22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

90 Lotus Security Handbook<br />

security is being reviewed may not be able to provide all the information listed,<br />

particularly about the security policy. (Indeed, there might not be a security policy<br />

in place.) This is not a big problem at this stage since the rest of the methodology<br />

calls for the creation of all these items.<br />

2. Perform a risk analysis<br />

The formula used in risk analysis is as follows:<br />

Risk = Impact + Threats + Likelihood<br />

Impact is what will happen to the business if an attack is successful, partially or<br />

completely. Threats are the people and things that can cause harm to the<br />

business. Likelihood is the degree of probability with which this can occur. The<br />

combination of the three determines how much risk the business faces on a<br />

day-to-day basis.<br />

There are five steps in the process of doing a risk analysis:<br />

1. Identify the assets of the business<br />

2. Identify the threats to the business<br />

3. Estimate the probability of occurrence<br />

4. Analyze the applicable controls and determine their associated costs<br />

5. Implement the appropriate countermeasures<br />

Some security reviews include the threat analysis as an integral part of the risk<br />

analysis. In the present methodology, threat analysis is a separate activity,<br />

because threats are usually under-evaluated and not entirely and fully<br />

understood.<br />

3. Perform a threat analysis<br />

There are two distinct steps in the process of doing a threat analysis:<br />

1. Identify the exposures (or vulnerabilities)<br />

2. Identify the controls (or countermeasures)<br />

The first step involves asking a few simple, but effective, questions: What are the<br />

vulnerabilities? Where are these vulnerabilities located? What is the likelihood of<br />

these being exploited? And, what are the impacts to the IT infrastructure and to<br />

the business?<br />

The second step involves asking these questions: What are appropriate controls<br />

for the exposures identified? How much do these controls cost? And are these<br />

controls appropriate (in terms of effort and cost)?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!