Founded in 1807, JohnWiley & Sons is the oldest independent publishing company in



Download 5,45 Mb.
Pdf ko'rish
bet93/114
Sana23.07.2022
Hajmi5,45 Mb.
#845333
1   ...   89   90   91   92   93   94   95   96   ...   114
Bog'liq
chapelle a operational risk management best practices in the

Information Security Risks
201
F I G U R E 1 8 . 2
Flash questionnaire for information security assessment


202
RISING OPERATIONAL RISKS
Digital: hacking, virus
infection, phishing and other
cyberattacks
1
Errors and slips when sending
docu
m
ents (e
m
ail recipients
or attach
m
ents)
8
Physical: theft, social
engineering
2
Disaster, syste
m
s disruptions,
third-party failure
3
Digital: infiltrated e
m
ployee/
contractor
4
Physical theft, prints, verbal
infor
m
ation
5
Loss/wrong disposal of
printed docu
m
ents
9
Error or slips when
co
mm
unicating to outsiders
10
Data base, backup loss
6
Loss of devices
7
Loss of archives
11
8
5
4
6
3
1
2
9
10
11
7
Likelihood
I
m
pact
V
ery likely
Likely
Moderate
Unlikely
Trivial
Minor
Moderate
Major
Extre
m
e
Rare
F I G U R E 1 8 . 3
Information security risk assessment matrix (fictitious)
Digital: hacking, virus
infection, phishing and other
cyberattacks
1
Errors and slips when sending
docu
m
ents (e
m
ail recipients
or attach
m
ents)
8
Physical: theft, social
engineering
2
Disaster, syste
m
s disruptions,
third-party failure
3
Digital: infiltrated e
m
ployee/
contractor
4
Physical theft, prints, verbal
infor
m
ation
5
Loss/wrong disposal of
printed docu
m
ents
9
Error or slips when
co
mm
unicating to outsiders
10
Data base, backup loss
6
Loss of devices
7
Loss of archives
11
4
6
3
2
9
10
11
7
Likelihood
I
m
pact
V
ery likely
Likely
Moderate
Unlikely
Trivial
Minor
Moderate
Major
Extre
m
e
Rare
8
5
1
8
5
1
F I G U R E 1 8 . 4
Revised assessment with additional controls


Information Security Risks
203
Filter
Filter 2
Filter 3
Range of L – M – H
probability of each control
failing. Run si
m
ulations of
different possible
co
m
binations: LLL to HHH
probability of failure
L-M-H range of data
corrupted or stolen
Ti
m
e to
detection
(L-M-H)
V
olu
m
e of
data lost
Honeypot
Prevention
Resilience and recovery
Detect
Destroy
Backup
Core data
F I G U R E 1 8 . 5
Scenario structuring in cybersecurity
elements to the scenario can include detective controls, incident management and tech-
nical recovery or communication management. Including post-event mitigation will
deliver more realistic estimates and highlight the importance of crisis management as
a damage control mechanism.
M I T I G A T I O N : B E H A V I O R A L A N D T E C H N I C A L M E A S U R E S
It would require a book in its own right to fully explore the extensive variety of infor-
mation controls. Here, we highlight just some of the main steps that organizations take
to mitigate information risks.
The protection of information has three dimensions that are often referred to as
CIA: confidentiality, integrity, availability. The first two concern information security
while the third relates to business continuity and systems uptime.
There are two broad categories for information controls:

Behavioral controls: these address human behaviors and fallibility when it
comes to handling and protecting information. The controls include awareness
campaigns, rules of conduct and prudence for employees and contractors, online
training, password management, supervision and sanctions. They apply to all
types of information security risks, not just cyberattacks.

Technical controls: these relate to all technical aspects of systems, either for
prevention or for detection. Preventive controls relate to system architecture,
access, firewalls, encryption, passwords or patching and are essentially directed at


204
RISING OPERATIONAL RISKS
external threats. Detective controls provide early warnings of data leaks, whether
initiated internally or externally, like DLPD (data leak prevention and detection)
techniques.
6
Finally, mitigating controls focus on keeping redundancies and
backups offline.
7
Table 18.2 presents a non-exhaustive list of key controls for information security.
The number and intensity of the controls are also a matter of risk appetite and
consistency of choices. Although every firm will claim zero tolerance for information
security breaches, they do not necessarily have the same level of commitment to
T A B L E 1 8 . 2
Some key controls in information security

Download 5,45 Mb.

Do'stlaringiz bilan baham:
1   ...   89   90   91   92   93   94   95   96   ...   114




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish