In: Computer Science
Conducting a Risk Assessment You will be given a list of organisation in week 3 by your lecturer and you can select any one organisation from them. The organisation uses various IT systems for its daily operations. Assume that you are appointed as an IT Systems Auditor for the chosen organisation and you are asked to provide a risk register must come up for the IT systems in the organisation. A brief introduction of the organisation and the IT systems Identify and explain any major risk in the IT systems components Discuss the consequences of the risk Inherent risk assessment, that is the assessed, raw/ untreated risk inherent in a process or activity without doing anything to reduce the likelihood or consequence Mitigate the risk Residual risk assessment, that is the assessed, risk in a process or activity in terms of likelihood and consequence after controls are applied to mitigate the risk. Create a Risk Register based on the risks identified in the IT systems and prioritise of the risk using a standardised framework such as the ANSI B11.0.TR3 Risk Assessment Matrix Given the fact there is no clear prioritisation framework NOR risk appetite framework, the risk register is your professional assessment of the likelihood and consequence of the risks you identify. When preparing your risk register you should think carefully about the assets the chosen organisation may have and how these may be compromised from the perspective of Information Security. The given organisation is Alliance Insurance.
Risk assessments are used to identify, estimate and prioritize risks to organizational operations and assets resulting from the operation and use of information systems.
Risk assessment is primarily a business concept and it is all about money. You have to first think about how your organization makes money, how employees and assets affect the profitability of the business, and what risks could result in large monetary losses for the company. After that, you should think about how you could enhance your IT infrastructure to reduce the risks that could lead to the largest financial losses to organization.
Basic risk assessment involves only three factors: the importance of the assets at risk, how critical the threat is, and how vulnerable the system is to that threat. Using those factors, you can assess the risk—the likelihood of money loss by your organization. Although risk assessment is about logical constructs, not numbers, it is useful to represent it as a formula:
Risk = Asset X Threat X Vulnerability
Nevertheless, remember that anything times zero is zero — if, for example, if the threat factor is high and the vulnerability level is high but the asset importance is zero (in other words, it is worth no money to you), your risk of losing money will be zero.
There are multiple ways to collect the information you need to assess risk. For instance, you can:
To begin risk assessment, take the following steps:
Find all valuable assets across the
organization that could be harmed by threats in a way that results
in a monetary loss. Here are just a few examples:
• Servers
• Website
• Client contact information
• Partner documents
• Trade secrets
• Customer credit card data