Time
3 hours 20 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:05
Hey, everybody. My name is Peter Sip alone, and this is the network Security course. This is going to be module three, lesson three. And in this lesson, we're gonna look at risk management.
00:18
The prerequisites for this course are modules 12 and three module one being the introduction module to being the core foundational cybersecurity principles and module three lessons one and two, where we took a look at data leakage prevention and incident response.
00:41
In this video, we're going to learn all about the process of risk management.
00:50
So what the heck is risk?
00:53
Risk could be simply defined as a function of the likelihood off a given threat, sources exercising a potential vulnerability and the resulting impact off that adverse event on the organization.
01:07
Simply put, risk management is the process of identifying the risk, assessing their impacts to the organization, determining how likely they are going to happen and who needs to be notified for when this happens and
01:22
how to prevent this by implementing controls to reduce the amount of risk and organization faces.
01:29
So a couple of rolling key terms I wanted to find really quickly, which will help with the risk management overview. So the first is likelihood. This is the probability that a potential vulnerability may be exercised. There's this is just a simple usually, you know, percent percent chance
01:48
that a particular vulnerability might happen.
01:51
Threat source is the intent and method targeted at intentional exploitation of vulnerability.
01:57
Vulnerability itself is simply a weakness in security procedures, designs, controls or implementations. We took a good look at vulnerabilities way back and module to, and we took a look at the C V East
02:12
impact, the magnitude of harm that could be caused, an asset,
02:16
anything of value that is owned by an organization. This includes things as hardware systems, people data, things like that
02:30
now risk management overview. This is how risk comes about. You start with the threat source thes the bad guys. These guys want to execute a threat on your organization.
02:42
They do this by exploiting a vulnerability,
02:46
and this exploitation of the vulnerability usually has an adverse impact on your organization. And all of these, combined with likelihood of this happening, constitute risk.
03:05
Now, obviously, the first step in the risk management process is the risk assessment we need to figure out where the risk is what the risk is, so we know how to deal with the risk and handle it properly. So we do that by obviously taking an assessment. First step is to prepare for the assessment.
03:23
This assesses threats to
03:25
information systems, system vulnerabilities, weaknesses in the likelihood that these threats will actually be exploited.
03:35
Step two is to actually conduct the assessment. This is where you identify threats, sources and events. Find any vulnerabilities that might be working in your systems. Figure out what is the probability of this actually happening and determine how bad are devastating. The impact could be
03:54
if the occurrence actually happens, and from there we can determine the risk.
04:00
After we conduct the assessment, we can communicate our results. Usually we have to communicate a results to upper management the directors sea level people. Just so they are aware of what's going on in the organization, and then, obviously we need to maintain our assessment.
04:18
This means performing a risk assessment somewhat on a frequent basis
04:21
and updating the risk factors when changes are made inside a system or organisation. Now, this is the NIST process for taking a risk assessment.
04:36
So risk assessment. A couple of things to note about this Thean pact can be measured in either quantitative or qualitative terms. I know it could be kind of difficult to put a dollar amount to impact, but there are several formulas that you can use to help you on the way.
04:55
The first is the single loss expectancy for Melo, which is simply the asset value times the exposure factor. So this is the value of the asset, whether it be human being, Ah, computer data, anything like that. Times the exposure factor. How exposed is it
05:15
on a network? How exposed is it to an organization?
05:18
How dangerous is it's usually number between one and 100.
05:23
Then you also have the annualized loss expectancy, the Ailey, and this is simply the SLE times. The annual rate of occurrence annual rate of currents is a probability of how many times you think this vulnerability or this impact would happen in a given year.
05:47
So this right here is a risk assessment matrix. This can help determine whether your risk levels are low, medium or high. As you can see here in the calm on the left,
06:02
we have to threat likelihood like what is the probability off this actually happening?
06:08
And across the top we have the impact. What air be low impact, medium impact or high impact. Now these two factors combined result in this matrix, and they have low, medium or high factors, depending on the threat, likelihood and the
06:26
amount of impact this could have on an organization.
06:30
Now for the low, low risk ones, you can determine what or not you want to accept the risk, or maybe mitigating further.
06:39
The medium ones really mean that it should be. You should look at your controls. At that point. You should look at what's going on in your organization and kind of figure out. What can we do to reduce this risk in a meaningful timeframe so you don't wanna waste if it's a medium. If you have the risk assessment comes out as a medium,
06:57
then you definitely don't want to waste any time you want to. Just
07:00
you won't do it in a reasonable time frame. Essentially now, if the risk assessment comes out, it's high. Then. This is something you want to take care of immediately. This should be a priority, and you want to reduce that risk level down to medium or even low, preferably
07:16
so. There's different ways of handling. Brisk on the four main ones are risk mitigation where you implement some sort of control or design or change in your organisation to basically eliminate the risk you have risk transference. This is where you
07:35
transfer your risk to 1/3 party.
07:39
This is usually how kind of insurance insurance works, where, if something happens, they're on the hook for and not you. You have the risk avoidance. This means completely avoiding the risk. Whether it be you have to get rid of a system, get rid of some data.
07:55
In other words, you want to shed the risk completely so you don't have to
07:59
do anything with it. Or if the risk is love enough, you can accept the risk. You can accept the risk and be like, OK, you know this might happen, but the probability of it happening and the impact aren't very high. So I think we could take a chance and just accept it for what it is.
08:18
In this video,
08:18
we discussed the risk management process, how to calculate risk and how to handle risk
08:28
quiz time,
08:30
single loss expectancy is the expected monetary loss to an organization from a threat to an asset. How is this calculate?
08:39
Is it a the exposure factor? Times a roo
08:43
Be threat Likelihood. Times the exposure factor.
08:46
See exposure factor times the asset value, or d the asset value times the annual rate of currents.
08:56
If you said, see exposure factor times the asset value, then you would be correct. Remember, the exposure factor is how exposed an asset is to an organization to the outside world or to the Internet, and this is usually number between 100.
09:15
And obviously the asset value
09:16
is just the value of that asset, whether it be data hardware, some type of system or even a human being. I hope you guys learned a lot in this lesson, and I'll see you next time.

Up Next

Cyber Network Security

In the Cyber Network Security course, students will get an overview of key principles of cybersecurity and learn about different threats, regulations, and cybersecurity ethical considerations.

Instructed By

Instructor Profile Image
Pete Cipolone
Cyber Security Analyst and Programmer
Instructor