Page 175 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 175

Surveys

                    Questionnaires


                    Checklists
                    One-on-one meetings


                    Interviews

               Determining which mechanism to employ is based on the culture of
               the organization and the types of risks and assets involved. It is
               common for several methods to be employed simultaneously and their
               results compared and contrasted in the final risk analysis report to
               upper management.



               Scenarios
               The basic process for all these mechanisms involves the creation of

               scenarios. A scenario is a written description of a single major threat.
               The description focuses on how a threat would be instigated and what
               effects its occurrence could have on the organization, the IT
               infrastructure, and specific assets. Generally, the scenarios are limited
               to one page of text to keep them manageable. For each scenario, one or
               more safeguards are described that would completely or partially

               protect against the major threat discussed in the scenario. The analysis
               participants then assign to the scenario a threat level, a loss potential,
               and the advantages of each safeguard. These assignments can be
               grossly simple—such as High, Medium, and Low or a basic number
               scale of 1 to 10—or they can be detailed essay responses. The responses
               from all participants are then compiled into a single report that is
               presented to upper management. For examples of reference ratings

               and levels, please see Table 3-6 and Table 3-7 in National Institute of
               Technology (NIST) Special Publication (SP) 800-30:

               http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf

               The usefulness and validity of a qualitative risk analysis improves as
               the number and diversity of the participants in the evaluation
               increases. Whenever possible, include one or more people from each

               level of the organizational hierarchy, from upper management to end
               user. It is also important to include a cross section from each major
   170   171   172   173   174   175   176   177   178   179   180