32
Risk Analysis Completing the Risk Analysis Puzzle A Presentation by Michelle Magario For BSDP 583 Spring 2012

Risk assessment presentation

  • Upload
    mmagario

  • View
    1.606

  • Download
    10

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Risk assessment presentation

Risk Analysis

Completing the Risk Analysis PuzzleA Presentation by Michelle Magario

For BSDP 583 Spring 2012

Page 2: Risk assessment presentation

Table of Contents

• Part 1:

• Risk Analysis• Limitations• Interdependency

• Part 3

• In Practice

• Part 2:

• Interventions• Recommendations• Budgetary considerations

Page 3: Risk assessment presentation

Purpose Statement

Purpose:• Characterize• Define• Mitigate• Eliminate

Protect Defend

Vulnerabilities

Threats

Risks

Assets

Page 4: Risk assessment presentation

Risk Management

© Copyright 2004 Risk Mitigation Associates -- All rights reserved.

Page 5: Risk assessment presentation

Risk Analysis

• Phase 1– Analyze RisksAssetsThreatsVulnerabilitiesRisks

• Phase 2– CountermeasuresMitigation OpportunitiesPlan DevelopmentPolicy Institution

Page 6: Risk assessment presentation

Phase 1

Page 7: Risk assessment presentation

Risk Assessment: Phase 1

• Asset Characterization• Criticality Analysis• Threat Identification• Consequence Analysis• Vulnerability Analysis• Probability Assessment• Risk Assessment• Risk Prioritization• Risk Management

Assets

ThreatsVulnerabilities

Risks

Page 8: Risk assessment presentation

Risk Assessment: Phase 1

Assets

PeoplePropertyProprietary InformationReputation

Page 9: Risk assessment presentation

Risk Assessment: Phase 1

• Criticality Analysis

-which assets are criticalUnderstand• Mission related

-describe the assetDescribe• Location• Type

-assign a valueRank• Numeric• Relative

Page 10: Risk assessment presentation

Risk Assessment: Phase 1

Hazard• Natural• Manmade• Unintentional• Safety• Security• Disasters• Political/Military• Environmental or Behavioral

Threat• Manmade• Intentional• With Malice• Terrorists• Petty or Economic Criminals• Subversives

Page 11: Risk assessment presentation

Risk Assessment: Phase 1

• Consequence Analysis– Losses• Human life• Property• Proprietary information• Reputation

– Impact• Environmental• Economical

Page 12: Risk assessment presentation

Risk Assessment: Phase 1

• Vulnerability Analysis

– 3 distinct steps• Define• Evaluate• Identify Vulnerability

Define

EvaluateIdentify

Page 13: Risk assessment presentation

Risk Assessment: Phase 1

• Probability Assessment– View point dependent– Based on attractiveness– Historic Data– Statistics

Page 14: Risk assessment presentation

Risk Assessment: Phase 1

Risk = Probability x Vulnerability x Consequence

Page 15: Risk assessment presentation

Risk Assessment: Phase 1

• Risk:

– Assessment– Prioritization– Management

Assess

Prioritize

Manage

Page 16: Risk assessment presentation

Phase 2

Page 17: Risk assessment presentation

Risk Assessment: Phase 2

Countermeasures• Mitigation opportunities– Safety– Security– Policy Development

• Enforcement• Costs

Mitigation

Security

SafetyPolicy

Page 18: Risk assessment presentation

Risk Assessment: Phase 2

Safety: In Place• Identify• Evaluate• Enforce

Safety: In Need Of • Identify• Evaluate• Implement• Assess• Enforce

Page 19: Risk assessment presentation

Risk Assessment: Phase 2

Security: In Place• Identify• Evaluate• Enforce

Security: In Need Of• Identify• Evaluate• Implement• Assess• Enforce

Page 20: Risk assessment presentation

Risk Assessment: Phase 2

• Policy Development and Implementation:

Trigger

Review

Impact

Expert Review

Approval

Monitor

Page 21: Risk assessment presentation

Phase 3

Page 22: Risk assessment presentation

Risk Assessment: Phase 3

• In Practice:– Small facility– 5 employees– Widgets

Page 23: Risk assessment presentation

Risk Assessment: Phase 3

Asset Risk Consequence Vulnerability Probability

Employees 12 2 3 2

Facility 16 4 2 2

Equipment 20 5 2 2

Proprietary info 100 5 5 4

Reputation 125 5 5 5

Page 24: Risk assessment presentation

Risk Assessment: 3

Asset Risk Consequence Vulnerability Probability

Employee 12 2 3 2

Page 25: Risk assessment presentation

Risk Assessment: 3

Asset Risk Consequence Vulnerability Probability

Facility 16 4 2 2

Page 26: Risk assessment presentation

Risk Assessment: 3

Asset Risk Consequence Vulnerability Probability

Equipment 20 5 2 2

Page 27: Risk assessment presentation

Risk Assessment: 3

Asset Risk Consequence Vulnerability Probability

Proprietary info 100 5 5 4

Page 28: Risk assessment presentation

Risk Assessment: 3

Asset Risk Consequence Vulnerability Probability

Reputation 125 5 5 5

Page 29: Risk assessment presentation

Risk Assessment: Phase 3

• Prioritization

Asset Risk

Reputation 125

Proprietary Information 100

Equipment 20

Facility 16

Employees 12

Page 30: Risk assessment presentation

Risk Assessment: Phase 3

• Countermeasures

– QA/QC support– Sabotage protection– Computer back-up and security– Visitor management

Page 31: Risk assessment presentation

Risk Assessment: Phase 3

• Policy Development and Implementation

Page 32: Risk assessment presentation

References

Booz-Allen and Hamilton, Inc. (2000). Analytical risk management: A course guide for

security risk management.

Norman, T. L. (2010). Risk Analysis and Security Countermeasure Selection. Boca Raton,

FL: Taylor & Francis Group.