IT Risk Management- What is it about?
Nirmal Joshi, CISSP
Associate - Security Engineering @Goldman Sachs ? CISSP, CC, Google Certified Professional Cloud Security Engineer, AZ-900, Security+, OneTrust VRME
Whenever we hear about the term Information Security, the first thing comes up is the term IT RISK. When I started learning about Risk Management, the thing happened with me was I got through different terminologies. Here, I’ll try to share what I understood while learning about RISK in very simple terms.
Before we directly reach to the ‘R‘ term, we would first connect our dots with few of the following terminologies which would help us understand ‘R’ in a better way-
Let’s define the ‘R’ term that is RISK– In simple words risk is nothing but a possibility of something bad happening. You might be wondering why I got you through so many terms if RISK is that simpler, its because when we talk in terms of information security the RISK completes its definition using the above terms.
Information Security Risk is the probability of a threat agent successfully exploiting a vulnerability in an asset through threat actions. The formula which defines it is:
Threats x Vulnerability = Risk
Risk Management, a process used for prioritization of threats against assets and most importantly determining what to do about it. Risk Management can be centric to whole of the organization or can be for single project or department as well.
Risk Treatments
Now, as we have looked in the treatment and know what Risk Management is about, let’s dive into Types of Risk Analysis:
Quantitative Risk Analysis
Quantitative analysis is about assigning monetary values to risk components. The key variables and equations used for conducting a quantitative risk analysis are shown below.
领英推荐
The concept can be summarized by analyzing the example of a stolen corporate laptop to understand better how it works. Let’s first describe the threat, vulnerability and risk:
Threat: Stolen corporate laptop Vulnerability: Backup rarely performed Risk: Loss of data
Data is the asset. We assess the value of the asset (AV) first: $100,000.
Next, let’s address the single loss expectancy (SLE). It contains information about the potential loss when a threat occurs. SLE = AV ? EF, where EF is exposure factor. Exposure factor describes the loss that will happen to the asset because of the threat. SLE is $30,000 in our example when EF is estimated to be 0.3.
Let’s continue this case. The annualized rate of occurrence (ARO) is described as an estimated frequency of the threat occurring in one year. ARO is used to calculate ALE (annualized loss expectancy). ALE is calculated as follows: ALE = SLE ? ARO. ALE is $15,000 ($30,000 ? 0.5), when ARO is estimated to be 0.5 (once in two years).
Qualitative Risk Analysis
This is based on subjective opinions:
We can make use of graphs, risk heat map to showcase the severity in terms of Low, High, Medium and Critical. The parameters to be defined are totally based upon an individual or the organization.
Risk Heat Map: Taking risk severity levels and map visually by colors. Risk Matrix: Table of risk details, similar to a heat map but without colors.
Thanks for giving it a read.