CISM

Course
Time
8 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:02
Now, after talking about the risk register, I want to wrap up this section
00:07
with just talking a little bit about risk scenarios, because that's another important way that you identify risk.
00:14
Did you play the what if game,
00:16
and often with the wood? If gave you, start by looking at your assets. And then, like we said before things about the threats and the vulnerability.
00:25
Well, when you're looking at a large organization, there are a zillion different directions from which risk can come.
00:32
So I just want to go over kind of a handful of things to consider. We will get more technical into some of these areas when we get into Chapter three, which is the information security program. That's really where we deal with technology that I do just want to go over, You know, some ideas to think about. So for a schism, of
00:51
course, the very first thing that we care about is
00:54
business related risk and a repetition. Here's a shocker. The only thing that we care about is risk that impacts the business right. We're not running around trying to figure out every unknown that could ever happen.
01:07
We're looking to do is figure out what events are gonna impact the business in a negative way so that ideally, we can get a proactive response
01:17
on and ideally, contingency plan this Well,
01:21
all right. So when we're looking at risk, the best way to understand business related
01:25
risk is to meet with the business units, meet with senior management, understand the goals and objectives of the organization. I know you've heard this before,
01:34
but ultimately meet with them. They have The best understanding of the business is a whole look att, the organizational strategy and the organisational objectives before we start looking at risks in relation to I t.
01:49
Okay, So really, the greatest risks that we're concerned about are the ones that impact the business
01:55
Now when we determined that their I t risks that impact the business, we need to go to the business owners and senior management. And we need to stop speaking in acronyms and don't get me wrong. I love myself. An acronym.
02:08
I can throw down acronyms with the best stuff.
02:12
However, my job is to get my point across and to communicate effectively, which means I've gotta back away from the technical basement. So to speak and talk in terms of risk management,
02:24
cost benefit, analysis, return on investment, all those ideas because every process that we put in place is in alignment. So I have to have the organization
02:36
understanding. How would I'm sort of Champion
02:39
Champion
02:42
fits into the organization.
02:45
All right,
02:46
Business related risks now, hardware related risks for those of you that are a 90 close your eyes.
02:54
No peeking. Close your eyes.
02:58
I mean you.
03:00
So
03:01
if I were to ask you without looking at this list, what are some risks related to heart?
03:07
I would love to hear what you guys would say,
03:10
but I'll bet
03:13
we could. We would come up with just about everything on this list. The things that I think about with hardware first
03:20
legacy equipment, dated equipment, equipment that's not updated properly.
03:25
Um, it's not maintained or documented properly.
03:30
Incorrectly configured hardware,
03:34
um, physical access, the hard we're not being protected
03:39
unauthorized hardware on the network. I mean, we could just go and go and go with all the issues related to hardware. And then, of course, we could think about
03:49
things like lost power damaged components,
03:53
um,
03:53
improper access. Yeah. You know, we could go on and on. And this is really kind of what we do with risk scenarios. As we say, Here is a category at a time,
04:02
and this is what we think. That's how all this information is gonna ultimately populate our risk rich.
04:09
All right, So tell me about software.
04:12
Well, poorly written code code with errors code that doesn't validate input
04:16
code. That is,
04:19
um, not securely designed software that's not patched.
04:25
Lack of access control, improper use of software
04:30
rations, blah blah, blah, blah, blah. Right. We've got,
04:33
uh, risk scenarios with operating systems. The biggest risk scenario with operating systems really
04:41
is unpatched an unpatched operating system. And this isn't just for Microsoft
04:46
operating system.
04:47
Excuse me? I have some have vulnerability,
04:50
and the way we close up those vulnerabilities is to patch the system.
04:55
So we have to have a patch management strategy in place, and we've got to follow it.
05:00
This is no easy task for those of you that are familiar with Patch Tuesdays for Microsoft.
05:05
There's a whole lot of stuff out there that has patches that have to be applied. So making sure we have a good patch management strategy
05:15
once again for operating systems
05:17
default settings many kinds, particularly with some operating systems over others.
05:25
Many times like, for instance, with with Windows. I always think about Windows is having every door in the house open. And then if you want to close it, you can. You know you can shut those doors,
05:35
but by default it's designed for feasibility, ease of use and usability.
05:41
He's a bit
05:43
you will. That's money. Work
05:45
every class. I like to come up with a new word.
05:48
Um, so with our operating systems, the best thing you could do
05:53
he is
05:54
patch in,
05:56
keep him up to date in any other way. Updated and monitor.
06:00
Audit,
06:02
utility,
06:03
lack of power, improper amount of voltage, for instance.
06:10
Interruption. So we think about a UPS perhaps uninterruptible power supply to keep that power going. But remember those air very short term devices. Usually the UPS
06:21
is just going toe
06:25
is just gonna provide you power enough time for the generators to kick it.
06:29
So that certainly is not a long term solution.
06:31
Uh, we've also got to think about H phat
06:34
and making sure that we've got cooling in our server rooms,
06:40
making sure water and other
06:44
things flow out of the building instead of in. You know, we would have to think that fire safety and
06:50
fire extinguishers or fire
06:55
suppressant systems Wet pipe versus dry pie is there Possibility pipes lead.
07:01
We gotta think about for software utilities in relationship drivers, drivers get outdated.
07:09
Drivers could be compromised.
07:12
Drivers may not be compatible with all components. I mean, you could see we can just go on
07:18
and let me tell you, we could spend a month talking about risks associated with network component.
07:24
As a matter of fact, the C i S S p
07:28
If I had to sum up with the C I S S P courses,
07:30
it's pretty much on this page,
07:33
you know, thinking about risks in relationship to our network, talking about layer defense and redundancy
07:41
encryption. I mean, many of these are
07:45
domains within the C. I S S P, and I promise we'll go through this in much greater depth
07:50
once we get into the information security probe.
07:54
But right now, you know, we're really not into figuring out the likelihood and probability and going into depth here.
08:01
We just have to say, Look, once you connect the system to a network.
08:05
You have increased your risks, exponent.
08:09
Right,
08:09
The old joke. How do you secure a network computer?
08:13
Take it off the network. And that's true,
08:18
not just your system connected to the network. But once we have a network,
08:22
we have firewalls
08:24
and firewalls are in place to keep a safe. But a Miss Configured firewall
08:28
gives us a false sense of security. It may block legitimate traffic.
08:33
Lots of problems can come with firewalls. Now, when we get into the information security program, we're gonna talk about the three types of firewalls.
08:41
Primarily we think about packet filters, state ful inspection. And then we think about proxy servers. We'll talk about the difference. Is there
08:50
d N s man?
08:52
Domain naming system D. N S is the root of all good and evil
08:58
in the world.
09:01
You controlled tsz d N s controls the universe,
09:03
which means it has awesome functionality
09:07
that makes an active directory network work and helps us find the main controller's name resolution all these other wonderful things. But
09:16
if I can configure a rogue Deanna server
09:20
and trick you into using my d n a server instead of a legitimate one. I'll send you anywhere I want to.
09:26
So there are lots of ways that I could do that. One common way is called poisoning
09:31
and poisoning is all about misdirection. Poisoning means I'm gonna modify information that, you know, in trust,
09:39
um, to something that suits me. And it's almost always to send you somewhere that's not legit.
09:45
We got problems with WiFi with that access point. Same idea. If I can redirect you to an access point that's mine,
09:52
then all your information comes through my access point.
09:56
And one way to do that is by setting up an access point that's named just exactly what your legitimate access point is named.
10:03
And then whoever's closest to use what you're connected and that's called an evil twin.
10:07
So an evil twin is a tight
10:09
of rogue access,
10:13
and then we got routers and switches and villains. Oh my.
10:18
Any network component,
10:20
any element that you put on the network brings its own risk associated with it. So when it comes to looking at all these network components, we've gotta be aware of the fact that those things that were designed to be helpful
10:33
and that are helpful to us
10:35
also have specific risks associated

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor