<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-451879483683975230</id><updated>2025-12-29T10:03:53.634+02:00</updated><title type='text'>ITSecurity Office</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-6533579291319564270</id><published>2011-09-26T14:09:00.002+03:00</published><updated>2011-09-26T14:11:13.607+03:00</updated><title type='text'>CRAMM (CCTA Risk Analysis Management &amp; Methodology)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;CRAMM&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; stands for &lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;C&lt;/b&gt;CTA &lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;R&lt;/b&gt;isk &lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;A&lt;/b&gt;nalysis &lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;M&lt;/b&gt;anagement &amp;amp; &lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;M&lt;/b&gt;ethodology. &lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp; &lt;/span&gt;The main reasons for the development of CRAMM were the need for a rigorous methodology and the deficient methodologies at the time, that were subjective, vulnerability driven and needed experienced personnel to operate them, while their results were less than impressive. &lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;The new methodology should be easy to understand and use, be able to be used for system development, consist an automated tool, it should contain a threat checklist &lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;ανδ&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;have the countermeasures built in. CRAMM does risk analysis by combining assets, threats and vulnerabilities to evaluate the risk involved and then it does risk management by suggesting a list of countermeasures. &lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp; &lt;/span&gt;The theoretical model of the system, that CRAMM uses, contains assets A&lt;span style=&quot;mso-text-raise: -3.0pt; position: relative; top: 3pt;&quot;&gt;k&lt;/span&gt;, threats vulnerabilities V&lt;span style=&quot;mso-text-raise: -3.0pt; position: relative; top: 3pt;&quot;&gt;i&lt;/span&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;and impacts I&lt;span style=&quot;mso-text-raise: -3.0pt; position: relative; top: 3pt;&quot;&gt;j&lt;/span&gt;.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;CRAMM has thirty-one generic threats and eight impacts.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;First we assign values to asset/impact pairs, then we identify threat/impact/asset triples, we evaluate threats and vulnerabilities (low, medium, high) and calculate the security requirement (risk) of each threat/impact/asset triple.&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;CRAMM consists of three stages: the first stage, where we scope the security problem, the second stage, where we evaluate the risk and the third stage, where we select suitable countermeasures.&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;First stage: &lt;/b&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;The evaluation of the scope of security consists of three steps.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;I.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The preparation of the project framework takes place.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;As it is the case with the whole CRAMM procedure, the security consultant that conducts the CRAMM procedure, interviews selected staff to get the information needed. At this point, the arrangement of the initial management meeting takes place, followed by the preparation of the functional specification of the system.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The project boundaries are agreed and the physical (hardware, communications, environmental, software, documentation) and data (organised interrelated data) assets are identified and documented.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Then, the organisation&#39;s structure is documented; the data users and three time periods for unavailability are identified.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;At the end of all this, the project schedule is prepared, which is the objective of this phase.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;II.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The security consultant tries to assign values to assets.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Assigning values to physical assets is not difficult, as their price is known.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;What can be difficult is the assignment of values to data assets.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;This happens because the data is only valuable to somebody during some defined period of time.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;At this point, the personnel are interviewed, so that the consultant can value the data assets.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Questionnaires and tables are used along with worst case scenarios.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;It is very important that existing countermeasures are ignored and that the interviewees provided accurate and relevant numerical input (not vague descriptions of the impact due to the lack of the data assets). When valuing assets, one should take into account the impact from political embarrassment, personal safety matters, infringement of personal privacy, failure to meet legal obligations, financial loss, disruption of activities, commercial confidentiality.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Under certain threats these impacts can become reality, causing from minor losses up to imprisonment and public humiliation.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;At the end of that phase, a data assets value summary is created.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;III.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The data results are reviewed just in case some of the value assignments do not correspond to reality.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;This can happen if the interviewees were not the appropriate ones, or if the interviewer was not experienced. At this point, the CRAMM report is printed and the consultant writes his/her own report that will be given to the management.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;In the report the consultant&#39;s understanding of the client&#39;s business must be clearly stated.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Then, all the asset valuations have to be agreed upon. &lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;The first stage can pose a series of problems such as the lengthy period it takes to complete.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Moreover, bad data grouping can occur if the interviewees or the interviewer are not the appropriate ones.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The first stage can also be bogged down in useless detail or the unavailability periods can be incorrect.&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;Second stage:&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;It is involved with the evaluation of the risk and it consists of four steps.&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;I. &lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;The threat, asset, impact relationships are identified.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;CRAMM has thirty one generic threats that cover all possible threats form accidents to malicious misconduct.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;During that step, all meaningful threat/asset combinations are found and impacts are assigned to them.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Time and space can be saved by grouping together assets.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;II.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The threats and vulnerabilities are measured by calculating the threat and vulnerability ratings.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The threat rating reflects the likelihood of a threat occurring and takes into account if the threat has happened in the past and who is interested on the assets involved.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The vulnerability rating shows if the system makes a threat more likely to happen and also if the system&#39;s nature increases the possible extent of damage.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;This rating takes into account the redundancy built into the system and how easy it is to eavesdrop.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;III.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The security requirement is calculated.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;A fixed three dimensional lookup table (matrix) is used; whose elements represent the security requirement under different settings of threat rating, vulnerability rating and asset value.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;These elements are in the range 1-5 and give the security requirement for every threat/impact/asset triple.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;IV.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The security requirement values are reviewed to avoid any errors, that would either impose unnecessary expenses for unneeded extra security or would leave the system unprotected.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Also, in case there is a limited budget factor a reasonable compromise between the cost and risk must be reached.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The problems imposed by stage two are mainly generated by the fact, that there are too many questions to be asked (approximately 600).&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The interviewees tend to get bored or be uncooperative. Also, sometimes the answers are objective, so the interview process has to be repeated.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;Third stage:&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; It is the last stage of CRAMM, where the appropriate countermeasures are selected.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;I.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; The required countermeasures are identified.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The calculated security requirement is a pointer to a set of applicable countermeasures from which &quot;sufficiently powerful&quot; countermeasures are selected.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;CRAMM contains fifty three countermeasure groups, categorised according to strength (1-5), &quot;cost&quot;, security aspect (hardware, software, communications, procedural, physical, personnel, environmental) and sub-group&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;type (to reduce threat, to reduce vulnerability, to reduce impact, to detect, to recover).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;II.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; We compare the required countermeasures with the countermeasures already installed, to find out how many new countermeasures we need to install.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b style=&quot;mso-bidi-font-weight: normal;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;III.&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt; We recommend and confirm with the management the new countermeasures and here the work with CRAMM ends.&lt;/span&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EL; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The problems we get with the third stage are that it generates a lot of output and that it is really hard to identify the already installed countermeasures, because the interviewees&#39; knowledge is sometimes inadequate, or the countermeasures are not truly installed. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The typical time scale for a CRAMM cycle ranges from six days for a small system (one computer, one application), to seventeen days for a medium system (one mini&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;computer, several applications), to thirty days for a large system (a mainframe with sites on several geographic locations). &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;One problem one can face with CRAMM, is that it requires expert knowledge, the right interviewees and to get the right balance between cost and risk, because even idiots can throw in numbers and get impressive but not appropriate results. It is also time consuming, not particularly green (consumes too much paper) and the reports are sometimes inadequate. Moreover, it doesn&#39;t really take into account the security policy of a company, the existing products and the cost of products, and the organisation culture of the company. On the other hand, CRAMM is a rigorous methodology that is becoming the Defacto standard, it is applicable to most systems, it is regularly updated and has a countermeasure database of impressive quality.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;Project&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-bidi-font-size: 12.0pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;To get the best of CRAMM, one must identify the correct people, obtain useful information, avoid getting bogged down in detail, avoid being driven by CRAMM, identify key equipment to the company, start threats&#39; and vulnerabilities&#39; identification and evaluation early and finally start the countermeasures&#39; process early.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/6533579291319564270/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/cramm-ccta-risk-analysis-management.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/6533579291319564270'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/6533579291319564270'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/cramm-ccta-risk-analysis-management.html' title='CRAMM (CCTA Risk Analysis Management &amp; Methodology)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-2169611543877020491</id><published>2011-09-25T23:09:00.001+03:00</published><updated>2011-09-25T23:10:08.780+03:00</updated><title type='text'>ISO/IEC 27005</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN&quot;&gt;ISO/IEC 27005&lt;/span&gt;&lt;span lang=&quot;EN&quot;&gt;, part of a growing family of ISO/IEC ISMS standards, the &#39;ISO/IEC 27000 series&#39;, is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC).&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN&quot;&gt;The purpose of ISO/IEC 27005 is to provide guidelines for information security risk management. It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. It does not specify, recommend or even name any specific risk analysis method, although it does specify a structured, systematic and rigorous process from analyzing risks to creating the risk treatment plan.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;At around 60 sides, ISO/IEC 27005&amp;nbsp;is a heavyweight standard although the main part is just 24 pages, the rest being mostly annexes with examples and further information for users.&amp;nbsp; There is quite a lot of meat on the bones, reflecting the complexities in this area.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Although the standard defines risk as “a combination of the consequences that would follow from the occurrence of an unwanted event and the likelihood of the occurrence of the event”, the risk analysis process outlined in the standard indicates the need to identify information assets at risk, the potential threats or threat sources, the potential vulnerabilities and the potential consequences (impacts) if risks materialize.&amp;nbsp; Examples of threats, vulnerabilities and impacts are tabulated in the annexes; although incomplete, these may prove useful for brainstorming risks relating to information assets under evaluation.&amp;nbsp; It is clearly implied that automated system security vulnerability assessment tools are insufficient for risk analysis without taking into account other vulnerabilities plus the threats and impacts: merely having certain vulnerabilities does not necessarily mean your organization faces unacceptable risks if the corresponding threats or business impacts are negligible in your particular situation. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;The standard includes a section and annex on defining the scope and boundaries of information security risk management which should, I guess, are no less than the scope of the ISMS. The standard doesn&#39;t specify, recommend or even name any specific method (such as those listed in the ISO27k FAQ), although it does specify a structured, systematic and rigorous method of analyzing risks through to creating the risk treatment plan.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;The standard deliberately remains agnostic about quantitative and qualitative risk assessment methods, essentially recommending that users choose whatever methods suit them best, and noting that they are both methods of estimating, not defining, risks.&amp;nbsp; Note the plural -&amp;nbsp; &#39;methods&#39; - the implication being that different methods might be used for, say, a high-level risk assessment followed by more in-depth risk analysis on the high risk areas.&amp;nbsp; The pros and cons of quantitative &lt;i&gt;vs&lt;/i&gt; qualitative methods do get a mention, although the use of numeric scales for the qualitative examples is somewhat confusing.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;The steps in the process are (mostly) defined to the level of inputs -&amp;gt; actions -&amp;gt; outputs, with additional “implementation guidance” in similar style toISO/IEC 27002.&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt; The standard incorporates some iterative elements &lt;i&gt;e.g&lt;/i&gt;. if the results of an assessment are unsatisfactory, you loop-back to the inputs and have another run through.&amp;nbsp; For those of us who think in pictures, there are useful figures giving an overview of the whole process and more detail on the risk assessment -&amp;gt; risk treatment -&amp;gt; residual risk bit.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Managing and measuring risk with ISO 27005&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;font-size: small;&quot;&gt;The process of managing information security risk includes many overlapping and poorly differentiated steps (or clauses, to use ISO-speak):&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Context      establishment&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk      assessment&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk      treatment&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk      acceptance&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk      communication&lt;/span&gt;&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk      monitoring and review&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;font-size: small;&quot;&gt;What, for example, is the context of risk management if not the sum of all the other steps? Does not communication of risk include monitoring and reviewing? The most aggressively confusing section of ISO 27005 is the one on risk assessment, which includes risk analysis and risk evaluation. Risk analysis in turn is made up of risk identification and risk estimation. Some (but not all) of these terms are defined in the glossary, but in so arbitrary a manner that a perfectly valid alternative approach could use the same terms in a different way or use different terms altogether and still achieve the same objective: managing risk.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Missing from ISO 27005: Risk estimation&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;font-size: small;&quot;&gt;What does not appear in the standard is the measurement of risk. It is axiomatic that what cannot be measured cannot be managed. The omission of risk measurement from the standard is significant enough that, whether mentioned or not, it must be performed by anyone seriously attempting to manage risk. Measurement is addressed indirectly by risk estimation, in the same sense that all estimates are measurements of a sort, but not vice versa &quot;About a foot&quot; is not the same as &quot;12 1/2 inches,&quot; as anyone who has ever had to cut window glass can testify.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-bottom: 6pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 150%; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;It doesn’t really add anything remarkable or special that we don’t already have in place in any number of other documents and standards.&amp;nbsp; It would seem that its only demonstrative use is for the purposes of auditing to standard compliance.&amp;nbsp; And I have to think that this is &lt;i&gt;really&lt;/i&gt; what this document is all about, something more to serve the ISMS and the cottage industry that surrounds it.&amp;nbsp;&amp;nbsp; And that’s a shame, because the field of risk management could really use someone like the ISO really putting forth a significant and good effort.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 150%; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&lt;a href=&quot;http://www.iso27001security.com/html/27005.html&quot;&gt;http&lt;span lang=&quot;EL&quot;&gt;://&lt;/span&gt;www&lt;span lang=&quot;EL&quot;&gt;.&lt;/span&gt;iso&lt;span lang=&quot;EL&quot;&gt;27001&lt;/span&gt;security&lt;span lang=&quot;EL&quot;&gt;.&lt;/span&gt;com&lt;span lang=&quot;EL&quot;&gt;/&lt;/span&gt;html&lt;span lang=&quot;EL&quot;&gt;/27005.&lt;/span&gt;html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/2169611543877020491/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/isoiec-27005.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/2169611543877020491'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/2169611543877020491'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/isoiec-27005.html' title='ISO/IEC 27005'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-2765007092029614690</id><published>2011-09-16T16:02:00.000+03:00</published><updated>2011-09-16T16:02:36.672+03:00</updated><title type='text'>TARA (the Threat Agent Risk Assessment)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;TARA (the Threat Agent Risk Assessment)&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt; is a relatively new risk-assessment framework that was created by Intel in order to help companies manage risk by distilling the immense number of possible information security attacks into a digest of only those exposures that are most likely to occur. The points here is that it would be prohibitively expensive and impractical to defend every possible vulnerability. By using a predictive framework to prioritize areas of concern, organizations can proactively target the most critical exposures and apply resources efficiently to achieve maximum results. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The TARA methodology identifies which threats pose the greatest risk, what they want to accomplish and the likely methods they will use. The methods are cross-referenced with existing vulnerabilities and controls to determine which areas are most exposed. The security strategy then focuses on these areas to minimize efforts while maximizing effect. Intel says awareness of the most exposed areas allows the company to make better decisions about how to manage risks, which helps with balancing spending, preventing impacts and managing to an acceptable level of residual risk. The TARA methodology is designed to be readily adapted when a company faces changes in threats, computing environments, behaviors or vulnerabilities. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;TARA relies on three main references to reach its predictive conclusions. One is Intel&#39;s threat agent library, which defines eight common threat agent attributes and identifies 22 threat agent archetypes. The second is its common exposure library, which enumerates known information security vulnerabilities and exposures at Intel. Several publicly available common exposure libraries are also used to provide additional data. The third is Intel&#39;s methods and objectives library, which lists known objectives of threat agents and the methods they are most likely to use to accomplish these goals. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;A main benefits deriving from TARA is that the threat agent library and the methods and objectives library can be easily used within other risk-assessment methodologies, especially if there is a need to standardize on common threat agents and corresponding methods. TARA appears to be a good tool for identifying, predicting and prioritizing threats against your infrastructure and can be used to create common libraries that can be shared among different groups.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The framework focuses on threats rather than assets, identifying more or less on what bad things can happen. This is both good and bad because by focusing on threats rather than asset value, an assessor may miss the mark in identifying true infrastructure risks. It also seems to make the assumption that the only way to view risk is from the perspective of &#39;What&#39;s the worst thing that could happen?&#39;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;A drawback of TARA is that only addresses the likelihood of threat events, but doesn&#39;t take into account the risk&#39;s impact. Another drawback of the framework is that it&#39;s new and untested. It is not very common and not widely used as a single risk management methodology but usually in conjunction with other framework. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;TARA also appears to be yet another qualitative methodology rather than one that can be used for quantitative analysis.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/2765007092029614690/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/tara-threat-agent-risk-assessment.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/2765007092029614690'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/2765007092029614690'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/tara-threat-agent-risk-assessment.html' title='TARA (the Threat Agent Risk Assessment)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-7752601041819079586</id><published>2011-09-15T12:46:00.001+03:00</published><updated>2011-09-15T12:47:37.065+03:00</updated><title type='text'>NIST RMF (National Institute of Standards and Technology&#39;s Risk Management Framework)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The &lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; font-style: normal; mso-bidi-font-style: italic;&quot;&gt;&lt;strong&gt;NIST RMF (&lt;/strong&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; font-style: normal; mso-bidi-font-style: italic; mso-bidi-font-weight: normal;&quot;&gt;&lt;strong&gt;National Institute of Standards and Technology&#39;s Risk Management Framework)&lt;/strong&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;described here comprises a mature process that has been applied in the field of risk management for almost ten years. This RMF is mostly designed to manage software-induced business risks. Through the application of five simple activities, analysts use their own technical expertise, relevant tools, and technologies to carry out a reasonable risk management approach.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The purpose of an RMF like this is to allow a consistent and repeatable expertise-driven approach to risk management. Progressing on and description of the software risk management activities in a consistent manner, the basis for measurement and common metrics emerges. Such metrics are sorely needed and should allow organizations to better manage business and technical risks given particular quality goals; make more informed, objective business decisions regarding software and improve internal software development processes so that they in turn better manage software risks. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;margin: 12pt 0cm 6pt 28.8pt; mso-list: l1 level2 lfo2; tab-stops: list 28.8pt; text-indent: -28.8pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; font-style: normal; mso-bidi-font-family: Georgia; mso-bidi-font-style: italic; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;1.&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; font-style: normal; mso-bidi-font-style: italic;&quot;&gt;Five Stages of Activity &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The RMF consists of the five fundamental activity stages:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt 35.35pt; mso-list: l0 level1 lfo3; tab-stops: 35.35pt; text-indent: -14.15pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Understand the business context.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt 35.35pt; mso-list: l0 level1 lfo3; tab-stops: 35.35pt; text-indent: -14.15pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Identify the business and technical risks.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt 35.35pt; mso-list: l0 level1 lfo3; tab-stops: 35.35pt; text-indent: -14.15pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Synthesize and prioritize the risks, producing a ranked set.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt 35.35pt; mso-list: l0 level1 lfo3; tab-stops: 35.35pt; text-indent: -14.15pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Define the risk mitigation strategy.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt 35.35pt; mso-list: l0 level1 lfo3; tab-stops: 35.35pt; text-indent: -14.15pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Carry out required fixes and validate that they are correct.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;NIST RMF&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;also&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt; outlines &lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-GB;&quot;&gt;a series of activities related to managing organizational risk&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;. These can be applied to both new and legacy information systems, according to the NIST.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The activities include: &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Categorizing information systems and the information within those systems based on impact. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Selecting an initial set of security controls for the systems based on the Federal Information Processing Standards (FIPS) 199 security categorization and the minimum security requirements defined in FIPS 200. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Implementing security controls in the systems. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Assessing the security controls using appropriate methods and procedures to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcomes with respect to meeting security requirements for the system. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Authorizing information systems operation based on a determination of the risk to organizational operations and assets, or to individuals resulting from the operation of the systems, and the decision that this risk is acceptable. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm 1.4pt 36pt; mso-line-height-alt: 5.0pt; mso-list: l2 level1 lfo1; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Symbol; mso-ansi-language: EN-US; mso-bidi-font-family: Symbol; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;Monitoring and assessing selected security controls in information systems on a continuous basis, including documenting changes to the systems, conducting security-impact analyses of the associated changes, and reporting the security status of the systems to appropriate organizational officials on a regular basis. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;margin: 1.4pt 0cm; mso-line-height-alt: 5.0pt; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;One of the primary strengths of RMF is that it was developed by the NIST, which is charged by Congress with ensuring that security standards and tools are researched, proven and developed to provide a high level of information security infrastructure. Because government agencies and the businesses that support them need their IT security standards and tools to be both cost-effective and highly adaptable, the framework is constantly being reviewed and updated as new technology is developed and new laws are passed. Furthermore, independent companies have developed tools that support the NIST standards, knowing that the basis for applications is stable; software development companies are more willing to develop application tools to support the framework. The model also helps companies determine when something exceeds a certain threshold of risk. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;; mso-ansi-language: EN-US;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;As for weaknesses, like any of these frameworks, you have to make sure that the people who are doing the risk assessment have the discipline to input reasonable data into the model so you get reasonable data outputs. After all, you cannot manage what you cannot measure and most of all, what you cannot see. Additionally, since it is not an automated tool but a documented framework, meaning that it apart from input and output dependencies, it has to do with people’s aspirations that sometimes are quite more subjective.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;margin: 0cm 0cm 6pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: &amp;quot;Georgia&amp;quot;, &amp;quot;serif&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;To sum up, the activities of identifying, tracking, storing, measuring, and reporting software risk information cannot be overemphasized. Successful use of the RMF depends on continuous and consistent identification and storage of risk information as it changes over time. A master list of risks should be maintained during all stages of RMF execution and continually revisited. Measurements regarding this master list make excellent reporting information. For example, the number of risks identified in various software artifacts and/or software life-cycle phases can be used to identify problematic areas in software process. Likewise, the number of software risks mitigated over time can be used to show concrete progress as risk mitigation activities unfold. Links to descriptions or measurements of the corresponding business risks mitigated can be used to clearly demonstrate the business value of the software risk mitigation process and the risk management framework. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/7752601041819079586/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/nist-rmf-national-institute-of.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7752601041819079586'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7752601041819079586'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/nist-rmf-national-institute-of.html' title='NIST RMF (National Institute of Standards and Technology&#39;s Risk Management Framework)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-1243211237467108100</id><published>2011-09-10T16:12:00.002+03:00</published><updated>2011-09-15T12:06:32.357+03:00</updated><title type='text'>FAIR (Factor Analysis of Information Risk)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;FAIR (Factor Analysis of Information Risk)&lt;/b&gt;&amp;nbsp;is a framework for understanding, analyzing and measuring information risk. Information security practices to date have generally been inadequate in helping organizations effectively manage information risk since there is a heavy reliance on practitioner intuition and experience.&amp;nbsp; While these are valuable, they don&#39;t consistently allow management to make effective, well-informed decisions.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;FAIR is designed to address security practice weaknesses. The framework aims to allow organizations to speak the same language about risk; apply risk assessment to any object or asset; view organizational risk in total; defend or challenge risk determination using advanced analysis; and understand how time and money will affect the organization&#39;s security profile.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The FAIR vernacular allows IT &lt;span lang=&quot;EN-GB&quot;&gt;people&lt;/span&gt; and the business lines to talk about risk in a consistent manner. One of the advantages of the framework is that it doesn&#39;t use ordinal scales, such as one-to-10 rankings, and therefore isn&#39;t subject to the limitations that go with ordinal scales, for example, &#39;high, medium and low&#39; is an example of an ordinal scale, as is &#39;red, yellow and green&#39; and &#39;one, two and three. Imagine what the result will be if you add or multiply two medium values, or add or multiply yellow plus green. It will definitely have no meaning at all, yet we see many risk calculations in our industry that do exactly that when they use addition and/or multiplication with numeric ordinal scales.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;FAIR uses dollar estimates for losses and probability values for threats and vulnerabilities. Combined with a range of values and levels of confidence, it allows for true mathematical modeling of loss exposures. Another plus is that FAIR has more detailed definitions of threats, vulnerabilities and risks. FAIR has a taxonomy that breaks down the terms on a more granular level. The taxonomy enables describing more easily and credibly how conclusions are made and that they are not based on assumptions but on actual measurable results.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The most important downside of FAIR is the fact that it can be difficult to use and it&#39;s not as well documented as some other methodologies. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Basic FAIR analysis is comprised of ten steps in four stages:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Stage 1 – Identify scenario components&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1. Identify the asset at risk&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;2. Identify the threat community under consideration&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Stage 2 – Evaluate Loss Event Frequency (LEF)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;3. Estimate the probable Threat Event Frequency (TEF)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;4. Estimate the Threat Capability (TCap)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;5. Estimate Control strength (CS)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;6. Derive Vulnerability (Vuln)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;7. Derive Loss Event Frequency (LEF)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Stage 3 – Evaluate Probable Loss Magnitude (PLM)&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;8. Estimate worst-case loss&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;9. Estimate probable loss&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Stage 4 – Derive and articulate Risk&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;10. Derive and articulate Risk&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;To sum up FAIR allows organizations to: &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in 1.4pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Speak in one language concerning their risk&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in 1.4pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Be able to consistently study and apply risk to any object or asset&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in 1.4pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;View organizational risk in total&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in 1.4pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Defend or challenge risk determination using an advanced analysis framework.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in 1.4pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;·&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Understand how time ad money will impact security profile&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/1243211237467108100/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/fair.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/1243211237467108100'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/1243211237467108100'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/fair.html' title='FAIR (Factor Analysis of Information Risk)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-9150585161003107496</id><published>2011-09-04T16:24:00.000+03:00</published><updated>2011-09-04T16:24:28.082+03:00</updated><title type='text'>OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:OfficeDocumentSettings&gt;   &lt;o:AllowPNG/&gt;   &lt;o:TargetScreenSize&gt;1024x768&lt;/o:TargetScreenSize&gt;  &lt;/o:OfficeDocumentSettings&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:DontVertAlignCellWithSp/&gt;    &lt;w:DontBreakConstrainedForcedTables/&gt;    &lt;w:DontVertAlignInTxbx/&gt;    &lt;w:Word11KerningPairs/&gt;    &lt;w:CachedColBalance/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:&quot;Table Normal&quot;;
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:&quot;&quot;;
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:&quot;Times New Roman&quot;;
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:&quot;Times New Roman&quot;;
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt; &lt;![endif]--&gt;  &lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span&gt;OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;, developed at the CERT Coordination Center at Carnegie Mellon University, is &lt;/span&gt;&lt;span lang=&quot;EL&quot;&gt;a suite of tools, techniques and methods&lt;/span&gt;&lt;span&gt; for risk-based information security strategic assessment and planning.OCTAVE defines assets as including people, hardware, software, information and systems. There are three models, including the original, which CERT says forms the basis for the OCTAVE body of knowledge and is aimed at organizations with 300 or more employees; OCTAVE-S, similar to the original but aimed at companies with limited security and risk-management resources; and OCTAVE-Allegro, a streamlined approach to information security assessment and assurance.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;The framework is founded on the OCTAVE criteria—a standardized approach to a risk-driven and practice-based information security evaluation. These criteria establish the fundamental principles and attributes of risk management. The OCTAVE methods have several key characteristics. One is that they&#39;re self-directed: Small teams of personnel across business units and IT work together to address the security needs of the organization. Another is that they&#39;re designed to be flexible. Each method can be customized to address an organization&#39;s particular risk environment, security needs and level of skill. A third is that OCTAVE aims to move organizations toward an operational risk-based view of security and addresses technology in a business context.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;Among the strengths of OCTAVE is that it&#39;s thorough and well documented, the people who put it together are very knowledgeable, and it&#39;s been around a while and is very well-defined and freely available. Because the methodology is self-directed and easily modified, it can be used as the foundation risk-assessment component or process for other risk methodologies. The original OCTAVE method uses a small analysis team encompassing members of IT and the business. This promotes collaboration on any found risks and provides business leaders [with] visibility into those risks. To be successful, the risk assessment-and-management process must have collaboration. In addition, OCTAVE&lt;span&gt;&amp;nbsp; &lt;/span&gt;looks at all aspects of information security risk from physical, technical and people viewpoints, If you take the time to learn the process, it can help you and your organization to better understand its assets, threats, vulnerabilities and risks. You can then make better decisions on how to handle those risks. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 1.4pt 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span&gt;Experts say one of the drawbacks of OCTAVE is its complexity and the fact that it doesn&#39;t allow organizations to mathematically model risk makes it a clearly a qualitative methodology.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/9150585161003107496/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/octave-operationally-critical-threat.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/9150585161003107496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/9150585161003107496'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/09/octave-operationally-critical-threat.html' title='OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-7101824123237494840</id><published>2011-08-28T14:16:00.003+03:00</published><updated>2011-09-15T15:23:32.826+03:00</updated><title type='text'>Risk Management Methods and Frameworks Part III</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The Risk Management as a continuous process&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk management is a continuous process. That is, identifying risks only once during a project is insufficient. The idea of &quot;crossing off&quot; a particular stage once it has been executed and never doing those activities again is incorrect. Though the five stages are represented in a particular serial order, they may need to be applied over and over again throughout a project, and their particular ordering may be interleaved in many different ways.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Risk management should be a continuous and developing process which runs throughout the organization’s strategy and the implementation of that strategy. It should address methodically all the risks surrounding the organization’s activities past, present and in particular, future.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;It must be integrated into the culture of the organization with an effective policy and a program led by the most senior management. It must translate the strategy into tactical and operational objectives, assigning responsibility throughout the organization with each manager and employee responsible for the management of risk as part of their job description. It supports accountability, performance measurement and reward, thus promoting operational efficiency at all levels.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The Risk Management Frameworks&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0cm; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Assessing and managing risk is a high priority for many organizations, and given the turbulent state of information security vulnerabilities and the need to be compliant with so many regulations, it&#39;s a huge challenge. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;Several formal &lt;b&gt;IT risk-assessment frameworks&lt;/b&gt; have emerged over the years to help guide security and risk executives through the process. &lt;/span&gt;These include: &lt;span lang=&quot;EL&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0cm; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&lt;/span&gt;Factor Analysis of Information Risk (FAIR)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The National Institute of Standards and Technology&#39;s (NIST) Risk Management Framework (RMF)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;-moz-font-feature-settings: normal; -moz-font-language-override: normal; font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Threat Agent Risk Assessment (TARA)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;ISO/IEC 27005&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EL&quot;&gt;C&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EL&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;CTA &lt;b&gt;R&lt;/b&gt;isk &lt;b&gt;A&lt;/b&gt;nalysis &lt;b&gt;M&lt;/b&gt;anagement &amp;amp; &lt;b&gt;M&lt;/b&gt;ethodology (&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;CRAMM)&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0cm 1.4pt 36pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;Default&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; margin: 1.4pt 0cm; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Here&#39;s a look at these key frameworks and some of their strengths and weaknesses, with emphasis on input from those who have used them in real-world settings. The information in clearly indicative and does not suggest that these frameworks are the only and best ones. In many cases people have also used hybrid of two and sometimes three of these frameworks to manage their risks. What makes that a valuable technique is the simultaneous use of qualitative and quantitative frameworks to leverage results to the best possible outcome. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/7101824123237494840/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/08/risk-management-methods-and-frameworks_28.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7101824123237494840'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7101824123237494840'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/08/risk-management-methods-and-frameworks_28.html' title='Risk Management Methods and Frameworks Part III'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-7339473909746931167</id><published>2011-08-16T16:06:00.006+03:00</published><updated>2011-08-17T11:56:47.032+03:00</updated><title type='text'>Risk Management Methods and Frameworks Part II (continued)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 12pt 36pt; mso-hyphenate: auto; mso-line-height-alt: 13.5pt; mso-list: l1 level1 lfo2; mso-pagination: widow-orphan; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;div closure_uid_h0rlc7=&quot;106&quot;&gt;&lt;b&gt;&lt;span closure_uid_h0rlc7=&quot;154&quot; closure_uid_r3sd58=&quot;108&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; mso-ansi-language: EN-GB; mso-bidi-font-family: Arial; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt;&quot;&gt;3.&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt; Analyze risks&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; closure_uid_h0rlc7=&quot;135&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span closure_uid_ck8c1k=&quot;96&quot; closure_uid_r3sd58=&quot;96&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Identify the controls (currently in place) that deal with the identified risks and assess their effectiveness.&lt;span closure_uid_r3sd58=&quot;130&quot; style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;Based on this assessment, analyse the risks in terms of likelihood and consequence.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Refer to the Risk Matrix to assist you in determining the level of likelihood and consequence, and the current risk level (a combination of likelihood and consequence). &lt;/span&gt;&lt;span closure_uid_r3sd58=&quot;131&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Large numbers of risks will be apparent in almost any given system. Identifying these risks is important, but it is the prioritization of these risks that leads directly to creation of value. Synthesis and prioritization should be driven to answer questions such as &quot;What shall we do first given the current risk situation?&quot; and &quot;What is the best allocation of resources, especially in terms of risk mitigation activities?&quot; Clearly, the prioritization process must take into account which business goals are the most important to the organization, which goals are immediately threatened, and how likely technical risks are to manifest themselves in such a way as to impact the business. This stage creates as its output a list of all the risks and their appropriate priority for resolution. Typical risk metrics include, but are not limited to, risk likelihood, risk impact, risk severity, and number of risks emerging and mitigated over time. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; closure_uid_vv5qmn=&quot;117&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;div closure_uid_r3sd58=&quot;138&quot;&gt;&lt;span closure_uid_r3sd58=&quot;137&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The analysis stage assigns each risk a significance rating taking into account any existing factors which will operate to control the risk. For simple risk statements, where the risk can be expressed as an uncertain event, this can be accomplished with qualitative impact and likelihood scales and a matrix defining the significance of various combinations of these. Where risks are complex in themselves, possibly involving several related events and influences, some form of modelling may be necessary.&lt;/span&gt;&lt;span closure_uid_r3sd58=&quot;139&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt; No matter how risks are described in detail, the outcome of this stage is an initial view of the significance of the identified risks. It is recognised that, particularly with simple scoring schemes, risks can be honestly assigned too high or too low a significance on the first pass. The next stage is designed to review this assignment and adjust it where necessary.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;div closure_uid_r3sd58=&quot;140&quot;&gt;&lt;strong&gt;&lt;span closure_uid_h0rlc7=&quot;136&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;&amp;nbsp;4. Evaluate risks&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span closure_uid_r3sd58=&quot;141&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;This stage of the risk assessment process determines whether the risks are acceptable or unacceptable.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;This decision is made by the person with the appropriate authority.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;A risk that is determined as acceptable should be monitored and periodically reviewed to ensure it remains acceptable.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;A risk deemed unacceptable should be treated.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;In all cases the reasons for the assessment should be documented to provide a record of the thinking that led to the decisions.&lt;span closure_uid_r3sd58=&quot;142&quot; style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Such documentation will provide a useful context for future risk assessment. Where there are only a few risks at work, the evaluation stage might be relatively light weight. &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;However, in complex situations and where there are many risks to consider, it is a crucial step towards achieving an agreed view of the relative importance of the identified risks. Evaluation takes the initial analysis and reviews it against the organisation’s known priorities and requirements. Any risks which have been accorded too high or too low a significance are adjusted, with a record of the fact being retained for tracing purposes. It is common to find a large number of minor risks being identified, and during evaluation these can be removed from the process, after due consideration. This screening avoids the process being bogged down by the sheer volume of information it can generate.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;div closure_uid_18etuz=&quot;119&quot;&gt;&lt;b&gt;&lt;span closure_uid_18etuz=&quot;118&quot; closure_uid_h0rlc7=&quot;157&quot; closure_uid_vv5qmn=&quot;151&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif; mso-ansi-language: EN-GB; mso-bidi-font-family: Arial; mso-bidi-language: AR-SA; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-GB; mso-font-kerning: 0pt;&quot;&gt;5. Determine the treatments for the risks&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div closure_uid_18etuz=&quot;119&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; closure_uid_h0rlc7=&quot;141&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;div closure_uid_r3sd58=&quot;144&quot;&gt;&lt;span closure_uid_h0rlc7=&quot;140&quot; closure_uid_r3sd58=&quot;143&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Treatment strategies will be directed towards:&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; closure_uid_vv5qmn=&quot;147&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoHeader&quot; style=&quot;margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; tab-stops: list 36.0pt center 216.0pt right 432.0pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span closure_uid_h0rlc7=&quot;155&quot; style=&quot;mso-list: Ignore;&quot;&gt;a)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;Avoiding the risk by discontinuing the activity that&amp;nbsp; generates it,&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;(rarely an option when providing services to the public),&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; tab-stops: list 36.0pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;b)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span closure_uid_h0rlc7=&quot;156&quot; lang=&quot;EN-US&quot;&gt;Reducing the likelihood of the occurrence,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; tab-stops: list 36.0pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span closure_uid_h0rlc7=&quot;148&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span closure_uid_h0rlc7=&quot;147&quot; style=&quot;mso-list: Ignore;&quot;&gt;c)&amp;nbsp;R&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;educing the consequences of the occurrence, &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; tab-stops: list 36.0pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;d)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span closure_uid_r3sd58=&quot;145&quot; lang=&quot;EN-US&quot;&gt;Transferring the risk, and&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt 36pt; mso-list: l0 level1 lfo1; tab-stops: list 36.0pt; text-align: justify; text-indent: -18pt;&quot;&gt;&lt;div closure_uid_r3sd58=&quot;147&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;mso-bidi-font-family: Georgia; mso-fareast-font-family: Georgia;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;e)&amp;nbsp;R&lt;/span&gt;&lt;/span&gt;&lt;span closure_uid_r3sd58=&quot;146&quot; lang=&quot;EN-US&quot;&gt;etaining the risk.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin: 0cm 0cm 0pt; text-align: justify;&quot;&gt;&lt;div closure_uid_r3sd58=&quot;149&quot;&gt;&lt;span closure_uid_r3sd58=&quot;148&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Potential treatment options are developed according to the selected treatment strategy.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;The selection of the preferred treatment options takes into account factors such as the costs and effectiveness. The determination of the preferred treatments also includes the documentation of implementation details (eg responsibilities, a timetable for implementation and monitoring requirements). &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;The intention of these risk treatments is to reduce the risk level of unacceptable risks to an acceptable level (ie: the target risk level).&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;Use the Risk Matrix to determine the expected reduction in level of risk (expected consequence, likelihood and Target risk level) resulting from the successful implementation of the treatment. &lt;/span&gt;&lt;span closure_uid_r3sd58=&quot;150&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Given a set of risks and their priorities from stage three, the next stage is to create a coherent strategy for mitigating the risks in a cost effective manner. Any suggested mitigation activities must take into account cost, time to implement, likelihood of success, completeness, and impact over the entire corpus of risks. A risk mitigation strategy must be constrained by the business context and should consider what the organization can afford, integrate, and understand. &lt;/span&gt;&lt;/div&gt;&lt;div closure_uid_r3sd58=&quot;149&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div closure_uid_r3sd58=&quot;149&quot;&gt;&lt;span closure_uid_r3sd58=&quot;151&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Risk treatment consists of determining what will be done in response to the identified risks. Any &lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;plans which were in place before the risk management process began, are augmented with measures to deal with risks before they arise and contingency plans with which to recover if a risk comes to pass. In addition to these supplementary plans, treatment might also include alteration of the base plans of an organisation. Occasionally the best way to treat a risk might be to adopt an alternative strategy all together, to avoid a risk or make the organisation less vulnerable to its consequences. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;There is a final step in the risk management process that is not identified in the actual process but it is more of continues process joining and maintaining step. Some methodologies though suggest it is a formal step of the whole process.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div closure_uid_r3sd58=&quot;149&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; closure_uid_vv5qmn=&quot;148&quot; style=&quot;margin: 0cm 0cm 6pt; text-align: justify;&quot;&gt;&lt;div closure_uid_h0rlc7=&quot;150&quot;&gt;&lt;div closure_uid_r3sd58=&quot;153&quot;&gt;&lt;span closure_uid_vv5qmn=&quot;149&quot; lang=&quot;EN-US&quot;&gt;&lt;strong&gt;&lt;span closure_uid_vv5qmn=&quot;152&quot;&gt;&lt;span closure_uid_h0rlc7=&quot;158&quot;&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp; &lt;span closure_uid_18etuz=&quot;111&quot; closure_uid_h0rlc7=&quot;151&quot;&gt;Monitoring and review&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div closure_uid_r3sd58=&quot;153&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div closure_uid_r3sd58=&quot;153&quot;&gt;&lt;span closure_uid_r3sd58=&quot;129&quot; lang=&quot;EN-US&quot; style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;There are two levels of the monitoring and review step of the process. The outputs of the other five steps should be monitored and reviewed as times progresses. The original assessment might be out of date if variables of the environment change. However, there is not necessary to run the whole process over and over again just only the steps that are required to update the changes made. The second part of the process is the monitoring step, which is the monitoring of the output of the other five steps. The execution of the risk management process absorbs resources and must be managed to ensure it is cost effective.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/7339473909746931167/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/08/risk-management-methods-and-frameworks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7339473909746931167'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7339473909746931167'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/08/risk-management-methods-and-frameworks.html' title='Risk Management Methods and Frameworks Part II (continued)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-7178995849642245981</id><published>2011-05-29T18:42:00.002+03:00</published><updated>2011-05-29T18:48:06.378+03:00</updated><title type='text'>Risk Management Methods and Frameworks Part II (continued)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; line-height: 13.5pt; margin-bottom: 12pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The steps involved in managing risk are:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin: 0in 0in 12pt 0.5in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;1.&lt;span style=&quot;font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot;&gt;Establish Goals and Context&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;As outlined in the Risk Management process, the risk assessment is undertaken within the context of your goals.&amp;nbsp; The identification / validation of your goals is therefore a critical first step in the risk management process.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Effective risk management requires a thorough understanding of the context in which your company, department or Agency operates.&amp;nbsp; The analysis of this operating environment enables you to define the parameters within which the risks to your outputs need to be managed.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The context sets the scope for the risk management process.&amp;nbsp; The context includes strategic, organizational and risk management considerations.&amp;nbsp; According to the international Standards and best practices strategic context defines the relationship between the organizations and its environment.&amp;nbsp; Factors that influence the relationship include financial, operational, competitive, political (public perceptions / image), social, client, cultural and legal.&amp;nbsp; The definition of the relationships is usually communicated through frameworks such as the SWOT (Organizational strengths, weaknesses, opportunities and threats) and PEST (Political, Economic, Societal, and Technological).&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The organizational context provides an understanding of the organization, its capability and goals, objectives and strategies.&amp;nbsp; According to International Standards and best practices, organizational context is important because:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-left: 0.25in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;a)&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-size: small; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;risk management occurs within the context of endeavoring to achieve the goals and objectives,&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-left: 0.25in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;b)&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-size: small; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;failure to achieve the objectives is one set of risks that need to be managed, and&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; margin-left: 0.25in; text-align: justify; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;c)&lt;/span&gt;&lt;span style=&quot;font-size-adjust: none; font-size: small; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;the goals and strategies assist to define whether a risk is acceptable or unacceptable.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The risk management context defines that part of the organization (goals, objectives, or project) to which the risk management process is to be applied.&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;b&gt;&lt;span lang=&quot;EN-GB&quot;&gt;&amp;nbsp;&amp;nbsp; 2. Identify Risks&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;    &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Identify the risks most likely to impact on your outputs, together with their sources and impacts.&amp;nbsp; It is important to be rigorous in the identification of sources and impacts as the risk treatment strategies will be directed to sources (preventive) and impacts (reactive).&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Business risks directly threaten one or more of a customer&#39;s business goals. The identification of such risks helps to clarify and quantify the possibility that certain events will directly impact business goals. Business risks have impacts that include direct financial loss, damage to brand or reputation, violation of customer or regulatory constraints, exposure to liability, and increase in development costs. The severity of a business risk should be expressed in terms of financial or project management metrics. These include, but are not limited to, market share (%), direct cost, level of productivity, and cost of rework. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Business risk identification helps to define and steer use of particular technical methods for extracting, measuring, and mitigating software risk given various software artifacts. The identification of business risks provides a necessary foundation that allows software risk (especially impact) to be quantified and described in business terms. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoBodyText&quot; style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The key to making risk management work for business lies in tying technical risks to business context in a meaningful way. The ability to identify and deeply understand risks is thus essential. Uncovering and recognizing technical risks is a high-expertise undertaking that usually requires years of experience. &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/7178995849642245981/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/05/risk-management-methods-and-frameworks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7178995849642245981'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/7178995849642245981'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/05/risk-management-methods-and-frameworks.html' title='Risk Management Methods and Frameworks Part II (continued)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-3586601874009465565</id><published>2011-03-30T12:50:00.004+03:00</published><updated>2011-05-29T18:46:42.978+03:00</updated><title type='text'>Risk Management Methods and Frameworks Part II</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;&lt;b&gt;Risk Management Framework&amp;nbsp; &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;A continuous risk management process is a necessary part of any approach to Information security. Information security risk includes risks found in artifacts during assurance activities, risks introduced by insufficient process, and personnel related risks. A risk management framework is an essential philosophy for approaching security work. Following the risk management framework introduced here is by definition a full life-cycle activity. For the purposes of this description, consider risk management a high-level approach to iterative risk analysis that is deeply integrated throughout the system&amp;nbsp; development life cycle.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This Risk Management Framework described here is a mixed version of the both qualitative and quantitative frameworks combined to create a more open framework that includes advantages and excludes disadvantages of&amp;nbsp; qualitative and quantitative approaches. This is accomplished through the application of five simple stages, relevant technical expertise, tools, and technologies that produce a reasonable risk management approach.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Risk Management Framework Stages &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;This Risk Management Framework consists of the five fundamental&amp;nbsp; stages shown in Figure 1:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;1.Establish the business context and goals&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;2.Identify the business risks.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;3.Analyze and prioritize the risks.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;4.Evaluate the risks.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;5.Define the risk treatment strategy.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjhLLIVAmTgvRXs1t9esS39zetRtvZFNwJvrquNQAOHKV9ehxDDUtvNz1IMsIPu7qTZvCFzBBNsdMRuop2qZvobR02UsF67J5OjX-ayj2IsqwAudlCRKGId91-Z40Gr8kbppibp6AeHBo/s1600/Risk+Management+Framework.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;307&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjhLLIVAmTgvRXs1t9esS39zetRtvZFNwJvrquNQAOHKV9ehxDDUtvNz1IMsIPu7qTZvCFzBBNsdMRuop2qZvobR02UsF67J5OjX-ayj2IsqwAudlCRKGId91-Z40Gr8kbppibp6AeHBo/s640/Risk+Management+Framework.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Figure 1&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif; text-align: justify;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Preceding the five stages we also have an activity that cannot be omitted from the approach. Above the afore mentioned five stages we introduce the communicate and consult activity. Consultation and communication are both key components of the risk&amp;nbsp; management process and a major beneficial side effect. Successful risk&amp;nbsp; management relies on achieving a high level of creative input and involving all parties with a role to play in achieving a successful outcome for the project or business process being addressed. In both the planning and execution of the risk management process, it is important to ensure that all those who need to be involved are given adequate opportunity to do so and are kept informed of developments in the understanding of risks and the measures taken to deal with them.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Following the five steps of this Risk Management Framework is another activity that includes monitoring&amp;nbsp; and reviewing the success of the treatment process and take the necessary actions to sustain this status. There are two levels to the underlying monitoring and review component of the process. The outputs of the other five stages must be kept under review as time moves on. Changes in the environment or simply the discovery of better information might make the original assessment out of date. It is not generally necessary to begin the whole process over again when this happens, unless the change is significant, but those parts which are directly affected by changing circumstances must be brought up to date. The second component of this part of the process, is the monitoring of the operation of the other five stages. The execution of the risk management process absorbs resources and must be managed to ensure that it is conducted cost-effectively.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/3586601874009465565/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/03/continuous-risk-management-process-is.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/3586601874009465565'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/3586601874009465565'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/03/continuous-risk-management-process-is.html' title='Risk Management Methods and Frameworks Part II'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjhLLIVAmTgvRXs1t9esS39zetRtvZFNwJvrquNQAOHKV9ehxDDUtvNz1IMsIPu7qTZvCFzBBNsdMRuop2qZvobR02UsF67J5OjX-ayj2IsqwAudlCRKGId91-Z40Gr8kbppibp6AeHBo/s72-c/Risk+Management+Framework.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-451879483683975230.post-4161886449114044682</id><published>2011-02-08T23:36:00.016+02:00</published><updated>2011-05-29T18:47:03.903+03:00</updated><title type='text'>Risk Management Methods and Frameworks Part I</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Risk and Vulnerability Assessment Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt; &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;In the international business environment, where decision-making follows a risk-based approach and business efficiency relies on the right balance, Information Security risk assessment is essential.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Risk Assessment services provide focus on identifying the threats and vulnerabilities regarding the security of corporate information, evaluating their potential impact on the business and recommending the appropriate mitigation controls to manage the risk.&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;color: black;&quot;&gt; Risk and vulnerability management services provide organizations with the preventative, detective, and corrective measures needed to help limit the frequency and impact of security incidents.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Risk and vulnerability assessment can help management in decision making on Information Security, regarding the evaluation of policies effectiveness, and the selection of cost-effective mitigation controls to manage the risk of potential harm. &lt;/span&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;color: black;&quot;&gt;Assessing organization&#39;s current security state is an integral step to securing sensitive data and meeting regulatory requirements.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Corporate Information Security Risk Assessment&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;Complete Information Security Risk Assessment using a structured methodology, best practices and strong quality procedures, involving the entire corporate environment. This service provides an assessment, which examines the level of security provided by the majority of information systems, networks, and applications. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Security Risk Assessment focuses on assisting organization&#39;s to detect any security weaknesses and sensitive spots of critical systems in the network. It also examines the effectiveness and completeness of Information Security controls (either technical or procedural).&lt;/span&gt;&lt;span lang=&quot;EN-GB&quot; style=&quot;color: black;&quot;&gt; Security experts provide a thorough analysis of the organization&#39;s current security state, based on the globally-recognized ISO 27001 standard and industry best practices and a specific actionable plan to improve overall security posture based on the business needs.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;Information Security Management Framework Implementation&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;The design and implementation of the organization’s Information Security framework including the relevant policies, standards, procedures, guidelines and organizational structures, as well as the determination of controls requirements, must be adequate enough to enforce the required level of Information Security, throughout the organization. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;Organizations can take advantage standards and best practices, in order to implement the required Information Security infrastructure leading to the achievement of the organization’s desirable level of security. The significance and the level of protection required, depends on the nature and value of the corporate information. &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;color: black; font-size: small;&quot;&gt;This framework results in the establishment and enforcement of an effective Information Security Management System that safeguards information against unauthorized use, disclosure, modification, damage or loss.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://itsecurityoffice.blogspot.com/feeds/4161886449114044682/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/02/risk-assessment-methods-and-frameworks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/4161886449114044682'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/451879483683975230/posts/default/4161886449114044682'/><link rel='alternate' type='text/html' href='http://itsecurityoffice.blogspot.com/2011/02/risk-assessment-methods-and-frameworks.html' title='Risk Management Methods and Frameworks Part I'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>