Cardholder Data

Requirement 3: Protect stored data

Requirement 4: Encrypt transmissions

Maintain a Vulnerability Management Program

Requirement 5: Use and update antivirus software

Requirement 6: Develop and maintain secure systems

Payment Card Industry Data Security Standard (PCI DSS) Principles and Requirements (Cont.)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Implement Strong Access Control Measures

Requirement 7: Restrict access to data

Requirement 8: Use unique logons for each user. Don’t share usernames and passwords

Requirement 9: Restrict physical access

Regularly Monitor and Test Networks

Requirement 10: Track and monitor all access to systems and data

Requirement 11: Regularly test security

Maintain an Information Security Policy

Requirement 12: Maintain a security policy

Translating Legal and Compliance Implications for an Organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Losses can be direct or indirect

A public relations (PR) campaign can sometimes restore an organization’s reputation

Proactively spending money on PR campaigns can reduce the effects of an incident

Assessing the Impact of Legal and Compliance Implications on the Seven Domains of a Typical IT Infrastructure

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

User Domain

Workstation Domain

LAN Domain

LAN-to-WAN Domain

WAN Domain

Remote Access Domain

System/Application Domain

Assessing How Security Countermeasures, Controls, and Safeguards Can Assist With Risk Mitigation

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Controls are implemented at a point in time to reduce the risks at that time

A control will attempt to mitigate risk by:

Reducing the impact of threats to an acceptable level

Reducing a vulnerability to an acceptable level

A risk assessment (RA) evaluates threats and vulnerabilities at a point in time

Understanding the Operational Implications of Legal and Compliance Requirements

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

HIPAA

SOX

FISMA

FERPA

CIPA

PCI DSS

GDPR

Identifying Risk Mitigation and Risk Reduction Elements for the Entire Organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Account management controls

Access controls

Physical access

Personnel policies

Security awareness and training

Performing a Cost-Benefit Analysis (CBA)

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Compare cost of control to cost of risk if it occurs

Calculating projected benefits:

Loss Before Control ─ Loss After Control = Projected Benefits

Determining if control should be used:

Projected Benefits ─ Cost of Control = Control Value

Best Practices for Planning Risk Mitigation Throughout an Organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

Review historical documentation

Although risks change, many of the threats and vulnerabilities will be the same

Include both a narrow and broad focus

Identify specific risks and mitigation strategies and broaden the focus to include the entire organization

Ensure that governing laws have been identified

If you don’t know what laws apply, you won’t be in compliance

Redo risk assessments when a control changes

If the control changes, the original risk assessment is no longer valid

Include a CBA

CBAs provide justification for controls and help determine their value

Summary

Scope of a risk management plan

Legal and compliance issues, including operational impacts

Assessing security countermeasures and safeguards

How to identify risk mitigation and risk reduction elements for an organization

Copyright © 2022 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com

10/9/2020

25

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now