Module 2 Lab Manual 4 Risk Assessment and Treatment - Answer - Template
Module 2 Lab Manual 4 Risk Assessment and Treatment - Answer - Template
Asset
Business Criticality
Asset Description Threat Description
Process (VH / H/
M/ L/ N)
Compromise of device
Web Server High security
Information
Technology
Airtel Internet
Medium
Leased Line
Risk Assessment
Threat Information Vulnerability Information Consequences
Consequence
Threat Source Vulnerability Description Incident Scenario
Value
Hacker / cracker /
Data theft / misuse Legal Issues High
cyber criminal / insider
Medium
nces Probability Information Risk Assessment Risk Treatment
Risk Response
Risk
Recommendatio
Likelihood of Likelihood Risk Ranking
Consequence ns (Accept/
Occurrence Value Value (VH / H/ M/
Transfer/
L/ N)
Mitigate/ Avoid)
0 0 0
0 0 0
0 0 0
3 Very High 5 15 High
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
Risk Response
Risk Treatment Revised Risk Valuation
Revised Revised
Suggested Controls to Treat Revised Risk
Likelihood of Likelihood
the Risk Level
Occurance Value
Medium 3 12
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
0 0
n Residual Risk
Managements
Revised
Acceptance /
Risk
Decision on
Ranking
Residual Risk
High
Sample List of Threats and Threat Source
Threat Description
Application failure
Breach of licenses
Compromise of device security
Compromise of firewall security
Data corruption
Unauthorized modifications
Unauthorized physical access
Unavailability / poor quality of services
Unavailability of cables
Unavailability of data / data corruption
Unavailability of equipment
Unavailability of information
Uncontrolled copying
User error
Wardriving
Threats and Threat Source
Threat Source
Employees / Insiders
Employees / Insiders
Hacker / cracker / cyber criminal / insider
Outsider / insider with malicious intentions
Electromagnetic interferences
Industrial spying / espionage / third party staff
Outsider / insider with malicious intentions
Accidental / deliberate service disruptions
Hacker / cracker / cyber criminal
Accidents
Influenza / flu / seasonal pandemics
Health issues / shortage / attrition
Industrial spying / espionage / third party staff
Accidents
Infection
Hacker / cracker / cyber criminal / insider
Accidental
Natural / man-made disasters
Industrial spying / espionage / third party staff
Employees / Insiders
Employees / Insiders
Disastrous events / hacker / insider
Employees / Insiders
Industrial spying / espionage
Civil unrest / riots
Disastrous events / hacker / insider
Hacker / cracker / cyber criminal
Disastrous events
Hacker / cracker / cyber criminal / insider
Disastrous events
Industrial spying / espionage / third party staff
Hacker / cracker / cyber criminal / insider
Employees / contract personnel
Technology events
Technology events
Industrial spying / espionage
Industrial spying / espionage
Technology faults / events
Technology faults / events
Technology incidents
Employees
Outsider / insider with malicious intentions
Employees
Employees / Insiders
Hacker / cracker / cyber criminal / insider
Hacker/ cracker/ cyber criminal / insider
Employees
Hacker / cracker / cyber criminal / insider
Accidental / deliberate attempts to change
Hacker / cracker / cyber criminal
Employees / Insiders
Hacker / cracker / cyber criminal / insider
Hacker / cracker / insider
Accidental / deliberate attempt
Employees
Industrial spying / espionage / third party staff
Accidental / deliberate service disruptions
Rodents
Electromagnetic interferences
Natural / manmade disasters
Hacker / cracker / cyber criminal
Employees / Insiders
Employees / Insiders
Hacker / cracker / cyber criminal / insider
List of Threats and Threat Source considered for the exercise
Threat Description Threat Source
Breach of licenses Employees / Insiders
Compromise of device security Hacker / cracker / cyber criminal / insider
Industrial spying / espionage / third party staff
Data theft / misuse
Outsider / insider with malicious intentions
Disputes with service providers Accidental / deliberate service disruptions
Dust particles Accidents
Fire Accidents
Hacking Hacker / cracker / cyber criminal / insider
Information leakage Industrial spying / espionage / third party staff
Legal liability Industrial spying / espionage
Non compliance of law Industrial spying / espionage / third party staff
Technical faults Technology incidents
Theft / loss Employees
Employees / Insiders
Unauthorized access / modification Hacker / cracker / cyber criminal / insider
Hacker/ cracker/ cyber criminal / insider
Unauthorized physical access Industrial spying / espionage / third party staff
Sample List of Vulnerabilities (Threat Specific)
Threat Description Vulnerability Description
Absence of BCP & DR plans
Lack of system planning and acceptance
Application failure
Technical review not carried out after making changes at
OS level
Breach of licenses Lack of control over software installation
Vulnerable services on the operating systems not disabled
Disputes with service providers Changes to the third party services are not managed
Service requirements and scope of work are not defined in
SLA including service levels, security, availability etc.
No / inadequate AMCs
Failure of supporting utilities
Failure of supporting utilities
Preventive maintenance is not carried out
Lack of fire drills /emergency plan
No smoke detection /fire suppression equipment
Fire Open electrical fittings
Smoking within the premises
Storage of combustible material
Food poisoning Poor quality food served by the caterer
Contact with special security groups not maintained to
remain updated about new technology / vulnerabilities /
Hacking threats
Vulnerability Assessment and Penetration Testing is not
carried out periodically
Improper rotation of shifts / extended working hours
Hazard due to failure of supporting
utilities Inadequate HVAC arrangements
No / inadequate lighting
Inability to operate in disaster Unavailability of BCP & DR plans
"return of assets" procedure is not followed
Agreements do not address information exchange
mechanism / terms of non-disclosure of information
Confidentiality clause not addressed in agreements
Data not encrypted between client and server
Lack of internal security controls allowing Trojans,
backdoor traps etc.
Information leakage No separation between development, test and production
environment
Password of default account is not changed. (default
account provided by application vendor)
Terminated application admin's ID has not been disabled.
Fire
Smoking within the premises