Previous | Table of Contents | Next |
Value of Confidentiality, Integrity, and Availability. In recent years, a better understanding of the values of confidentiality, integrity, and availability and how to establish these values on a monetary basis with reasonable credibility has been achieved. That understanding is best reflected in the ISSA-published GIV referenced above. These values often represent the most significant at risk asset in IT environments. When an organization is deprived of one or more of these with regard to its business or mission information, depending on the nature of that business or mission, there is a very real chance that unacceptable loss will be incurred within a relatively short time. For example, it is well-accepted that a bank that loses access to its business information (loss of availability) for more than a few days is very likely to go bankrupt.
A brief explanation of each of these three critical values for information is presented below:
Vulnerability Analysis
This task consists of the identification of vulnerabilities that would allow threats to occur with greater frequency, greater impact, or both. For maximum utility, this task is best conducted as a series of one-on-one interviews with individual staff members responsible for implementing organizational policy through the management and administration of controls. To maximize consistency and thoroughness, and to minimize subjectivity, the vulnerability analysis should be conducted by an interviewer who guides each interviewee through a well-researched series of questions designed to ferret out all potentially significant vulnerabilities.
It should be noted that establishment and global acceptance of Generally Accepted System Security Principles, as recommended in the National Research Council report Computers at Risk (12/90), will go far in establishing a globally accepted knowledge base for this task.
Threat/Vulnerability/Asset Mapping
Without connecting mapping threats to vulnerabilities and vulnerabilities to assets and establishing a consistent way of measuring the consequences of their interrelationships, it becomes nearly impossible to establish the ramifications of vulnerabilities. Of course, intuition and common sense are useful, but how does one measure the risk and support good budgetary management and cost/benefit analysis when the rationale is so abstract?
For example, it is only good common sense to have logical access control, but how does one justify the expense? We are reminded of a major bank whose management, in a cost-cutting frenzy, came very close to terminating its entire logical access control program! With risk assessment, one can show the expected risk and annualized asset loss/probability coordinates that reflect the ramifications of a wide array of vulnerabilities. Let us carry the illustration further with two basic vulnerabilities (Exhibit 4).
Applying some simple logic at this point will give the reader some insight into the relationships between vulnerabilities, threats, and potentially affected assets:
Previous | Table of Contents | Next |