IT Asset Valuation Risk Assessment and Control Implementation Model - Joa - Eng - 0118

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

feature

feature
IT Asset Valuation, Risk Assessment and
Control Implementation Model
The first steps in information security strategic areas required to carry out asset valuation and to
planning in any form of business are risk help measure risk and identification of the existing
management and risk evaluation. This is necessarily control gap of the company’s IT assets for regulatory,
broad, including business processes, people and management and audit purposes.
physical infrastructure, as well as the information
system. The security risk evaluation needs to The previous ontological framework briefly presents
assess the asset value to predict the impact and concepts hierarchically from asset valuation to
consequence of any damages, but it is difficult control implementation processes for a specific
to apply this approach to systems built using asset based on the summarized steps. This article
knowledge-based architectures.1 Knowledge- shows how to take the steps sensibly:
based systems attempt to represent knowledge
1. Identify the owner and custody of the asset.
explicitly via tools, such as ontologies and rules,
rather than implicitly via procedural code, the way 2. Identify and list information systems assets of
a conventional computer program does. Usually, the organization. (List all interfacing applications,
professionals face challenges to give assurance for people, hardware or other containers for each
organizations on asset valuation, risk management asset.)
and control implementation practices due to the
Containers are the place where an information
nonexistence of clear and agreed-on models and
asset or data “lives” or any type of information
procedures. The main objective of this article
asset (data) is stored transported or processed.3
is to propose simple and applicable models for
professionals to measure, manage and follow up 3. Identify the security objectives of confidentiality,
on assets, risk and controls implementation in the integrity and availability (CIA) and a weighting
organization. of the asset to conduct an impact assessment
based upon the criticality of the asset to the
An ISACA® Journal volume 5, 2016, article titled operation of the company.
“Information Systems Security Audit: An Ontological
4. Identify the asset’s security categories and its
Framework”2 briefly describes the fundamental
estimated value.
concepts (owner, asset, security objectives,
vulnerability, threat, attack, risk, control and security 5. Determine the threat and vulnerability’s
audit) and their relationships to the whole security quantitative value and rates.
audit activities/process. This article proposes
6. Estimate the probability of occurrence/likelihood
different models that help to measure and implement
of impact.
concepts objectively by using the previously
proposed ontological framework and empirical study. 7. Identify existing controls and perform a gap
The objectives are to identify risk-based auditable analysis.

Asset Identification, Valuation and


Shemlse Gebremedhin Kassa CISA, CEH Categorization
Is a systems and IT auditor for United Bank S.C. and a security
consultant for MASSK Consulting in Ethiopia. He has a Identification, valuation and categorization of
multidisciplinary academic and practicum background in business and information systems assets are critical tasks of
IT with more than 10 years of experience in accounting, budgeting, the process to properly develop and deploy the
auditing, controlling and security consultancy in the banking and
required security control for the specified IT assets
financial industries. Kassa is highly motivated and engaged in IT
(indicate data and container). Organizations or
security projects and research, and he strives to update current
systems and IT audit developments to keep up with the dynamically individuals able to implement security for assets by
changing world and ever-increasing challenge of cybercrimes and using this model must first identify and categorize
hacking. He has published articles in local and international journals the organization’s IT assets that need to be
including the ISACA Journal. protected in the security process.

ISACA JOURNAL VOL 3 1


©2017 ISACA. All rights reserved. www.isaca.org
Mapping an information asset (such as data) to all
of its critical containers leads to the technology
assets, physical records and people that are
important to storing, transporting and processing
the asset.4 The map of information assets will be
used to determine all of the information assets
that reside on a specific container. In addition, the
value of a container depends on the data that are
processed and transported (through the network)
or stored (reside) within that specific container.
Security audits should look into how the data or
information is processed, transferred and stored in
a secured manner.5

2. Reduce the likelihood.


Security audits 3. Transfer the risk (to insurance or a subcontractor).
should look into 4. Avoid the risk. (Temporarily distancing the target

how the data or from the threat summarizes the potential impact
definitions for the CIA security objectives.)
information is
This article discusses risk mitigation strategy based
processed, transferred on the CIA security objectives.
and stored in a
The overall objective of this section is to
secured manner. quantitatively measure risk impacts of an
organization’s specific IT assets and to propose
a proper mitigation strategy. Concepts from the
Risk Assessment and Management International Organization for Standardization (ISO)/
International Electrotechnical Commission (IEC)
The risk assessment comprises the qualitative ISO/IEC 27001:2013, Information technology—
assessment and quantitative measurement of Security techniques—Information security
individual risk, including the interrelationship of their management systems—Requirements,7 and
effects. Risk management constitutes a strategy empirical analysis results taken from interviews
to avoid losses and use available opportunities or, with professionals are used to illustrate various
rather, opportunities potentially arising from risk conclusions and approaches to implementation.
areas.6 Normally, no single strategy will be able Hence, quantitative measurement of risk impact is
to cover all IT asset risk, but a balanced set of implemented based on the following formula:
strategies will usually provide the best solutions.
Risk Impact = Potential Risk * Probability
Once the risk is identified, it can be evaluated as
of Occurrence
acceptable or not. If it is acceptable, no further
actions are required other than communicating and Potential Risk
monitoring the risk, but if the risk is not acceptable, This could be any type of risk that is conceivable
it must be controlled through four separate options for a business or any risk associated with an action
of prevention and/or mitigation measures: that is possible in certain circumstances. This risk
also refers to a threat or damage that may occur
1. Reduce the impact.
on operations of the business. When a business

ISACA JOURNAL VOL 3 2


©2017 ISACA. All rights reserved. www.isaca.org
undertakes any operations within a particular • CIA of information will have a minimum value of 1
industry and in specific markets, it faces potential for each. Enjoying
risk. Risk potential should be estimated without
a detailed consideration of the individual risk, at
• The value of levels for CIA are as follows: A rating this article?
of 3 is high, 2 is medium and 1 is low.
as little expense as possible.8 Potential risk is a
• Read COBIT® 5
product of total asset value, severity of vulnerability • The value of the information asset is determined
for Risk.
and severity of threat: by the sum of the three (C + I + A) attributes.
www.isaca.org/
Potential Risk = Total Asset Value * Severity cobit-risk
Based on the model, it is possible to create a matrix
of Vulnerability * Severity of Threat
for value of an asset as illustrated in figure 2.
• Learn more about,
Probability of Occurrence
discuss and
This is an estimate of how often a hazardous event Weight of Asset
collaborate on risk
occurs. The likelihood can be expressed in terms of
From interviews and the author’s practical experience, management in the
the frequency of occurrence.9 A review of historic
it can be concluded that the actual value of an asset Knowledge Center.
events assists with this determination. Each hazard
is determined by the sensitivity value of data in the www.isaca.org/risk-
is rated in accordance with the numerical ratings
container. The reason is that all similar containers management
and definitions shown10 in figure 1.
are not equally important to the organization, and
Asset Valuation the value of a container is determined by the data
This is a method of assessing the worth of the it holds, processes or transfers. For example,
organization’s information system assets based on servers with equal capacity, technology and cost
its CIA security. may have different weights due to the data they
hold, process or transfer. A database containing
Total Asset Value = Asset Value * Weight of Asset employee information may have less value than one
containing customer transactions. Equally, data on
Assumptions for asset valuation include: prominent customers may have more value than data
• The value of an asset depends on the sensitivity on ordinary/walk-in customers, based on business/
of data inside the container and their potential organizational objectives.
impact on CIA.

Figure 1—Model for Measuring Value of an Asset Based on CIA


Security Objective Low (Rating of 1) Medium (Rating of 2) High (Rating of 3)
Confidentiality Limited adverse effect on Serious adverse effect on Severe or catastrophic
The unauthorized disclosure organizational operations, organizational operations, adverse effect on
of information/data could be assets or individuals. assets or individuals. organizational operations,
expected to have a: assets or individuals.
Integrity Limited adverse effect on Serious adverse effect on Severe or catastrophic
The unauthorized modification organizational operations, organizational operations, adverse effect on
or destruction of information/ assets or individuals. assets or individuals. organizational operations,
data could be expected to assets or individuals.
have a:
Availability Limited adverse effect on Serious adverse effect on Severe or catastrophic
The disruption of access to or organizational operations, organizational operations, adverse effect on
use of information/data or an assets or individuals. assets or individuals. organizational operations,
information system could be assets or individuals.
expected to have a:
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

ISACA JOURNAL VOL 3 3


©2017 ISACA. All rights reserved. www.isaca.org
Figure 2—CIA Matrix
Confidentiality Low (1) Medium (2) High (3)
Integrity L M H L M H L M H
Low (1) 3 4 5 4 5 6 5 6 7
Availability

Medium (2) 4 5 6 5 6 7 6 7 8
High (3) 5 6 7 6 7 8 7 8 9
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

Therefore, to evaluate the sensitivity of assets, the


Figure 4—Total Asset Weight Matrix
concept of “weight” or “weighting” was developed,
which helps to measure each asset’s value based Total Asset Value
on the data it holds/processes compared to other Asset Value 3 4 5 6 7 8 9
assets. To measure the value of the asset’s weight, 1 3 4 5 6 7 8 9
the rating concepts shown in figure 3 can be
Weight 2 6 8 10 12 14 16 18
used—3 for high, 2 for medium and 1 for low—to
show value of a specific asset as compared to the 3 9 12 15 18 21 24 27
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.
another asset, based on business objectives. This
concept differentiates this approach for the asset
valuation concept. Asset Categorization
At this stage, the organization should categorize
Figure 3—Model to Measure Weight assets in three levels based on the total asset value
of an Asset determined in the total asset matrix table. The
Weight Rate Description category of an asset indicates the level of concern
Low 1 The value of data in the container is that needs to be given to that asset. Therefore,
low/nonexistent based on business more security implementation, investment or
objectives, as compared to another attention would be given to category I assets
similar container’s data value. (value of the total asset between 20 and 27) than
Medium 2 The value of data in the container to category II assets (between 12 and 18, inclusive,
is medium based on business the highlighted amounts in figure 4) and to category
objectives, as compared to another III (value of 10 or less) assets. From figure 4, it can
similar container’s data value.
be concluded that the total asset value ranges from
High 3 The value of data in the container is 3 (minimum) to 27 (maximum).
high based on business objectives,
as compared to another similar
container’s data value. Vulnerability and Threat Assessment
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.
and Rating Methodology
The presence of vulnerability does not in itself
Therefore, according to the CIA matrix and the
cause harm; vulnerability is merely a condition
weight of an asset model, it is possible to determine
or a set of conditions that could allow assets to
the following total asset value using an asset weight
be harmed by an attack.11 When a vulnerability is
matrix table as shown in figure 4.
exploited by a threat, it increases the likelihood of
attack and leads to risk.12 Vulnerability rating gives
an indication or opportunity to see the weakness
inherent or residing in the information assets of the
organization.

ISACA JOURNAL VOL 3 4


©2017 ISACA. All rights reserved. www.isaca.org
Vulnerability and threat valuation assumptions standards, poorly managed flammable liquids and
include: poor circuit insulation are some of the weaknesses
(vulnerabilities) or factors that help the fire threat to
• The same 1 to 3 rating scale will be used, in which
happen and cause damage.
a specific vulnerability or threat rated as high is
assigned a 3, medium a 2 and low a 1 (figure 5).
Exposure (attacker access to the flow) is the
• The severity of the threat and the vulnerability is potential exposure to loss, resulting from the
graded as very low (1), low (2), medium (3), high occurrence of one or more threat events. It may be
(4) and very high (5) (figure 6). disseminated across other system components.
Figure 5 depicts a model to rate the susceptibility
Vulnerability Rating Factors and exposure of a flow or vulnerability of an asset.

Vulnerability is the intersection of three elements: a To measure the overall value of the severity of
system susceptibility or flaw, attacker access to the a vulnerability, the combination of the value of
flaw, and attacker capability to exploit the flaw.13 susceptibility and exposure rating must first be
decided, as shown in figure 7. (Note: This rating
Susceptibility is simply to measure the effort table is similarly used for threat factors [impact
required to successfully exploit a given weakness. and capability rating] in the following threat
For example, fire is a threat. Poor fire prevention assessment section.)

Figure 5—Model for Susceptibility and Exposure Ratings


SUSCEPTIBILITY Rating EXPOSURE
Minor susceptibility: Vulnerability requires significant 1 Minor exposure: Effects of the vulnerability are
resources to exploit with little potential for loss. tightly contained and do not increase the probability of
additional vulnerabilities being exploited.
Moderate susceptibility: Vulnerability requires 2 Moderate exposure: Vulnerability can be expected to
significant resources to exploit with significant potential affect more than one system element or component.
for loss. Or, vulnerability requires little resources to Exploitation increases the probability of additional
exploit, moderate potential for loss. vulnerabilities being exploited.
High susceptibility: Vulnerability requires few 3 High exposure: Vulnerability affects a majority of system
resources to exploit with significant potential for loss. components. Exploitation significantly increases the
probability of additional vulnerabilities being exploited.
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

Figure 6—Model for Severity of Vulnerability Grading


Rating Grade Description
1 Very low (VL) Minor exposure, minor susceptibility
2 Low (L) Minor exposure, moderate susceptibility; or moderate exposure, minor susceptibility
3 Medium (M) Highly exposed, minor susceptibility; or minor exposure, high susceptibility; or moderate
exposure, moderate susceptibility
4 High (H) Highly exposed, moderate susceptibility; or moderate exposure, high susceptibility
5 Very high (VH) Highly exposed, high susceptibility
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

ISACA JOURNAL VOL 3 5


©2017 ISACA. All rights reserved. www.isaca.org
the threat agent’s technical ability, knowledge and
Figure 7—Model for Vulnerability Rating
(Combinations of Susceptibility and available material to exploit the vulnerability.
Exposure Rating)
As with vulnerability measurement elements
Exposure Rating
(susceptibility and exposure), rating, capability
Susceptibility Rating 1 2 3 and impact should also be considered for threat
1 1 2 3 measurement. Figure 8 shows how to use
2 2 3 4 capability and impact for threat ratings.

3 3 4 5
The model for grading the severity of the threat
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.
uses impact and capability of the threat, similar to
the severity of vulnerability matrix in figure 6 and
Threats Assessment and Rating figure 7. The only difference is susceptibility and
Methodology exposure for vulnerabilities are replaced with impact
A general list of threats should be compiled, which and capability for threat.
is then reviewed by those most knowledgeable
about the system, organization or industry to identify Risk Impact Measurement
those threats that apply to the system.14 Each threat
Risk management is the act of determining
is derived from a specific vulnerability, rather than
what threats the organization faces, analyzing
identifying threats generally without considering
the vulnerabilities to assess the threat level and
vulnerability. Measuring the value of a threat depends
determining how to deal with the risk.15 Security
on the rating value of its impact and capability.
risk management is a strategy of management to
Impacts are a forceful consequence or a strong effect
reduce the possible risk from an unacceptable to an
of the launch of a threat on the business.
acceptable level.16 There are four basic strategies
for managing risk: transference, acceptance,
Capability is a measure of a threat agent’s ability
avoidance and mitigation.17
(including the level of effort required) to successfully
attack an asset by exploiting its vulnerabilities, e.g.,

Figure 8—Model for Capability and Impact of Threat Ratings


CAPABILITY Rating IMPACT
Little or no capability such as knowledge, resource or 1 Exercise of the threat may result in the loss of some/
technical skill to launch a threat on a given information few assets or resources; may have little effect on the
asset of the organization. organization’s business continuity, immaterial financial
loss, low legal impact and low impact on business
process.
Moderate capability indicates the knowledge and 2 Exercise of the threat may result in the loss of some
skills to mount attack, but some resources are lacking. assets or resources; may have a moderate effect on
Or, knowledge is lacking, but sufficient resources to the organization’s business continuity, some material
mount an attack on a given information asset of the financial loss, average business process impact and
organization does exist. perceptible legal impact.
High capability indicates possession of knowledge, skills 3 Exercise of the vulnerability may result in the costly loss
and resources to mount an attack on an information of major assets or resources; may significantly violate,
asset of the organization. harm, or impede an organization’s mission, reputation,
or interest; or may result in serious injury or catastrophic
impact.
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

ISACA JOURNAL VOL 3 6


©2017 ISACA. All rights reserved. www.isaca.org
Risk assessment requires individuals to take charge Acceptable risk has a risk impact value of less than
of the risk management process. Risk assessment 540, which is the product of the maximum asset
is the determination of a quantitative or qualitative value (27), low vulnerability value (2), low threat
estimate of risk related to a well-defined situation and value (2) and the maximum frequency of likelihood
a recognized threat (also called a hazard). Quantitative (5). The calculation, therefore, is 27*2*2*5=540.
risk assessment requires calculations of two
components of risk: the magnitude of the potential Tolerable risk has a risk impact value ranging from
risk and the probability that the loss will occur.18 540 to 1,215, which is the product of the maximum
asset value (27), medium vulnerability value and
Risk Impact = Potential Risk * Probability
threat value (3 each), and the maximum frequency
of likelihood (5). The calculation is 27*3*3*5=1,215.
Probability or Likelihood of Risk
Intolerable risk has a risk impact value greater than
A likelihood assessment estimates the frequency of 1,215, which means the risk beyond the tolerable
a threat happening. With this type of assessment, risk amount, 1,215.
it is necessary to observe the circumstances that
will affect the probability of the risk occurring. The Control Implementation
likelihood can be expressed in terms of the frequency and Gap Analysis
of occurrence,19 which are depicted in figure 9.
A common mitigation for a technical security flaw is to
implement a patch provided by the vendor. Sometimes
Figure 9—Model for Probability or the process of determining mitigation strategies is
Likelihood of Risk called control analysis.21 Control mechanisms are used
Value Description of Probability to restrain, regulate or reduce vulnerabilities; they can
1 Never happened (has not happened in the past be corrective, detective or preventive.22 It is possible
three years) to mitigate a risk by implementing different control
2 Rare (happens once in year) techniques, but before implementing a new control, the
assessor is responsible for identifying and measuring
3 Periodic (happens once in a quarter)
the existing control and showing the gap from the
4 Regular (takes place once in a fortnight) expected control of an asset.
5 Frequent (happens once in a week)
Source: Adapted from ISO 27001 implementers forum. Reprinted with Assumptions for control valuation include:
permission.
• CIA of information has a minimum valuation of 0.
Based on the previously discussed risk analysis • The value of levels of control implementation to
concepts, risk mitigation options are acceptable, CIA are high (3), medium (2), low (1) and none (0)
tolerable and intolerable risk, the values of figure 10.
which follow.

Figure 10—Examples for Potential Risk and Risk Impact


Vulnerability Threat Risk Impact
Total Asset Value Severity Value Severity Value Potential Risk Probability Value
3 1 (VL) 1 (VL) 3*1*1=3 3 (Periodic) 3*3 = 9
9 3 (M) 3 (M) 9*3*3=81 4 (Regular) 81*4= 324
20 4 (H) 4 (H) 20*4*4=320 2 (Rare) 320*2 = 640
27 5 (VH) 5 (VH) 27*5*5=675 5 (Frequent) 675*5 = 3375
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

ISACA JOURNAL VOL 3 7


©2017 ISACA. All rights reserved. www.isaca.org
• The value of the control implementation is total amount of control measured by adding the
determined by the sum of the three attributes. value of CIA for each asset), then identification of
the possible control (the sum of a control value
Based on figure 10, a control matrix is presented in of CIA derived by considering the maximum
figure 11. technology applied to that specific asset and the
conditions to satisfy adoption of that additional
Figure 11—Model for Rating CIA control).
Control Implementation
The following formulas will calculate the “to be
Rate Security Objective
controlled risk” and the “mitigated risk”:
Confidentiality (C)—Authorized disclosure of
information was experienced.
To Be C = Maximum Possible Control –
Integrity (I)—Authorized modification or Existing Control
destruction of information was applicable.
Mitigated Risk = Risk Impact ÷ Existing Control
Availability (A)—Access to or use of
information or an information system was
No organization can ever be 100 percent secure
applicable.
or free of risk. There will always be remaining,
None (0) CIA is not implemented for the company or residual, risk. In the first example shown in
asset, operation or individuals.
figure 13, the possible control is equal to the
Low (1) CIA is limited or is at a low level of existing control (which is high for CIA). Therefore,
implementation for the company asset,
the remaining risk, 375, is residual, not mitigated
operation or individuals.
further because it already represents the maximum
Medium (2) CIA is at an intermediary level of possible control. As per the risk analysis concepts
practicability for the company asset,
operation or individuals. described in this article, the 375 risk is acceptable
because it is less than the maximum acceptable
High (3) CIA is at a strong level of achievability for the
risk level of 540.
company asset, operation or individuals.
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.
Conclusion
Figure 12 shows calculations for existing controls Managing the risk and valuation of an organization’s
and risk mitigation. valuable IT assets is the first and critical stage of
information security planning and security control
Adding controls to mitigate the risk impact first implementation. Objectively measuring concepts
requires identification of the existing control (the like vulnerability, threat, risk impact, mitigated risk

Figure 12—Control Valuation Matrix


CONTROL Integrity
CIA MATRIX
None Low Medium High
Confidentiality N L M H N L M H N L M H N L M H
N 0 1 2 3 1 2 3 4 2 3 4 5 3 4 5 6
L 1 2 3 4 2 3 4 5 3 4 5 6 4 5 6 7
Availability

M 2 3 4 5 3 4 5 6 4 5 6 7 5 6 7 8
H 3 4 5 6 4 5 6 7 5 6 7 8 6 7 8 9
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

ISACA JOURNAL VOL 3 8


©2017 ISACA. All rights reserved. www.isaca.org
Figure 13—Examples of Control Implementation
Currently Implemented Control on
The Existing
Risk Impact Confidentiality Integrity Availability Control Is Risk Mitigated to
3,375 3 (High) 3 (High) 3 (High) 9 3,375 9 = 375
540 2 (Medium) 2 (Medium) 2 (Medium) 6 540 6 = 90
2,415 0 (None) 2 (Medium) 1 (Low) 3 1,215 3 = 805
3,065 1 (Low) 1 (Low) 2 (Medium) 4 3,065 4 = 766
Source: Shemlse Gebremedhin Kassa. Reprinted with permission.

and implemented control of an asset is relatively the DifferenceBetween.com, 16 April 2011, www.
most difficult task in the process, because of a lack differencebetween.com/difference-between-
of uniformity on subjective judgments during the information-system-audit-and-vs-information-
rating selection (high, low, medium) and the quality security-audit/
and accuracy of the results are highly dependent on 6  Op cit, Foroughi
the assessors’ professional experience. The models 7 Kamat, M.; ISO27k Implementers’ Forum,
described in this article can minimize error and “Matrices for Asset Valuation and Risk
introduce uniformity of activities and process results Analysis,” 2009, http://190.90.112.209/
carried out by different individuals/organizations. estandares/ISO27k-Matrices-for-Asset-
Generally, information security risk management/ Valuation-and-Risk-Analysis.pdf
evaluation is still a very complex field of research, 8  Op cit, Foroughi
with a lot of unexplored areas. More research is 9 Ibid.
needed to explore essentials. This research work 10 Village of Briarcliff Manor, Disaster Mitigation
can be based on the model proposed in this Act 2000 Hazard Mitigation Plan, New York,
article and perhaps could be focused on creating USA, July 2007, p. 5–9, www.briarcliffmanor.
mechanical or robotic techniques to implement org/pages/BriarcliffManorNY_Trustees/HMP/
quantitative measurement, thus avoiding subjective Section%205.3%20Hazard%20Ranking%20
judgments of high, low or medium. -%20Final.pdf
11 National Information Assurance Training
Endnotes and Education Center, NIATEC Glossary,
USA, http://niatec.info/Glossary.
1 Foroughi, F., “Information Asset Valuation aspx?term=6344&alpha=V
Method for Information Technology Security 12  Op cit, Shemlse
Risk Assessment,” Proceedings of the World 13 Kiyuna, A.; L. Conyers; Cyberwarfare Source
Congress on Engineering 2008, vol. I, Book, Lulu.com, 14 April 2015, p. 42
www.iaeng.org/publication/WCE2008/ 14 Elky, S.; “An Introduction to Information
WCE2008_pp576-581.pdf System Risk Management,” SANS Institute
2 Shemlse, G. K.; “Information Systems InfoSec Reading Room, 31 May 2006,
Security Audit: Ontological Framework,” www.sans.org/reading_room/whitepapers/
ISACA® Journal Practically Speaking blog, 26 auditing/introduction-information-system-risk-
September 2016, www.isaca.org/Journal/Blog/ management_1204
Lists/Posts/Post.aspx?ID=333 15 Gregg, M.; CISSP Exam Cram 2, Pearson IT
3 Caralli, R., et al.; “Introducing OCTAVE Certification, USA, 2005
Allegro: Improving the Information Security 16  Op cit, Elky
Risk Assessment Process,” Carnegie Mellon 17 Ibid.
University, USA, May 2007, www.sei.cmu.edu/ 18 RFC 4949, Internet Security Glossary, Version
reports/07tr012.pdf 2, August 2007, https://tools.ietf.org/html/
4 Caralli, R. A.; J. F. Stevens; L. R. Young; W. rfc4949
R. Wilson; “Introducing OCTAVE Allegro: 19  Op cit, Kamat
Improving the Information Security Risk 20 Ibid.
Assessment Process,” May 2007, 21 Op cit, Gregg
www.sei.cmu.edu/reports/07tr012.pdf 22 Ibid.
5 Olivia, “Difference Between Information
System Audit and Information Security Audit,”

ISACA JOURNAL VOL 3 9


©2017 ISACA. All rights reserved. www.isaca.org

You might also like