Dr. Jack Freund is a leading voice in cyber risk measurement and management. As VP, Head of Cyber Risk Methodology for BitSight, Jack has overall responsibility for the systemic development and application of frameworks, algorithms, and quantitative and qualitative methods to measure cyber risk. Previously, Jack was Director of Risk Science at quantitative risk management startup RiskLens and Director of Cyber Risk for TIAA. Jack holds a Ph.D. in Information Systems from Nova Southeastern University, a Masters in Telecommunication and Project Management, and a BS in CIS. Jack has been named a Senior Member of the IEEE and ACM, a Fellow of the IAPP and FAIR Institute, and a Distinguished Fellow of the ISSA. He is the 2020 recipient of the (ISC)2 Global Achievement Award, 2018 recipient of ISACA's John W. Lainhart IV Common Body of Knowledge Award, and the FAIR Institute's 2018 FAIR Champion Award.
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk of any size or complexity. Intended for organizations that need to either build a risk management program from the ground up or strengthen an existing one, this book provides a unique and fresh perspective on how to do a basic quantitative risk analysis. Covering such key areas as risk theory, risk calculation, scenario modeling, and communicating risk within the organization, Measuring and Managing Information Risk helps managers make better business decisions by understanding their organizational risk. - Uses factor analysis of information risk (FAIR) as a methodology for measuring and managing risk in any organization. - Carefully balances theory with practical applicability and relevant stories of successful implementation. - Includes examples from a wide variety of businesses and situations presented in an accessible writing style.
Front Cover 1
Measuring and Managing Information Risk 4
Copyright 5
Contents 6
Acknowledgments by Jack Jones 10
About the Authors 12
Preface by Jack Jones 14
WHAT THIS BOOK IS NOT, AND WHAT IT IS 14
Preface by Jack Freund 16
Chapter 1 - Introduction 20
HOW MUCH RISK? 20
THE BALD TIRE 21
ASSUMPTIONS 21
TERMINOLOGY 22
THE BALD TIRE METAPHOR 24
RISK ANALYSIS VS RISK ASSESSMENT 24
EVALUATING RISK ANALYSIS METHODS 25
RISK ANALYSIS LIMITATIONS 27
WARNING—LEARNING HOW TO THINK ABOUT RISK JUST MAY CHANGE YOUR PROFESSIONAL LIFE 28
USING THIS BOOK 29
Chapter 2 - Basic Risk Concepts 32
POSSIBILITY VERSUS PROBABILITY 32
PREDICTION 35
SUBJECTIVITY VERSUS OBJECTIVITY 36
PRECISION VERSUS ACCURACY 42
Chapter 3 - The FAIR Risk Ontology 44
DECOMPOSING RISK 46
LOSS EVENT FREQUENCY 47
THREAT EVENT FREQUENCY 48
CONTACT FREQUENCY 49
PROBABILITY OF ACTION 50
VULNERABILITY 51
THREAT CAPABILITY 52
DIFFICULTY 53
LOSS MAGNITUDE 54
PRIMARY LOSS MAGNITUDE 56
SECONDARY RISK 57
SECONDARY LOSS EVENT FREQUENCY 58
SECONDARY LOSS MAGNITUDE 59
ONTOLOGICAL FLEXIBILITY 59
Chapter 4 - FAIR Terminology 62
RISK TERMINOLOGY 62
THREAT 64
THREAT COMMUNITY 67
THREAT PROFILING 69
VULNERABILITY EVENT 81
PRIMARY AND SECONDARY STAKEHOLDERS 81
LOSS FLOW 82
FORMS OF LOSS 84
Chapter 5 - Measurement 94
MEASUREMENT AS REDUCTION IN UNCERTAINTY 94
MEASUREMENT AS EXPRESSIONS OF UNCERTAINTY 96
BUT WE DON’T HAVE ENOUGH DATA…AND NEITHER DOES ANYONE ELSE 99
CALIBRATION 103
EQUIVALENT BET TEST 104
Chapter 6 - Analysis Process 110
THE TOOLS NECESSARY TO APPLY THE FAIR RISK MODEL 110
HOW TO APPLY THE FAIR RISK MODEL 111
PROCESS FLOW 112
SCENARIO BUILDING 112
THE ANALYSIS SCOPE 115
EXPERT ESTIMATION AND PERT 118
MONTE CARLO ENGINE 120
LEVELS OF ABSTRACTION 122
Chapter 7 - Interpreting Results 124
WHAT DO THESE NUMBERS MEAN? (HOW TO INTERPRET FAIR RESULTS) 124
UNDERSTANDING THE RESULTS TABLE 126
VULNERABILITY 128
PERCENTILES 128
UNDERSTANDING THE HISTOGRAM 129
UNDERSTANDING THE SCATTER PLOT 129
QUALITATIVE SCALES 130
HEATMAPS 132
SPLITTING HEATMAPS 134
SPLITTING BY ORGANIZATION 135
SPLITTING BY LOSS TYPE 136
SPECIAL RISK CONDITIONS 137
UNSTABLE CONDITIONS 138
FRAGILE CONDITIONS 138
TROUBLESHOOTING RESULTS 139
Chapter 8 - Risk Analysis Examples 142
OVERVIEW 142
INAPPROPRIATE ACCESS PRIVILEGES 142
PRIVILEGED INSIDER/SNOOPING/CONFIDENTIALITY 147
PRIVILEGED INSIDER/MALICIOUS/CONFIDENTIALITY 149
CYBER CRIMINAL/MALICIOUS/CONFIDENTIALITY 161
UNENCRYPTED INTERNAL NETWORK TRAFFIC 169
PRIVILEGED INSIDER/CONFIDENTIALITY 172
NONPRIVILEGED INSIDER/MALICIOUS 183
CYBER CRIMINAL/MALICIOUS 190
WEBSITE DENIAL OF SERVICE 194
ANALYSIS 196
BASIC ATTACKER/AVAILABILITY 205
Chapter 9 - Thinking about Risk Scenarios Using FAIR 212
THE BOYFRIEND 213
SECURITY VULNERABILITIES 214
WEB APPLICATION RISK 217
CONTRACTORS 219
PRODUCTION DATA IN TEST ENVIRONMENTS 221
PASSWORD SECURITY 222
BASIC RISK ANALYSIS 224
PROJECT PRIORITIZATION 233
SMART COMPLIANCE 244
Going into business 246
CHAPTER SUMMARY 249
Chapter 10 - Common Mistakes 250
MISTAKE CATEGORIES 250
CHECKING RESULTS 250
SCOPING 251
DATA 254
VARIABLE CONFUSION 254
MISTAKING TEF FOR LEF 255
MISTAKING RESPONSE LOSS FOR PRODUCTIVITY LOSS 255
CONFUSING SECONDARY LOSS WITH PRIMARY LOSS 256
CONFUSING REPUTATION DAMAGE WITH COMPETITIVE ADVANTAGE LOSS 256
VULNERABILITY ANALYSIS 257
Chapter 11 - Controls 260
OVERVIEW 260
HIGH-LEVEL CONTROL CATEGORIES 260
ASSET-LEVEL CONTROLS 264
VARIANCE CONTROLS 272
DECISION-MAKING CONTROLS 281
CONTROL WRAP UP 291
Chapter 12 - Risk Management 292
COMMON QUESTIONS 293
WHAT WE MEAN BY “RISK MANAGEMENT” 294
DECISIONS, DECISIONS 298
SOLUTION SELECTION 305
A SYSTEMS VIEW OF RISK MANAGEMENT 306
Chapter 13 - Information Security Metrics 312
CURRENT STATE OF AFFAIRS 312
METRIC VALUE PROPOSITION 313
BEGINNING WITH THE END IN MIND 314
MISSED OPPORTUNITIES 338
Chapter 14 - Implementing Risk Management 354
OVERVIEW 354
A FAIR-BASED RISK MANAGEMENT MATURITY MODEL 355
GOVERNANCE, RISKS, AND COMPLIANCE 369
RISK FRAMEWORKS 375
ROOT CAUSE ANALYSIS 384
THIRD-PARTY RISK 392
ETHICS 393
IN CLOSING 394
Index 396
A 396
B 396
C 397
D 398
E 398
F 399
G 399
H 400
I 400
J 400
K 400
L 400
M 401
N 402
O 403
P 403
Q 404
R 404
S 407
T 408
U 409
V 409
W 410
Z 410
Preface by Jack Freund
FIGURE P.1 IT risk job skills.
Erscheint lt. Verlag | 23.8.2014 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Wirtschaft ► Betriebswirtschaft / Management ► Wirtschaftsinformatik | |
ISBN-10 | 0-12-799932-9 / 0127999329 |
ISBN-13 | 978-0-12-799932-6 / 9780127999326 |
Haben Sie eine Frage zum Produkt? |
Größe: 8,6 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
Größe: 9,6 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich