Chapter 21: Risk Management

Team-Fly

In this chapter, we elaborate on risk management and how the Internet has changed (or is about to change) the way we think about risk management in the IT world. More specifically, we introduce the topic in Section 21.1, elaborate on formal risk analysis in Section 21.2, address some alternative approaches and technologies for risk management in Section 21.3, and draw some conclusions in Section 21.4.

21.1 INTRODUCTION

In practice, it is often important to know the risks one faces when entering a new technology. This is particularly true for the Internet and Internet-based technologies and applications. A company or organization that considers establishing a presence on the Internet or the WWW is very likely (and well advised) to question the vulnerabilities, threats, and related risks.

Recall from Chapter 1 that a vulnerability refers to "a flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy," and that a threat refers to "a potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm" [1].

Also referring to RFC 2828, the term risk refers to "an expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result" [1]. Similarly, the term risk analysis (or risk assessment) refers to "a process that systematically identifies valuable system resources and threats to those resources, quantifies loss exposures (i.e., loss potential) based on estimated frequencies and costs of occurrence, and (optionally) recommends how to allocate resources to countermeasures so as to minimize total exposure," and the term risk management refers to "the process of identifying, controlling, and eliminating or minimizing uncertain events that may affect system resources" [1].

The individual steps in a risk management process are illustrated in Figure 21.1. On the left side, a vulnerabilities analysis must be performed. This analysis has to reveal the vulnerabilities that are relevant for a given situation (i.e., a given IT environment). On the right side, a threats analysis must be performed. A threats analysis, in turn, requires an explicit threat model; that is, a model that elaborates on who is capable and motivated to attack the system in question. In the absence of such a model, one cannot hope to estimate the threats and the corresponding risks. Note that it is something completely different to secure a corporate intranet against foreign intelligence services than it is to secure a corporate intranet against casual attacks. Based on the results of a vulnerabilities analysis and a threats analysis, a risk analysis can finally be performed. The risk analysis quantifies loss exposures based on estimated frequencies and costs of occurrence.

click to expand
Figure 21.1: The individual steps in a risk management process.

From a more general point of view, everything we do in daily life—either professionally or privately—is driven by risk management considerations. If there is no vulnerability or threat (and, consequently, no risk), we generally do not spend any time or money in security and safety. If, however, there are risks and these risks are severe or appear severe to us in terms of expected losses, we are generally willing to spend large amounts of time or money in security and safety. The point is that we are not always aware that some risk management considerations are performed in our heads. For example, if somebody tells you to jump from a building, the expected loss (i.e., the loss of your life) is generally too high to be tolerable. Consequently, you are not going to jump (at least we hope so). If, however, someone asks you for the current time, there is no loss to expect.[1] Consequently, you would tell this person the current time. All these risk management considerations are done automatically and we may not always be aware of them.

In the IT world, we are not yet accustomed to making risk management considerations. This is because the field is still new, dynamically changing, and not well understood. Also, there are hardly any statistical investigations we can use to make some long-term claims about the relevant risks. Consequently, we have to consider each risk individually. This is usually done in a labor-intensive process called formal risk analysis.

[1]There may still be a loss to expect, namely, if the question for the current time only wants to distract you so you can be robbed more easily.


Team-Fly


Internet and Intranet Security
Internet & Intranet Security
ISBN: 1580531660
EAN: 2147483647
Year: 2002
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net