MODULE 4 - IAS - CruzReykklan

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Reykklan Cejalvo Cruz

III-BSIT-B
Learning Activity No. 1 (Module 4)
If an organization has three information assets to evaluate for risk management, as shown in the
accompanying data, which vulnerability should be evaluated for additional controls first? Which one
should be evaluated last?

Data for Exercise:


1. Switch L47connects a network to the Internet. It has two vulnerabilities: it is susceptible to
hardware failure at a likelihood of 0.2, and it is subject to an SNMP buffer overflow attack at a
likelihood of 0.1. This switch has an impact rating of 90 and has no current controls in place. You
are 75 percent certain of the assumptions and data.
2. Server WebSrv6 hosts a company Web site and performs e-commerce transactions. It has a
Web server version that can be attacked by sending it invalid Unicode values. The likelihood of
that attack is estimated at 0.1. The server has been assigned an impact value of 100, and a
control has been implanted that reduces the impact of the vulnerability by 75 percent. You are
80 percent certain of the assumptions and data.
3. Operators use an MGMT45 control console to monitor operations in the server room. It has no
passwords and is susceptible to unlogged misuse by the operators. Estimates show the
likelihood of misuse is 0.1. There are no controls in place on this asset; it has an impact rating of
5. You are 90 percent certain of the assumptions and data.

Answer:
1. Set A
Value of the asset = 90
Vulnerability = 0.1
Current control = 0
Uncertainty = 25%

Formula:
Risk=(likelihood of occurrence of vulnerability * value of the information asset) –[(likelihood of
occurrence of vulnerability * value of the information asset)* (% of risk mitigated by
current controls)]+[(likelihood of occurrence of vulnerability * value of the information asset)
* (uncertainty of current knowledge of vulnerability)]

Solution:
Risk = (90 * 0.1) - [(90 * 0.1) * 0] + [(90 * 0.1) * 25%)]

= 9 - 0 + 2.25
= 11.25

Set B
Value of the asset = 90
Vulnerability = 0.2
Current control = 0
Uncertainty = 25%

Formula:
Risk=(likelihood of occurrence of vulnerability * value of the information asset) –[(likelihood of
occurrence of vulnerability * value of the information asset)* (% of risk mitigated by
current controls)]+[(likelihood of occurrence of vulnerability * value of the information asset)
* (uncertainty of current knowledge of vulnerability)]

Solution:
Risk = (90 * 0.2) - [(90 * 0.2) * 0] + [(90 * 0.2) * 25%)]

= 18 - 0 + 4.5

= 22.5

2. Value of the asset = 100


Vulnerability = 0.1
Current control = 75%
Uncertainty = 20

Formula:
Risk=(likelihood of occurrence of vulnerability * value of the information asset) –[(likelihood of
occurrence of vulnerability * value of the information asset)* (% of risk mitigated by
current controls)]+[(likelihood of occurrence of vulnerability * value of the information asset)
* (uncertainty of current knowledge of vulnerability)]

Solution:
Risk = (100 * 0.1) - [(100 * 0.1) * 75%] + [(100 * 0.1) * 20%)]

= 10 – 7.5 + 2

= 4.5
3. Value of the asset = 5
Vulnerability = 0.1
Current control = 0%
Uncertainty = 10

Formula:
Risk=(likelihood of occurrence of vulnerability * value of the information asset) –[(likelihood of
occurrence of vulnerability * value of the information asset)* (% of risk mitigated by
current controls)]+[(likelihood of occurrence of vulnerability * value of the information asset)
* (uncertainty of current knowledge of vulnerability)]

Solution:
Risk = (5 * 0.1) - [(5 * 0.1) * 0%] + [(5 * 0.1) * 0.1%)]

= 0.5 – 0 + 0.05

= 0.55

You might also like