{"id":14,"date":"2022-04-12T00:52:01","date_gmt":"2022-04-12T00:52:01","guid":{"rendered":"http:\/\/tcm.gov.to\/?page_id=14"},"modified":"2022-08-18T01:24:54","modified_gmt":"2022-08-18T01:24:54","slug":"risk-scenarios","status":"publish","type":"page","link":"https:\/\/tcm.gov.to\/?page_id=14","title":{"rendered":"Risk Scenarios"},"content":{"rendered":"<div id=\"themify_builder_content-14\" data-postid=\"14\" class=\"themify_builder_content themify_builder_content-14 themify_builder\">\n    \t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_0 themify_builder_14_row module_row_14-0 tb_1ame687\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_14_column module_column_0 module_column_14-0-0 tb_f8an688\" >\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_rth5688    \">\n            <div  class=\"tb_text_wrap\">\n    <h1 style=\"text-align: center;\">Risk Scenarios<\/h1>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_3k7g689    \">\n            <div  class=\"tb_text_wrap\">\n    <p>As a baseline for identifying and assessing cyber risks, a risk scenario approach can be used. For that reason, a predefined risk register and assessment tool has been created to ease the cyber risk identification and assessment process. As a first task, an organization should analyse the list of threats and risk scenarios that is listed in <a href=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/08\/Copy-of-20220805_WP5_Annex-1-Risk-Register_v0-2.xlsx\">Annex 1<\/a>. During this task, all irrelevant risk scenarios and threats should be removed. The rest of them can be modified to reflect the current cyber risk landscape where the organization is operating. Next, additional risk scenarios along with accompanying threats should be described in the risk register. Once the list of threats and risk scenarios is analysed and fine-tuned according to the specifics of the organization and the environment, an assessment of risk scenario impact and likelihood should take place. The scales of impact and likelihood can be customized according to the specifics of the organization. One of the most lightweight scaling would describe likelihood and impact as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-213 aligncenter\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png\" alt=\"\" width=\"585\" height=\"310\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png 300w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-1024x542.png 1024w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-768x407.png 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1.png 1037w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-213\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png\" alt=\"\" width=\"6\" height=\"3\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png 300w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-1024x542.png 1024w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-768x407.png 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1.png 1037w\" sizes=\"auto, (max-width: 6px) 100vw, 6px\" \/>An assessment of risk scenario impact and likelihood gives the organization an overview of the most critical risk scenarios. When advancing to the next step of risk treatment, those controls that treat the most critical risks should be applied as the first priority.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_37vr743    \">\n            <div  class=\"tb_text_wrap\">\n    <h2 style=\"text-align: center;\">Risk Assessment<\/h2>\n<p>After the value of the information assets is determined, a more advanced approach can be used instead of risk scenarios to assess the information security risks. This step of risk assessment identifies the applicable threats and vulnerabilities that exist, determines the potential consequences and, finally, prioritizes the derived risks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-148 aligncenter\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-295x300.jpg\" alt=\"\" width=\"481\" height=\"489\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-295x300.jpg 295w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1006x1024.jpg 1006w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-768x782.jpg 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234.jpg 1221w\" sizes=\"auto, (max-width: 481px) 100vw, 481px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 2: Risk management process according to ISO\/IEC 27005:2018.<\/p>\n<p>\u00a0<\/p>\n<section id=\"sec-4a6f\" class=\"u-clearfix u-section-6\">\n<div class=\"u-clearfix u-sheet u-sheet-1\">\n<h4 class=\"u-align-center u-text u-text-default u-text-1\" style=\"text-align: center;\">Risk identification<\/h4>\n<p class=\"u-text u-text-2\">The purpose of risk identification is to determine what can happen to cause a potential loss, and to gain insight into how, where and why the loss can happen. Risk identification requires input from identification of threats, existing controls, vulnerabilities and consequences.\u00a0\u00a0<br \/><br \/><b>Identification of threats\u00a0<\/b><br \/><br \/>A threat has the potential to harm assets such as information, processes and systems and, therefore, organizations. Threats can be of natural or human origin, and can be accidental or deliberate. Both accidental and deliberate threat sources should be identified. A threat can arise from within or from outside the organization.\u00a0<br \/><br \/>Input to the threat identification can be obtained from the asset owners or users, human resources staff, facility management and information security specialists, physical security experts, legal department, the CERT, and other relevant organizations. Internal experience from incidents and past threat assessments should be considered in the current assessment.\u00a0\u00a0<br \/><br \/><b>Identification of existing controls<\/b><br \/><br \/>Identification of existing controls should be made to avoid unnecessary work or cost, e.g. in the duplication of controls. In addition, while identifying the existing controls, a check should be made to ensure that the controls are working correctly.\u00a0<br \/><br \/>An existing control can be identified as ineffective, or insufficient, or not justified. If not justified or insufficient, the control should be checked to determine whether it should be removed, replaced by another more suitable control, or whether it should stay in place, for example, for cost reasons.\u00a0\u00a0<br \/><br \/><b>Identification of vulnerabilities<\/b><br \/><br \/>Vulnerabilities can be identified in the areas of organization, processes, management routines, personnel, environment, system configuration or equipment. The presence of a vulnerability does not cause harm in itself, as there needs to be a threat exploiting it. A vulnerability that has no corresponding threat may not require the implementation of a control, but should be recognized and monitored for changes.\u00a0\u00a0<br \/><br \/><b>Identification of consequences<\/b><br \/><br \/>A consequence can be loss of effectiveness, adverse operating conditions, loss of business, reputation, or damage. This activity identifies the damage or consequences to the organization that can be caused by an incident scenario. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident.\u00a0<\/p>\n<\/div>\n<\/section>\n<section id=\"sec-ce84\" class=\"u-clearfix u-section-7\">\n<div class=\"u-clearfix u-sheet u-valign-middle u-sheet-1\">\n<h4 class=\"u-align-center u-text u-text-1\" style=\"text-align: center;\">Risk Analysis<\/h4>\n<p class=\"u-text u-text-default u-text-2\"><b>Assessment of consequences<\/b><br \/><br \/>Firstly, the business impact on the organization that can result from possible or actual information security incidents should be assessed, taking into account the consequences of a breach of information security such as loss of confidentiality, integrity or availability of the assets. To measure the consequences, the business impact value can be expressed in qualitative and quantitative forms, but any method of assigning monetary value can generally provide more information for decision making.<br \/><br \/><b>Assessment of incident likelihood<\/b><br \/><br \/>After identifying the incident scenarios, it is necessary to assess the likelihood and impact of each scenario. This should take account of how often the threats occur and how easily the vulnerabilities can be exploited.<br \/><br \/><b>Level of risk determination<\/b><br \/><br \/>Risk analysis assigns values to the likelihood and the consequences of a risk. Risk analysis is based on assessed consequences and likelihood. Additionally, it can consider cost-benefit, the concerns of stakeholders, and other variables, as appropriate for risk evaluation. The estimated risk is a multiplication of the likelihood of an incident scenario and its consequences.<\/p>\n<img loading=\"lazy\" decoding=\"async\" class=\"u-align-center u-image u-image-default u-image-1 alignleft\" src=\"https:\/\/tonga.ega.ee\/images\/second.png\" alt=\"\" width=\"372\" height=\"144\" data-image-width=\"647\" data-image-height=\"251\" \/><img loading=\"lazy\" decoding=\"async\" class=\"u-image u-image-default u-preserve-proportions u-image-2\" src=\"https:\/\/tonga.ega.ee\/images\/risklevels.PNG\" alt=\"\" width=\"155\" height=\"158\" data-image-width=\"224\" data-image-height=\"228\" \/><\/div>\n<\/section>\n<section id=\"sec-01fc\" class=\"u-clearfix u-section-8\">\n<div class=\"u-clearfix u-sheet u-sheet-1\">\n<h4>\u00a0<\/h4>\n<h4 class=\"u-align-center u-text u-text-1\" style=\"text-align: center;\">Risk Evaluation<\/h4>\n<p class=\"u-text u-text-default u-text-2\">In this step, the level of risk is compared against the risk evaluation criteria and the risk acceptance criteria. Decisions that are taken in the risk evaluation activity are mainly based on the acceptable level of risk. The following are an example of risk acceptance criteria:\u00a0<br \/><br \/>a) The impact is low\u00a0<br \/>b) The cost of treatment is not cost-effective (more expensive than not applying the treatment) and its implementation is lengthy (takes months or more)\u00a0c) The risk can be tolerated in a short-term perspective (in a case-by-case basis, e.g. for less than 72 hours, less than 5 days&#8230;).\u00a0<br \/><br \/>However, these examples are not exhaustive and an organization may decide to accept certain risks due to its specific context.\u00a0 \u00a0 \u00a0<br \/><br \/>Also consequences, likelihood, and the degree of confidence in the risk identification and analysis should be considered for risk evaluation. Risk evaluation uses the understanding of risk obtained by risk analysis to take decisions about future actions. Decisions should include:\u00a0<br \/><br \/>a) whether an activity should be undertaken\u00a0<br \/>b) priorities for risk treatment considering estimated levels of risks.\u00a0 \u00a0\u00a0<br \/><br \/>For example, it is mandatory to treat risks with the medium and high risk level and it is optional but recommended to treat risks with a low risk level. The higher the risk level, the more urgent the risk treatment activity is. The risk treatment activity most often resuls in applying new or amending the existing security controls,\u00a0 which lower the likelihood and\/or impact of the cyber risk. Risk evaluation, and especially risk acceptance, must be always subject to management\u2019s approval.<\/p>\n<\/div>\n<\/section>\n<p>\u00a0<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Risk Scenarios As a baseline for identifying and assessing cyber risks, a risk scenario approach can be used. For that reason, a predefined risk register and assessment tool has been created to ease the cyber risk identification and assessment process. As a first task, an organization should analyse the list of threats and risk scenarios [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"builder_content":"<h1 style=\"text-align: center;\">Risk Scenarios<\/h1>\n<p>As a baseline for identifying and assessing cyber risks, a risk scenario approach can be used. For that reason, a predefined risk register and assessment tool has been created to ease the cyber risk identification and assessment process. As a first task, an organization should analyse the list of threats and risk scenarios that is listed in <a href=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/08\/Copy-of-20220805_WP5_Annex-1-Risk-Register_v0-2.xlsx\">Annex 1<\/a>. During this task, all irrelevant risk scenarios and threats should be removed. The rest of them can be modified to reflect the current cyber risk landscape where the organization is operating. Next, additional risk scenarios along with accompanying threats should be described in the risk register. Once the list of threats and risk scenarios is analysed and fine-tuned according to the specifics of the organization and the environment, an assessment of risk scenario impact and likelihood should take place. The scales of impact and likelihood can be customized according to the specifics of the organization. One of the most lightweight scaling would describe likelihood and impact as follows:<\/p> <p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png\" alt=\"\" width=\"585\" height=\"310\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png 300w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-1024x542.png 1024w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-768x407.png 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1.png 1037w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/p> <p>\u00a0<\/p> <p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png\" alt=\"\" width=\"6\" height=\"3\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-300x159.png 300w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-1024x542.png 1024w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1-768x407.png 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/Capture-1.png 1037w\" sizes=\"auto, (max-width: 6px) 100vw, 6px\" \/>An assessment of risk scenario impact and likelihood gives the organization an overview of the most critical risk scenarios. When advancing to the next step of risk treatment, those controls that treat the most critical risks should be applied as the first priority.<\/p>\n<h2 style=\"text-align: center;\">Risk Assessment<\/h2> <p>After the value of the information assets is determined, a more advanced approach can be used instead of risk scenarios to assess the information security risks. This step of risk assessment identifies the applicable threats and vulnerabilities that exist, determines the potential consequences and, finally, prioritizes the derived risks.<\/p> <p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-295x300.jpg\" alt=\"\" width=\"481\" height=\"489\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-295x300.jpg 295w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-1006x1024.jpg 1006w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234-768x782.jpg 768w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/1234.jpg 1221w\" sizes=\"auto, (max-width: 481px) 100vw, 481px\" \/><\/p> <p style=\"text-align: center;\">Figure 2: Risk management process according to ISO\/IEC 27005:2018.<\/p> <p>\u00a0<\/p> <section id=\"sec-4a6f\">\n<h4 style=\"text-align: center;\">Risk identification<\/h4> <p>The purpose of risk identification is to determine what can happen to cause a potential loss, and to gain insight into how, where and why the loss can happen. Risk identification requires input from identification of threats, existing controls, vulnerabilities and consequences.\u00a0\u00a0<br \/><br \/><b>Identification of threats\u00a0<\/b><br \/><br \/>A threat has the potential to harm assets such as information, processes and systems and, therefore, organizations. Threats can be of natural or human origin, and can be accidental or deliberate. Both accidental and deliberate threat sources should be identified. A threat can arise from within or from outside the organization.\u00a0<br \/><br \/>Input to the threat identification can be obtained from the asset owners or users, human resources staff, facility management and information security specialists, physical security experts, legal department, the CERT, and other relevant organizations. Internal experience from incidents and past threat assessments should be considered in the current assessment.\u00a0\u00a0<br \/><br \/><b>Identification of existing controls<\/b><br \/><br \/>Identification of existing controls should be made to avoid unnecessary work or cost, e.g. in the duplication of controls. In addition, while identifying the existing controls, a check should be made to ensure that the controls are working correctly.\u00a0<br \/><br \/>An existing control can be identified as ineffective, or insufficient, or not justified. If not justified or insufficient, the control should be checked to determine whether it should be removed, replaced by another more suitable control, or whether it should stay in place, for example, for cost reasons.\u00a0\u00a0<br \/><br \/><b>Identification of vulnerabilities<\/b><br \/><br \/>Vulnerabilities can be identified in the areas of organization, processes, management routines, personnel, environment, system configuration or equipment. The presence of a vulnerability does not cause harm in itself, as there needs to be a threat exploiting it. A vulnerability that has no corresponding threat may not require the implementation of a control, but should be recognized and monitored for changes.\u00a0\u00a0<br \/><br \/><b>Identification of consequences<\/b><br \/><br \/>A consequence can be loss of effectiveness, adverse operating conditions, loss of business, reputation, or damage. This activity identifies the damage or consequences to the organization that can be caused by an incident scenario. An incident scenario is the description of a threat exploiting a certain vulnerability or set of vulnerabilities in an information security incident.\u00a0<\/p>\n<\/section> <section id=\"sec-ce84\">\n<h4 style=\"text-align: center;\">Risk Analysis<\/h4> <p><b>Assessment of consequences<\/b><br \/><br \/>Firstly, the business impact on the organization that can result from possible or actual information security incidents should be assessed, taking into account the consequences of a breach of information security such as loss of confidentiality, integrity or availability of the assets. To measure the consequences, the business impact value can be expressed in qualitative and quantitative forms, but any method of assigning monetary value can generally provide more information for decision making.<br \/><br \/><b>Assessment of incident likelihood<\/b><br \/><br \/>After identifying the incident scenarios, it is necessary to assess the likelihood and impact of each scenario. This should take account of how often the threats occur and how easily the vulnerabilities can be exploited.<br \/><br \/><b>Level of risk determination<\/b><br \/><br \/>Risk analysis assigns values to the likelihood and the consequences of a risk. Risk analysis is based on assessed consequences and likelihood. Additionally, it can consider cost-benefit, the concerns of stakeholders, and other variables, as appropriate for risk evaluation. The estimated risk is a multiplication of the likelihood of an incident scenario and its consequences.<\/p> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tonga.ega.ee\/images\/second.png\" alt=\"\" width=\"372\" height=\"144\" data-image-width=\"647\" data-image-height=\"251\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/tonga.ega.ee\/images\/risklevels.PNG\" alt=\"\" width=\"155\" height=\"158\" data-image-width=\"224\" data-image-height=\"228\" \/> <\/section> <section id=\"sec-01fc\">\n<h4>\u00a0<\/h4> <h4 style=\"text-align: center;\">Risk Evaluation<\/h4> <p>In this step, the level of risk is compared against the risk evaluation criteria and the risk acceptance criteria. Decisions that are taken in the risk evaluation activity are mainly based on the acceptable level of risk. The following are an example of risk acceptance criteria:\u00a0<br \/><br \/>a) The impact is low\u00a0<br \/>b) The cost of treatment is not cost-effective (more expensive than not applying the treatment) and its implementation is lengthy (takes months or more)\u00a0c) The risk can be tolerated in a short-term perspective (in a case-by-case basis, e.g. for less than 72 hours, less than 5 days...).\u00a0<br \/><br \/>However, these examples are not exhaustive and an organization may decide to accept certain risks due to its specific context.\u00a0 \u00a0 \u00a0<br \/><br \/>Also consequences, likelihood, and the degree of confidence in the risk identification and analysis should be considered for risk evaluation. Risk evaluation uses the understanding of risk obtained by risk analysis to take decisions about future actions. Decisions should include:\u00a0<br \/><br \/>a) whether an activity should be undertaken\u00a0<br \/>b) priorities for risk treatment considering estimated levels of risks.\u00a0 \u00a0\u00a0<br \/><br \/>For example, it is mandatory to treat risks with the medium and high risk level and it is optional but recommended to treat risks with a low risk level. The higher the risk level, the more urgent the risk treatment activity is. The risk treatment activity most often resuls in applying new or amending the existing security controls,\u00a0 which lower the likelihood and\/or impact of the cyber risk. Risk evaluation, and especially risk acceptance, must be always subject to management\u2019s approval.<\/p>\n<\/section> <p>\u00a0<\/p>","_links":{"self":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14"}],"version-history":[{"count":31,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}