Question

In: Operations Management

An important part of many federal information security regulations, such as the Gramm-Leach-Bliley Act, is to...

An important part of many federal information security regulations, such as the Gramm-Leach-Bliley Act, is to identify and assess threats against information systems. Define and explain the following concepts associated with this process: threats, threat assessment, threat analysis, threat risk, and threat probability.

Solutions

Expert Solution

Solved!

1.

THREATS-In Information Security threats can be many like Software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

Threat can be anything that can take advantage of a vulnerability to breach security and negatively alter, erase, harm object or objects of interest.

Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many users believe that malware, virus, worms, bots are all same things. But they are not same, only similarity is that they all are malicious software that behave differently.

Malware is a combination of 2 terms- Malicious and Software. So Malware basically means malicious software that can be an intrusive program code or a anything that is designed to perform malicious operations on system.
Types of The Threats of Information System Security
1.11.1 Unauthorized Access (Hacker and Cracker)
One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data
2.11.2 Computer Viruses
Computer virus is a kind of nasty software written deliberately to enter a computer without the user’s permission or knowledge ,with an ability to duplicate itself ,thus continuing to spread .
3.11.3 Theft
The loss of important hardware, software or data can have significant effects on an organization’s effectiveness .
4.11.4 Sabotage
With regard to information systems , damage may be on purpose or accidental and carried out an individual basis or as an act of industrial sabotage .


2.

THREAT ASSESSMENT-A threat assessment is an evaluation of events that can adversely affect operations and/or specific assets. Historical information is a primary source for threat assessments, including past criminal and terrorist events.
A threat assessment is a tool used by law enforcement, government, industry, and most security professionals. These can be very detailed and comprehensive written documents, or simply an awareness of the potential threats faced in various situations. Security guards can utilize this information at the beginning of their duty.

A comprehensive threat assessment considers actual, inherent, and potential threats.

1.
Actual Threats
a.
The crime history against an asset or at a facility where the asset is located. Actual threats are a quantitative element of a threat assessment.

b.
Relevant crimes on the premises (three to five years prior to the date of the incident).

c.
Relevant crimes in the immediate vicinity of the facility (three to five years prior to the date of the incident).


2.
Inherent Threats

Threats that exist by virtue of the inherent nature or characteristics of the facility or nature of the operation. For example, certain types of facilities or assets may be a crime magnet or prone to loss, damage, or destruction (e.g., assaults among patrons in nightclubs, infant abductions from hospital nurseries, etc.).

3.
Potential Threats

Threats which exist by virtue of vulnerabilities around the asset or weaknesses in the security program which produce opportunities for crime to occur.


3.

THREAT ANALYSIS-Threat analysis is a process in which the knowledge of internal and external information vulnerabilities pertinent to a particular organization is matched against real-world cyber attacks. With respect to cyber security, this threat-oriented approach to combating cyber attacks represents a smooth transition from a state of reactive security to a state of proactive one. Moreover, the desired result of a threat assessment is to give best practices on how to maximize the protective instruments with respect to availability, confidentiality and integrity, without turning back to usability and functionality condition.

Components of Threat Analysis as a Process:
a.)

Scope
Scope gives info on what is included and what is not in the analysis. In terms of cyber security, items under consideration are those that must be protected. Although they need to be identified in the first place, the level of sensitivity of what is being guarded should be defined as well by analysis drafters.

b.)

Data Collection
In every respectable organization there are some sort of policies and procedures. Those need to be identified for compliance purposes. In reality, almost one-fourth of the defensive capabilities corporations have in place fail to meet the minimum security standards. In the opinion of Art Gilliland, a senior vice president of security products unit of Hewlett-Packard, “[t]he reason for that is that they were often pushing to meet a policy – checkboxing for compliance.”

c.)

Threat/Vulnerability Analysis of Acceptable Risks
Here we test what is being gathered to determine the level of current exposure — most of all — whether the current defences are solid enough to neutralize information threats in terms of availability, confidentiality and integrity. This part should include as well an evaluation of whether the existing procedures, policies and security measures are adequate. Vulnerability analysis also encompasses penetration testing, which in turn seeks to acquire something valuable from the adversary’s arsenal like a classified document, code or password.

d.)

Mitigation & Anticipation
When all previous steps are completed, a competent security analyst can use this corpus of threat data to arrange in groups activity patterns of close similarity, attribute each pattern to specific threat actors, promptly implement mitigation measures, and anticipate the emergence of similar cyber attacks in the future.

4.THREAT RISK-

The potential for loss, damage or destruction of an asset as a result of a threat exploiting a vulnerability.
Risk is a function of threats exploiting vulnerabilities to obtain, damage or destroy assets. Thus, threats (actual, conceptual, or inherent) may exist, but if there are no vulnerabilities then there is little/no risk. Similarly, you can have a vulnerability, but if you have no threat, then you have little/no risk.

Accurately assessing threats and identifying vulnerabilities is critical to understanding the risk to assets.

5.THREAT PROBABILITY-

A threat occurrence is a possibility – nothing more, nothing less. The CSO can believe that a certain threat does in fact exist but cannot be sure of it, yet believe the threat will impact the organization but cannot be sure of that either. The CSO can believe that should the threat occur the company will experience loss of some type.

Estimating the probability of occurrence has no reliance on mathematical models, equations, or formulas. Precise numerical quantification is never possible when the factors under examination are influenced in the main by human behavior. A good deal of the analytical input comes from knowing the current nature of a threat, tapping into one’s base of experience, and applying old-fashioned common sense.


Related Solutions

Question 23 40 pts (TCO 9) An important part of many federal information security regulations, such...
Question 23 40 pts (TCO 9) An important part of many federal information security regulations, such as the Gramm-Leach-Bliley Act, is to identify and assess threats against information systems. Define and explain the following concepts associated with this process: threats, threat assessment, threat analysis, threat risk, and threat probability.
identify 3 regulations, Defense Acquisition Policies, or Federal Acquisition Regulations (FARs) that are important to engineering...
identify 3 regulations, Defense Acquisition Policies, or Federal Acquisition Regulations (FARs) that are important to engineering 1) Explain why any of the regulation is very important for an engineering project? 2) Provide an example of each regulation or policy and how it affected an Engineering project.
Regulations in Long-Term Care There are many federal and state regulations when it comes to long-term...
Regulations in Long-Term Care There are many federal and state regulations when it comes to long-term care.Using the South University Online Library and the Internet, research any four specific regulations related to long-term care and summarize them. Based on the regulations you identified, respond to the following questions: What are the benefits and shortcomings of your identified regulations? Which of these shortcomings have an effect on the quality and the cost of health care services? How? Do you believe there...
One part of the McCarran-Ferguson Act was that it ___________. A.        designated the Federal Reserve as...
One part of the McCarran-Ferguson Act was that it ___________. A.        designated the Federal Reserve as the primary regulator of all insurance companies. B.         designated the SEC as the primary regulator of insurance companies. C.         has served to keep the primary regulation of all insurance companies at the state level. D.        initiated “variable” life insurance products. E.         instituted capital regulations for insurance companies.
1.What effect did the passage of the Social Security Act of 1935 have on the federal...
1.What effect did the passage of the Social Security Act of 1935 have on the federal government's role in health and welfare? What aspects of the original Social Security Act can be seen in present-day social welfare programs? 2.How does the changing shape of the American economy change the shape of American poverty? 3.If you had the power to eradicate poverty in the United States, what is the single most important strategy that you would put in place to do...
As a part of the federal Clean Air Act Amendments Congress established a national goal of...
As a part of the federal Clean Air Act Amendments Congress established a national goal of preventing future and resolving existing regional haze in national parks and wilderness areas when the visibility impairment results from manmade air pollution. The law requires states to submit implementation plans to the United States Environmental Protection Agency (EPA). The implementation plans must include identifying major industrial sources of air pollution that have caused or contributed to visibility impairment in national park and wilderness areas....
briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or...
briefly describe your experience with HIPAA privacy or security regulations. Do you think too many or not enough resources are devoted to protecting health information? Why or why not? Explain fully. please 300 words
The field of health information is subject to many laws, regulations, requirements, and standards. The interaction...
The field of health information is subject to many laws, regulations, requirements, and standards. The interaction between regulation and health influences the daily operations of healthcare providers. Sharing data between two separate organizations can be a delicate balance between the patient and organizations. Knowing the regulations that govern health information and the release of information is imperative. Failing to adhere to and think about the rules and regulations when forming decisions and policy can expose the organization and provider to...
Find the regulations issued pursant to IRC Section 382. How many regulations are there? How many...
Find the regulations issued pursant to IRC Section 382. How many regulations are there? How many are final regulations? proposed regulations? temporary regulations? properly cite oen of these type of regulations.
Symposium is part of a larger work referred to as Plato's Dialogues. Wishart and Leach† found...
Symposium is part of a larger work referred to as Plato's Dialogues. Wishart and Leach† found that about 21.4% of five-syllable sequences in Symposium are of the type in which four are short and one is long. Suppose an antiquities store in Athens has a very old manuscript that the owner claims is part of Plato's Dialogues. A random sample of 485 five-syllable sequences from this manuscript showed that 129 were of the type four short and one long. Do...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT