14 Jun If an organization has three information assets to evaluate for risk management purposes, as shown in the list below, which vulnerability should be evaluated for a
Exercise 1: If an organization has three information assets to evaluate for risk management purposes, as shown in the list below, which vulnerability should be evaluated for additional controls first? Which vulnerability should be evaluated last?
- A CRM-Server that is connected to the Internet. It has two vulnerabilities:
- susceptibility to hardware failure, with a likelihood of 8, and
- susceptibility to ransomware attack with a likelihood of 4.
The CRM-Server has been assigned an impact value of 10. Assume that there are no current controls in place to protect it, and there is a 75 percent certainty of the assumptions and data.
- An E-commerce server hosts the company Web site and supports customer transactions. It runs a server software that is vulnerable to a buffer overflow attack, with the likelihood of such an attack estimated at 6. The server has been assigned an impact value of 8. Assume that there are no current controls in place to protect the server, and there is a 70 percent certainty of the assumptions and data.
- A Control-Console to monitor operations in the server room. It has no passwords and is susceptible to unlogged misuse by the operators. Estimates show that the likelihood of misuse is 2. There are no controls in place on this asset, which has an impact value of 5. There is a 90 percent certainty of the assumptions and data.
Exercise 2: Using the list of threats to InfoSec presented in Chapter 6 identify and describe three instances of each that were not mentioned in the chapter.
IMG_5003.jpg
IMG_5002.jpg
,
1
Useful Hints on Assignment 5
Exercise 1: (Chapter 6)
To help you better understand the calculations for Exercise 1 of Assignment 5, see below for an explanation on how to correctly compute the risk rating of an asset. Using the terminology from Chapter 6 of the textbook, the formula for calculating the risk rating of an asset can be written as:
Risk rating = I x V x (1.0 – C + U) where, I : is Impact value of an asset V : is Likelihood of vulnerability C : is Percentage of risks mitigated by controls on the asset (example: Firewall etc.) U : is Uncertainty of assumptions and data
Worked Example: Let us see how we can apply this to an example problem. Assume that an organization has three assets A, B, C as follows:
(1) Asset A: has an impact value of 50, and likelihood of vulnerability is estimated to be 1.0. Also assume that there are no current controls in place to protect the asset, and there is a 90% certainty of these assumptions and data. Thus we can write: I : Impact value of asset is given as 50 V : Likelihood of vulnerability is given as 1.0 C : Assume that there are no current controls in place to protect this asset.
(So, Percentage of risk mitigated by current controls = 0% (i.e. 0)) U : Certainty of assumptions is given as 90%
– so the Uncertainty of assumptions = 10% (i.e. 0.1) Risk rating for asset A = I x V x (1 – C + U) = (50 x 1.0) x (1.0 – 0 + 0.1) = 55
(2) Asset B: has an impact value of 100, and likelihood of vulnerability is estimated to be 0.5. Also assume that current controls in place address 50% of the risk, and there is an 80% certainty of these assumptions and data. Thus we can write: I : Impact value of asset is given as 100 V : Likelihood of vulnerability is given as 0.5 C : Assume that current controls for this vulnerability address 50% of the risk.
(So, Percentage of risk mitigated by current controls = 50% (= 0.50)) U : Certainty of assumptions is given as 80%
– so Uncertainty of assumptions = 20% (i.e. 0.2) Risk rating for asset B = I x V x (1 – C + U) = (100 x 0.5) X (1.0 – 0.5 + 0.2) = 35
(3) Asset C: has an impact value of 100, and likelihood of vulnerability is estimated to be 0.1. Also assume that there are no current controls in place to protect the asset, and there is an 80% certainty of these assumptions and data. Thus we can write: I : Impact value of asset is given as 100 V : Likelihood of vulnerability is given as 0.1 C : Assume that there are no current controls in place to protect this asset.
2
(So, Percentage of risk mitigated by current controls = 0% (i.e. 0)) U : Certainty of assumptions is given as 80%
– so Uncertainty of assumptions = 20% (i.e. 0.2) Risk rating for asset C = I x V x (1 – C + U) = (100 x 0.1) – (1.0 – 0 + 0.2) = 12 Conclusion: Based on these risk ratings, asset A has the highest vulnerability score and asset C has the lowest score. Hence, the vulnerabilities on Asset A should be addressed first for additional controls, and those of Asset C should be addressed last.
Exercise 3(a): (Chapter 7)
For this exercise you need to use the data given in the Table to calculate the SLE, ARO, and ALE for each threat category listed.
In this exercise, you are given the cost per incident, which effectively is the SLE. For example, in the Table given for this exercise, the cost per incident for a Programmer Mistake is given as $5,000; hence the SLE for this incident is $5,000.
To compute the ARO for an incident use the hints given below. And once you know the SLE and the ARO, you can compute ALE using the formula: ALE = SLE x ARO.
Detemining the Annualized Rate of Occurence (ARO): The term ARO simply means how many incidents will occur in one year. If the data is given in other time intervals such as one per quarter, one every week, one every six months etc. then you convert that to number of incidents that will occur in a year to calculate ARO.
Here are some examples to illustrate this:
One incident per week means: ARO = 52 (since there are 52 weeks in a year)
One incident per quarter means: ARO = 4 (since there are 4 quarters in a year)
One incident every 10 years means: ARO = 0.1 (1/10)
One incident per month means: ARO = 12 (since there are 12 months in a year)
One every six months means: ARO = 2 (in one year there will be 2 incidents)
For example, when you apply this to the first Table entry (Programmer Mistakes) of Exercise 4, we have:
SLE = $5,000 ARO = 52 (since frequency = 1 incident per week) –> ALE = SLE x ARO = ($5000) x 52 = $260,000
We can therefore write the first line of the Table as follows:
Cost per incident Frequency ARO SLE ALE
Programmer Mistakes $5,000 1 per week 52 $5,000 $260,000
3
Exercise 3(b): (Chapter 7) In a typical cost-benefit analysis, sometimes it is informative to determine if the value of protecting an asset is worth the cost incurred in implementing the control mechanisms protecting the asset. In Exercise 4 of the assignment you computed the ALE values for different assets to determine the expected loss from those assets if they were compromised.
Exercise 3(b) explores whether the cost-benefits from implementing protection controls are worthwhile when compared to the value of the assets being protected. Such analysis could be performed before implementing a control or safeguard, or they can be performed after controls have been in place for a while. To calculate the cost-benefit of implementing those controls use the equation given below (as discussed on page 386 in Chapter 7 of the textbook):
Cost Benefit = ALE(precontrol) – ALE(postcontrol) – ACS
where:
ALE(precontrol) = ALE of the risk before the implementation of the control ALE(postcontrol) = ALE after the control has been implemented
ACS = Annualized Cost of Control
For the data given for each of the assets listed in the table provided for this exercise, use the above formulae to compute the Cost Benefit figure for each asset by determining its SLE, ARO, and ALE for each threat category listed.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.