|
|
High Business Impact
Impact on the confidentiality, integrity, or availability of these assets
causes severe or catastrophic loss to the organization. Impact may be expressed
in raw financial terms or may reflect indirect loss or theft of financial
instruments, organization productivity, damage to reputation, or significant
legal and regulatory liability. The following list offers a few examples within
the HBI class:
- Authentication credentials Such as passwords, private
cryptographic keys, and hardware tokens.
- Highly sensitive business material Such as financial data and
intellectual property.
- Assets subjected to specific regulatory requirements Such as
GLBA, HIPAA, CA SB1386, and EU Data Protection Directive.
- Personally identifiable information (PII) Any information that
would allow an attacker to identify your customers or employees or know any
of their personal characteristics.
- Financial transaction authorization data Such as credit card
numbers and expiration dates.
- Financial profiles Such as consumer credit reports or personal
income statements.
- Medical profiles Such as medical record numbers or biometric
identifiers.
To protect the confidentiality of assets in this class, access is intended
strictly for limited organizational use on a need-to-know basis. The number of
people with access to this data should be explicitly managed by the asset owner.
Equitable consideration should be given to the integrity and availability of
assets in this class.
Moderate Business Impact
Impact on the confidentiality, integrity, or availability of these assets
causes moderate loss to the organization. Moderate loss does not constitute a
severe or catastrophic impact but does disrupt normal organizational functions
to the degree that proactive controls are necessary to minimize impact within
this asset class.
Moderate loss may be expressed in raw financial terms or include indirect
loss or theft of financial instruments, business productivity, damage to
reputation, or significant legal and regulatory liability. These assets are
intended for use for specified groups of employees and/or approved non-employees
with a legitimate business need. The following represent examples within the MBI
class:
- Internal business information Employee directory, purchase
order data, network infrastructure designs, information on internal Web
sites, and data on internal file shares for internal business use only.
Low Business Impact
Assets not falling into either the HBI or MBI are classified as LBI and have
no formal protection requirements or additional controls beyond standard best
practices for securing infrastructure. These assets are typically intended to be
widely published information where unauthorized disclosure would not result in
any significant financial loss, legal or regulatory problems, operational
disruptions, or competitive business disadvantage.
Some examples of LBI assets include but are not limited to:
- High-level organization structure.
- Basic information about the IT operating platform.
- Read access to publicly accessible Web pages.
- Public cryptographic keys.
- Published press releases, product brochures, white papers, and documents
included with released products.
- Obsolete business information or tangible assets.
Organizing Risk Information
Risk involves many components across assets, threats, vulnerabilities, and
controls. The Risk Assessment Facilitator must be able to determine which risk
component is being discussed without interfering with the flow of the
conversation. To help organize the discussion, use the risk discussion template
(SRMGTool1-Data Gathering Tool.doc) included in the Tools section to help
attendees understand the components within risk. The template also assists the
Risk Assessment Note Taker in capturing risk information consistently across
meetings.
The template can be populated in any sequence. However, experience shows that
observing sequence in terms of the following questions helps discussion
participants understand the components of risk and uncover more information:
- What asset are you protecting?
- How valuable is the asset to the organization?
- What are you trying to avoid happening to the asset (both known threats
and potential threats)?
- How might loss or exposures occur?
- What is the extent of potential exposure to the asset?
- What are you doing today to reduce the probability or the extent of
damage to the asset?
- What are some actions that we can take to reduce the probability in the
future?
To the information security professional, the previous questions translate
into specific risk assessment terminology and categories used to prioritize
risk. However, the stakeholder may not be fluent with such terms and is not
responsible for prioritizing risk. Experience shows that avoiding information
security terminology such as threats, vulnerabilities, and countermeasures
improves the quality of discussion and helps non technical participants not to
feel intimidated. Another benefit of using functional terms to discuss risk is
to reduce the possibility of other technologists debating subtleties of specific
terms. At this point in the process, it is much more important to understand the
larger risk areas than to debate competing definitions of threat and
vulnerability. The Risk Assessment Facilitator should wait until the end of the
discussion to resolve questions around risk definitions and terminology.
Organizing by Defense-in-Depth Layers
The Risk Assessment Note Taker and Facilitator will collect large amounts of
information. Use the defensein-depth model to help organize discussions
pertaining to all elements of risk. This organization helps provide structure
and assists the Security Risk Management Team in gathering risk information
across the organization. An example of defense-in-depth layers is included in
the risk discussion template and illustrated in Figure 4.2 below. The section
titled "Organizing Control Solutions" in Chapter 6, "Implementing Controls and
Measuring Program Effectiveness," includes a more detailed description of the
defense-in-depth model.
|
Call Now : 800-519-
2267
Testimonials
|
If you're serious about getting certified,
this is the place to go. Definitely worth
their competitive price. Excellent
instructors, making it possible for anyone
to learn no matter what your level of
experience or knowledge.
Michael Doty
|
|
|
|
|
|
MCITP Boot Camp
,
MCSE Boot camp,
CCNA Boot Camp,
Upgrade to MCITP Boot
camp,
MCITP Enterprise admin
Certification
Boot camp Training.
All
rights reserved. ©1998 - 2015, Vibrant Worldwide Inc.
MCITP Boot camp
UK
MCITP Camp
Thailand
MCITP
RHCE Boot Camp India
MCSE Boot Camp - Proven Boot camp for MCSE at Baltimore, Maryland
MCITP, MCSE, CCNA, Certification n training guide, how mcse mcitp
ccna boot camp works
MCSE Boot Camp Proven MCSE Boot camp Training for MCSE
Certification Fast
MCSE Boot Camp Card Payment by Paypal
CCNA 801 Boot Camp by Vibrant boot camps, join MCSE camps
CCNA Boot Camp by Vibrant boot camps, join MCSE camps
CCNP Boot Camp by Vibrant boot camps, join CCNP camps
MCSE MCITP CCNA Boot Camp Card Payment by Paypal
MCSE MCITP Boot Camp location
comaprision between USA, UK, India and Thailand
MCSE Boot Camp compare Vibrant boot camps with other boot camp
provider
Comptia Security+ Boot Camp by Vibrant boot camps, join MCSE
camps
MCSE Boot Camp contact Vibrant boot camps
MCSE Boot Camp course fees Vibrant boot camps, join MCSE camps
MCSE Boot Camp FAQ by Vibrant boot camps, join MCSE camps
MCSE Boot Camp provide your Feedback here
MCSE CCNA CCNP Boot Camp inquire we call back
MCSE Boot Camp location San Francisco and Baltimore
MCITP Boot Camp MCITP 14days
all_incl MCITP Certifiation boot camp
MCITP Boot Camp MCITP Benefits
MCITP Certifiation boot camp
MCITP Boot Camp MCITP curriculum
MCITP Certifiation boot camp
MCITP Boot Camp MCITP bootcamp
details MCITP Certifiation camp
MCITP Boot Camp MCITP exam detail
MCITP Certifiation boot camp
MCSE Boot Camp MCSE Certification Camp also MCSE Training Boot
Camp
MCSE Benefits join MCSE Boot Camp by Vibrant boot camps
MCSE Curriculum join MCSE Boot Camp
MCSE Exam Detials join MCSE Boot Camp
MCSE boot camp details, join MCSE camps
MCSE MCITP Boot Camp MCSE MCITP 18days 8 Certifiation boot camp
MCSE MCITP combo Boot Camp MCITP
MCSE Benefits MCITP Certifiation boot camp
MCITP MCSE Boot Camp MCITP
curriculum MCITP Certifiation boot camp
MCSE MCITP Boot Camp MCITP MCSE
bootcamp details MCITP Certifiation camp
MCSE MCITP Boot Camp MCITP MCSE
exam detail MCITP Certifiation boot camp
MCSE MCITP CCNA Boot Camp MCSE
MCITP CCNA 23days 9 Certifiation boot camp
MCSE Security Boot Camp MCSE
14days all_incl MCSE Certifiation boot camp
MCSE Security certification benefits join boot camp now
MCSE Security Boot Camp Curriculum join MCSE camps
MCSE Security Exam Detail join MCSE boot camps
MCSE Security Boot Camp Details for MCSE Certification
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCITP Boot Camp, CCNA Boot Camp
reason to join Vibrant boot camp
MCSE Boot Camp Refunds
MCSE CCNA CCNP Boot Camp Register. Join MCSE CCNA Boot Camp today
MCSE CCNA CCNP thailand bangkok Boot Camp Register. Join Thailand
MCSE CCNA Boot Camp today
MCSE Schedule CCNA Scedule CCNP Boot Camp Schedule
MCITP Boot Camp, MCSE Boot camp, CCNA Boot Camp, Special offer
Vibrant boot camp
MCSE Boot Camp Testimonials by Vibrant boot camps
MCSE Boot Camp location San Francisco and Baltimore
Virbant Boot Camp thank You Trasaction successfull
MCSE Boot Camp upgrade win2008 mcse camps
Microsoft Vista Certification Boot
Camp for Vista training boot camps
MCSE Boot Camp location San Francisco and Baltimore
bootcamp_schedule.php
cardpay.php
CCNA-boot-camp.php
certification-courses.php
certified-ethical-hacker-ceh-certified-EC-council.php
cisco-certification-courses.php
comptia_a+_bootcamp_course.php
comptia_a+_network+_boot_camp.php
comptia-certification-courses.php
compTia-network+.php
compTia-security+.php
contact_us.php
course_fees.php
course_template.php
faq_camp.php
guarantee.php
how-boot-camp-works.php
index.php
join-vibrant-as-trainer.php
locations.php
mcsa_server_2012_r2_boot_camp.php
mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-azure-track.php
mcse-cloud-platform-infrastructure-security-with-mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-with-mcsa-windows-server-2012-R2-training-certification-boot-camp.php
mcse-productivity-exchange-server-2016.php
microsoft-certification-courses.php
microsoft-mcse-messaging-certification-training-course.php
msca-windows-2016-upgrade.php
msce-windows-2008-to-2016-upgrade.php
msce-windows-2016-upgrade.php
mta-it-infrastructure-windows-server-training-certification.php
onsite-training.php
our-clients.php
photogallery.php
reason_to_join_vibrant_boot_camp.php
recaptchalib.php
refund.php
register.php