Computer Security notes- Risk Identification
Risk Identification
Why is it a concern?
Security will never be perfect, there is always a weakness to be exploited
A business must be able to spend effectively- money spent vs potential lost for security
The higher the likelihood and impact, the higher the risk to the business
The general lifecycle
This will contain the risk planning, identification and assessment, treatment and monitoring
All of which should be documented
Methods of risk identification
Vulnerability analysis- penetration testing
Threat analysis
Event tree analysis
Attack trees
Decision trees
The image shows the threat in white then vulnerability and finally control
Threat trees
Analysis with a tree structure
Basic threat followed by sub threats
Attack tree
Very similar
Top level attack is identified, then sub attacks
Note the prices; they help to identify the cheapest attacks and most expensive
So someone could cut open at a cost of 10k
Whereas to get target to state, would cost 150k
Comments
Post a Comment