Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Module 03: Risk Assessment

Objective

Labs in this module demonstrate Qualitative Risk Assessment. Risk assessment is a structured process by which risks are identified and evaluated. In the context of Business Continuity Planning (BCP), it enables an organization to understand the potential threats to its most critical resources and processes. By anticipating the potential impacts that risks can have, an organization can manage and mitigate the risks. As a disaster recovery professional you should know how to perform risk analysis using various tools like PILAR Basic.

Scenario

In any organization, it is very important to perform a Qualitative Risk Assessment to identify and analyze the possible risk event and its impact if and when it occurs. Qualitative Risk Assessment works on relative or descriptive measures to analyze the probability of the risk occurring. In a qualitative analysis, likelihood or probability is measured using a relative scale using terms such as low, moderate, high. Risk assessment gives an insight towards security and integrity of different aspects of IT infrastructure of an organization.

Qualitative Risk Assessment using PILAR Risk Management Tool

Scenario

Qualitative risk assessment is the process of using non-numerical based methods to identify and analyze the risk event and its impact if and when it occurs. It works on relative or descriptive measures to analyze the probability of the risk occurring.

Lab Objectives

This lab demonstrates how to perform a Qualitative Risk Assessment using PILAR Risk Management Tool.

Lab Scenario

This lab focuses on performing a Qualitative Risk Assessment using PILAR Risk Management Tool. Qualitative Risk Assessment is the process of using non-numerical based methods to identify and analyze the risk event and its impact if and when it occurs. It works on relative or descriptive measures to analyze the probability of the risk occurring. In a qualitative analysis, likelihood or probability is measured using a relative scale using terms such as low, moderate, high, and so on. As a disaster recovery professional, you must know how to perform Qualitative Risk Assessment in order to understand the potential threats to most critical aspects, supports resources and their potential impact if any disaster happens.

  1. Click Machines pane, and click Ctrl+Alt+Delete under Windows Server 2016 thumbnail.

    Alternatively you can navigate to Commands menu and click Ctrl+Alt+Delete to login.

    Screenshot

  2. Type Pa$$w0rd in the Password field and press Enter.

    Alternatively you can click Paste Password from Commands --> Paste options or click clipboard icon under Windows Server 2016 from Machines pane.

    Screenshot

  3. Navigate to E:\EDRP Module 03 Risk Assessment\Risk Assessment Tool\Pilar and double-click jre-8u121-windows-i586.exe to install Java as shown in the screenshot.

    To install PILAR Basic tool, it is required that the system must be installed with the latest version of Java.

    Screenshot

  4. Java Setup - Welcome wizard appears, click Install to continue with the installation process.

    Screenshot

  5. Java Setup Complete wizard appears after the completion of installation process. Click Close as shown in screenshot.

    Screenshot

  6. After clicking Close button, Internet Explorer 11 window appears. Click Ask me later.

    Screenshot

  7. Click Close button to close Internet Explorer.

    Screenshot

  8. Internet Explorer pop up appears, click Close all tab.

    Screenshot

  9. To install PILAR tool, navigate to E:\EDRP Module 03 Risk Assessment\Risk Assessment Tool\Pilar and double-click pilar_548_en.exe to install PILAR as shown in the screenshot.

    Screenshot

  10. Setup - PILAR window appears, click Next to continue.

    Screenshot

  11. PILAR Setup Information wizard appears, click Next.

    Screenshot

  12. Select Destination Location wizard appears, click Next to select the default destination location as shown in screenshot.

    Screenshot

  13. Select Start Menu Folder wizard appears, click Next.

    Screenshot

  14. Select Additional Tasks wizard appears, Create a desktop shortcut check-box is ticked by default. Click Next to continue.

    Screenshot

  15. Ready to Install wizard appears, click Install to start the installation process.

    Screenshot

  16. After installation of PILAR, Completing the PilarBasic Setup Wizard appears. Launch PILAR option is selected by default, click Finish to launch PILAR.

    Screenshot

  17. PILAR (5.4.8 - 9.3.2016) window appears, click Do not show this dialog in the future check-box and click OK.

    Screenshot

  18. PILAR window appears, from mode drop-down menu select working option as shown in the screenshot.

    Screenshot

  19. license (open) window appears, click Cancel to close the window.

    Screenshot

  20. PILAR window appears again, click license menu and select evaluation license option from the drop-down menu as shown in the screenshot.

    Screenshot

  21. EVALUATION LICENSE window pop ups, click Yes to apply 30-day evaluation license.

    In order to use PILAR tool, you need to activate 30-days trail evaluation mode.

    Screenshot

  22. PILAR tool is now activated with 30-days evaluation license, click Qualitative analysis button under Risk Analysis and Management section as shown in the screenshot.

    Screenshot

  23. PILAR window appears, click Project and select New from the drop-down menu as shown in the screenshot

    Screenshot

  24. Project data window appears. In code field; enter RA Lab, in name field; enter Risk Assessment 1, select RESTRICTED from the project – classification drop-down menu. In description field enter Qualitative Risk Assessment, in responsible field enter ECC, in organization field enter ECC, in version field enter 1.0 and in date field enter the current date of the lab (in this scenario, the date mentioned is 18-04-2017) as shown in the screenshot. Click Save and Close (happy smiley icon).

    Screenshot

  25. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click D. Project and select Security domains from the sub-tree as shown in the screenshot.

    Each security domain may have a specific attack profile, and specific security measures.

    Screenshot

  26. RA Lab: security domains window appears, click new domain icon present in the menu-bar as shown in screenshot.

    Screenshot

  27. security domain window appears. In code field enter Security Domain Test, in name field enter Security Domain 1 and in description field enter Security Domain 1 as shown in the screenshot. Click save and close to continue.

    Screenshot

  28. RA Lab: security domains window appears. Double-click [base] Base, [Security Domain Test] Security Domain 1 is created. Click save and close.

    Screenshot

  29. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane select Project phases from the Project sub-tree as shown in the screenshot.

    Screenshot

  30. RA Labs: project phases window appears, [current] current situation and [target] target situation project phases are created by default. Click save and close.

    Screenshot

  31. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.1 Assets and select A.1.1. identification from the sub-tree as shown in the screenshot.

    Screenshot

  32. RA Lab: asset identification window appears, click Layers and select new layer from the drop-down menu as shown in screenshot.

    Screenshot

  33. layer window appears, in code field enter Layer 1 and in name field enter Layer 1. Click save and close to continue

    Asset is something of either tangible or intangible value that is worth protecting, including people, information, infrastructure finances and reputation [ISACA, Cybersecurity Fundamentals Glossary, 2014].

    Screenshot

  34. RA Lab: asset identification window appears and Layer 1 is added. Right-click [Layer1] Layer 1 and select new asset from the context menu.

    We can add other assets, either material or intangible, which make up the information system. We can organize into layers and groups for clarity, but PILAR only cares about the assets.

    Screenshot

  35. asset window appears. In code field enter Assets, in name field enter Asset Test. In datum row, enter Asset 1, Asset 2, Asset 3 and in value row enter A1, A2, A3. Select [Security Domain Test] Security Domain 1 from the domain drop-down menu. In ASSET CLASSES select check-box of: [essential] Essential assets, [availability] Availability, [D] Data/Information, [S] Services, [SW] Software and [HW] Hardware option as shown in the screenshot. Click save and close button to continue

    Essential assets are those information and services managed by the information system. They represent the requirements of the risk owners, the security requirements. Essential assets exist before any implementation is detailed

    Screenshot

  36. RA Lab: asset identification window appears, click save and close.

    Screenshot

  37. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.1 Assets and select A.1.2. asset classes from the sub-tree as shown in the screenshot.

    Screenshot

  38. RA Labs: asset classes window appears. In ASSETS pane, navigate to [Layer 1] Layer 1 --> [Assets] Asset Test and select {essential,availability,D,S,SW,HW}. In ASSET CLASSES pane navigate to [essential] Essential assets --> [info] information and select [biz] business data. Click Apply.

    Screenshot

  39. In ASSETS sub-tree, {essential.info.biz} is added, repeat step 38 to add ASSET CLASSES like arch.sap, availability.easy, evaluated.certified, D.files from [info], [arch], [availability], [evaluated] and [D] ASSET CLASSES respectively as shown in screenshot. Click save and close.

    Screenshot

  40. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.1 Assets and select A.1.3. valuation of domains from the sub-tree as shown in the screenshot.

    Valuation of domain provides a quick but imprecise assessment common for all the assets in each domain. Using this method, all assets in the domain receive the same values assigned to the established domain. The value is assigned to the essential assets (information and services) and transferred to the domain that hosts it, and to the domains that are associated to the essential asset

    Screenshot

  41. RA Labs: valuation of domain window appears, select and double-click the box in [A] row and [Assets] Asset Test column (highlighted box) as shown in the screenshot.

    Valuation of domains implies to the rating of security level for the domain where 0 is negligible and 10 is top. Assets are valued to establish the security requirements on the asset; that is, the value measures the direct or indirect consequences of threat that succeeds on the asset

    Screenshot

  42. [Assets] Asset Test :: [A] Availability window appears, select [7] High from the level drop-down menu and click apply as shown in the screenshot.

    In this scenario, we are assuming that priority of the Availability of the assets is high as continuous availability is required.

    Screenshot

  43. RA Lab: valuation of domain window appears again, enter the value [7] High in other boxes by repeating the process mentioned in step 41 and 42 as shown in the screenshot. Click save and close.

    In this scenario, we are assuming that the valuation of other domains like Integrity[I], Continuity[C], Authority[A], Accountability[Acc] and Valuation[V] for the given assets are [7] High.

    Screenshot

  44. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.1 Assets and select A.1.4. valuation of assets from the sub-tree as shown in the screenshot.

    Screenshot

  45. RA Lab: valuation of assets window appears, accumulated value are specified to various field i.e. [A], [I], [C], [Auth] and [Acc]. Click save and close to continue.

    Screenshot

  46. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.2 Threats and select A.2.1. aggravating & mitigating conditions from the sub-tree as shown in the screenshot.

    Screenshot

  47. Aggravating & mitigating conditions window appears, select [Security Domain Test] Security Domain 1 in Security domains pane. In CRITERIA pane double-click Attacker Identification option and select [101.b] (5%) commercial competitor subtree for demonstration purpose. Click **apply** as shown in the screenshot.

    Aggravating & mitigating conditions in this assessment refers to the different criteria of potential risk factors and its impact on the Security Domain.

    Screenshot

  48. For demonstration of various criteria of aggravating & mitigating conditions, select various criteria subtree like Attacker Motivation, Attacker Benefit, Confidentiality as shown in screenshot. Click save and close to continue.

    Screenshot

  49. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.2 Threats and select A.2.2. identification from the sub-tree as shown in the screenshot.

    Screenshot

  50. [RA Lab] Risk Assessment warning window appears, click Do not show this dialog in the future check-box and click OK.

    Screenshot

  51. RA Lab: Identification of threats window appears. In left pane navigate to ASSETS --> [Layer 1] Layer 1 --> [ASSETS] Asset Test, all the possible threats in risk assessment are listed. In left pane THREATS scenarios like Natural, Industrial, Errors and unintentional failures and Wilful attacks are selected as shown in the screenshot. Click save and close to continue.

    Screenshot

  52. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.2 Threats and select A.2.3. valuation from the sub-tree as shown in the screenshot.

    Screenshot

  53. RA Lab: Valuation of Threats window appears, double click [Layer 1] Layer 1 in the ASSETS pane. [Assets] Asset Test row appears showing the percentage of threat evaluation for various criteria like [A], [I], [C], [Auth] and [Acc]. Click **save and close** to continue.

    Screenshot

  54. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.3 Safeguard and select A.3.1. identification from the sub-tree as shown in the screenshot.

    Screenshot

  55. RA Lab: safeguards window appears, click save and close to continue.

    Screenshot

  56. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.3 Safeguard and select A.3.2. valuation (phases) from the sub-tree as shown in the screenshot.

    Screenshot

  57. RA Labs: Safeguard effectiveness window appears. Right-click the empty box in current row and [H] General Protections column, select L4 – managed and measurable option from the context menu as shown in the screenshot.

    Note: In this scenario we are assuming that safeguard effectiveness in all the fields are managed and measureable i.e. L4.

    L4-managed and measurable implies the precise measurements, management can effectively control the effectiveness and efficiency of the safeguards. In particular, management can identify ways to set quantitative quality goals. At maturity level L4, the performance of processes is controlled using statistical and other quantitative techniques, and is quantitatively predictable.

    Screenshot

  58. Again Right-click the empty box in target row and [H] General Protections column, select L5 – optimised option from the context menu as shown in the screenshot.

    Note: In this scenario, we are setting the Target of the safeguards as level 5 i.e. optimised.

    L5 - Optimized implies the precise measurements, management can effectively control the effectiveness and efficiency of the safeguards. In particular, management can identify ways to set quantitative quality goals. At maturity level L4, the performance of processes is controlled using statistical and other quantitative techniques, and is quantitatively predictable.

    Screenshot

  59. Repeat steps 56 and 57 to assign the values of safeguard effectiveness for current and target to other SAFEGUARDS options as shown in screenshot. Click save and close.

    In this senario, we are assuming that all the criteria of the Safeguard effectiveness are currently L4 - managed and measurable and the target is L5 - optimised.

    Screenshot

  60. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.3 Safeguard and select A.3.3. valuation (domains) from the sub-tree as shown in the screenshot.

    Screenshot

  61. RA Lab: Safeguard effectiveness window appears with the assigned value of various SAFEGUARDS. Click save and close to continue.

    Screenshot

  62. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click A. Risk analysis. Double-click A.4 Impact & risk, double-click A.4.1. Accumulated values and select A.4.1.1. impact from the sub-tree as shown in the screenshot.

    Screenshot

  63. RA Lab: accumulated impact window appears, accumulated impact ratings are assigned for various criterias for [Layer 1] Layer 1 as shown in screenshot. Click save and close to continue.

    Screenshot

  64. PILAR: [RA Lab] Risk Assessment 1 window appears. In A.4.1. Accumulated values sub-tree select A.4.1.2. risk as shown in the screenshot.

    Screenshot

  65. RA Lab: accumulated risk window appears, accumulated risk ratings are assigned for various criterias for [Layer 1] Layer 1 as shown in screenshot. Click save and close to continue.

    Screenshot

  66. PILAR: [RA Lab] Risk Assessment 1 window appears, double-click A.4.2. Deflected values and select A.4.2.1. impact from the sub-tree as shown in the screenshot.

    Screenshot

  67. RA Lab: deflected impact window appears showing the deflected impact assigned values for different criteria of [Assets] Asset Test as shown in screenshot. Click save and close.

    Screenshot

  68. PILAR: [RA Lab] Risk Assessment 1 window appears. In A.4.2. Deflected values sub-tree, select A.4.2.1. risk as shown in the screenshot.

    Screenshot

  69. RA Lab: deflected risk window appears showing the deflected risk assigned values for different criteria of [Assets] Asset Test as shown in screenshot. Click save and close.

    Screenshot

  70. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click R. Report. Double-click R.t. text, and select Risk Analysis from the sub-tree as shown in the screenshot.

    Screenshot

  71. Report data window appears, click select button in Assets field.

    Screenshot

  72. assets window appears, under ASSETS sub-tree select [Layer 1] Layer 1 and click save and close.

    Screenshot

  73. Report data window appears, click select button in Information sources field.

    Screenshot

  74. Information sources window appears, INFORMATION SOURCES is selected by default. Click save and close.

    Screenshot

  75. Report data window appears, click select button in Security domains field.

    Screenshot

  76. security domains window appears, under Security domains sub-tree tick [base] Base and [Security Domain Test] Security Domain 1 check-box as shown in screenshot. Click OK.

    Screenshot

  77. Report data window appears, click select button in Dimensions field.

    Screenshot

  78. dimensions window appears, in DIMENSIONS sub-tree tick [A] Availability, [I] Integrity, [C] Confidentiality, [Auth] Authenticity of users and information and [Acc] Accountability of service and data check-box. Click save and close.

    Screenshot

  79. Report data window appears, click select button in Project phases field.

    Screenshot

  80. project phases window appears, in Project phases sub-tree tick [Potential], [current] current situation and [target] target situation check-box. Click OK to continue. Report Data window appears again, click Close.

    Since we are using 30 days Evaluation version of PILAR tool, we will not be able to save and publish the Risk Assessment Report in .RTF or .HTML format.

    Screenshot

  81. PILAR: [RA Lab] Risk Assessment 1 window appears, in Qualitative analysis pane double-click E. Security profiles. Double-click [27002-2005] Code of practice for information security management (8.10.2012), and select Valuation from the sub-tree as shown in the screenshot.

    Screenshot

  82. RA Lab :: [27002-2005] Code of practice for information security management (8.10.2012) window appears showing the current and target level of various controls under [27002-2005] Code of practice for information security management (8.10.2012) as shown in the screenshot. Click save and close.

    ISO/IEC 27002:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The control objectives and controls in ISO/IEC 27002:2005 are intended to be implemented to meet the requirements identified by a risk assessment. ISO/IEC 27002:2005 is intended as a common basis and practical guideline for developing organizational security standards and effective security management practices, and to help build confidence in inter-organizational activities.

    Screenshot

  83. PILAR: [RA Lab] Risk Assessment 1 window appears. Double-click [27002-2013] Code of practice for information security controls, and select Valuation from the sub-tree as shown in the screenshot.

    Screenshot

  84. RA Lab :: [27002-2013] Code of practice for information security controls window appears showing the current and target level of various controls under [27002-2013] Code of practice for information security controls as shown in the screenshot. Click save and close.

    Screenshot

  85. Navigate to the menu-bar of PILAR. Click Project and select Save from the drop-down menu as shown in screenshot.

    Screenshot

  86. project (save) window appears, in File Name: field enter RA Lab and click Save to save the PILAR project in default folder.

    Screenshot

  87. save RA Lab.mgr window appears, click OK.

    We will use the PILAR tool in next lab, do not cancel the current lab.

    Screenshot

Assessment 1:

Perform Qualitative Risk Assessment using the PILAR Risk Management tool available at "E:\EDRP Module 03 Risk Assessment\Risk Assessment Tool\Pilar" on the EDRP Windows Server 2016 machine. What is the Safeguard effectiveness rating for the optimized safeguards?

  • In Step 58, the target safeguard effectiveness is set to L5 – Optimized. This is done by selecting the L5 – Optimized option for safeguard effectiveness in the [H] General Protections column under the target row in the Safeguard effectiveness window. This indicates that the safeguards are at an optimized level, which implies precise measurements and effective management of the safeguard's effectiveness.

In summary, the safeguard effectiveness rating for the optimized safeguards is L5 – Optimized.

Quantitative Risk Assessment using PILAR Risk Management Tool

Scenario

Quantitative risk assessment is the process of using numerical values and methods within a margin of error to identify and analyze the risk event and its impact if and when it occurs. This method uses deterministic, stochastic, and systematic approach. The results and values are expressed in numerical figures.

Lab Objectives

This lab demonstrates how to perform a Quantitative Risk Assessment using PILAR Risk Management Tool.

Lab Scenario

This lab focuses on performing a Quantitative Risk Assessment using PILAR Risk Management Tool. Quantitative Risk Assessment is the process of using -numerical based methods to identify and analyze the risk event and its impact if and when it occurs. It works on deterministic, stochastic, and systematic approach. The results and values are expressed in numerical figures. In a qualitative analysis, there is a definitive number that gives the probability of the risk occurring. The advantages of quantitative risk assessment are that it provides relatively accurate and replicable results. As a disaster recovery professional, you must know how to perform Quantitative Risk Assessment in order to understand the potential threats to most critical aspects, supports resources and their potential impact if any disaster happens.

  1. Navigate to desktop of Windows Server 2016 and double-click PILAR shortcut icon.

    If the previous lab was cancelled, then you need to install the PILAR tool using steps 1 to 21 of Exercise 1. Otherwise if you are continuing the labs then skip to step 2 of Excercise 2.

    Screenshot

  2. Click Quantitative analysis button under Risk Analysis and Management section as shown in the screenshot.

    Screenshot

  3. PILAR window appears, click Project and select New from the drop-down menu as shown in the screenshot.

    Screenshot

  4. Project data window appears. In code field; enter RA Lab2, in name field; enter Risk Assessment 1, select RESTRICTED from the project – classification drop-down menu. In description field enter Quantitative Risk Assessment, in responsible field enter ECC, in organization field enter ECC, in version field enter 1.0 and in date field enter the current date of the lab (in this scenario, the date mentioned is 19-04-2017) as shown in the screenshot. Click Save and Close (happy smiley icon).

    Screenshot

  5. PILAR: [RA Lab2] Risk Assessment 2 window appears, in Quantitative analysis pane double-click D. Project and select Security domains from the sub-tree as shown in the screenshot.

    Screenshot

  6. RA Lab2: security domains window appears, click new domain icon present in the menu-bar as shown in screenshot.

    Screenshot

  7. security domain window appears. In code field enter Security Domain Test, in name field enter Security Domain 1 and in description field enter Security Domain 1 as shown in the screenshot. Click save and close to continue.

    Screenshot

  8. RA Lab2: security domains window appears. Double-click [base] Base, [Security Domain Test] Security Domain 1 is created. Click save and close.

    Screenshot

  9. PILAR: [RA Lab2] Risk Assessment 2 window appears, from the Project sub-tree select D.3. Project phases, as shown in the screenshot.

    Screenshot

  10. RA Labs2: project phases window appears, [current] current situation and [target] target situation project phases are created by default. Click save and close.

    Screenshot

  11. PILAR: [RA Lab2] Risk Assessment 2 window appears, in Quantitative analysis pane double-click A. Risk analysis. Double-click A.1 Assets and select A.1.1. identification from the sub-tree as shown in the screenshot.

    Screenshot

  12. RA Lab2: asset identification window appears, click Layers and select new layer from the drop-down menu as shown in screenshot.

    Screenshot

  13. layer window appears, in code field enter Layer 1 and in name field enter Layer 1. Click save and close to continue

    Screenshot

  14. RA Lab2: asset identification window appears and Layer 1 is added. Right-click [Layer1] Layer 1 and select new asset from the context menu.

    Screenshot

  15. asset window appears. In code field enter Assets, in name field enter Asset Test. In datum row, enter Asset 1, Asset 2, Asset 3 and in value row enter A1, A2, A3. Select [Security Domain Test] Security Domain 1 from the domain drop-down menu. In ASSET CLASSES select check-box of: [essential] Essential assets, [availability] Availability, [D] Data/Information, [S] Services, [SW] Software and [HW] Hardware option as shown in the screenshot. Click save and close button to continue

    Essential assets are those information and services managed by the information system. They represent the requirements of the risk owners, the security requirements. Essential assets exist before any implementation is detailed

    Screenshot

  16. RA Lab2: asset identification window appears, click save and close.

    Screenshot

  17. PILAR: [RA Lab2] Risk Assessment 2 window appears, in A.1 Assets sub-tree select A.1.2. asset classes as shown in the screenshot.

    Screenshot

  18. RA Labs2: asset classes window appears. In ASSETS pane, navigate to [Layer 1] Layer 1 --> [Assets] Asset Test and select {essential,availability,D,S,SW,HW}. In ASSET CLASSES pane navigate to [essential] Essential assets --> [info] information and select [biz] business data. Click Apply.

    Screenshot

  19. In ASSETS sub-tree, {essential.info.biz} is added, repeat step 18 to add ASSET CLASSES like arch.sap, availability.easy, evaluated.certified, D.files from [info], [arch], [availability], [evaluated] and [D] ASSET CLASSES respectively as shown in screenshot. Click save and close.

    Screenshot

  20. PILAR: [RA Lab2] Risk Assessment 2 window appears, in A.1 Assets sub-tree select A.1.3. valuation of domains as shown in the screenshot.

    Screenshot

  21. RA Labs2: valuation of domain window appears, select and double-click the box in [A] row and [Assets] Asset Test column (highlighted box) as shown in the screenshot in order to assign the values.

    Valuation of domains implies to the rating of security level for the domain where 0 is negligible and 10 is top.

    Screenshot

  22. [Assets] Asset Test :: [A] Availability window appears, select [7] High from the level drop-down menu and click apply as shown in the screenshot.

    In this scenario, we are assuming that priority of the Availability of the assets is high as continuous availability is required.

    Screenshot

  23. RA Lab2: valuation of domain window appears again, enter the value [7] High in other boxes by repeating the process mentioned in step 20 and 21 as shown in the screenshot. Click save and close.

    Screenshot

  24. PILAR: [RA Lab2] Risk Assessment 2 window appears, in A.1 Assets sub-tree select A.1.4. valuation of assets as shown in the screenshot.

    Screenshot

  25. RA Lab 2: valuation of assets window appears, accumulated values are specified to various fields i.e. [A], [I], [C], [Auth] and [Acc]. Click **save and close** to continue.

    Screenshot

  26. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in Qualitative analysis pane double-click A.2 Threats and select A.2.1. aggravating & mitigating conditions from the sub-tree as shown in the screenshot.

    Screenshot

  27. Aggravating & mitigating conditions window appears, select [Security Domain Test] Security Domain 1 in Security domains pane. In CRITERIA pane double-click Attacker Identification option and select [101.b] (5%) commercial competitor subtree for demonstration purpose. Click apply as shown in the screenshot.

    Aggravating & mitigating conditions in this assessment refers to the different criteria of potential risk factors and its impact on the Security Domain.

    Screenshot

  28. For demonstration of various criteria of aggravating & mitigating conditions, select various criteria subtree like Attacker Motivation, Attacker Benefit, Confidentiality as shown in screenshot. Click save and close to continue.

    Screenshot

  29. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in A.2 Threats sub-tree, select A.2.2. identification from as shown in the screenshot.

    Screenshot

  30. [RA Lab2] Risk Assessment 2 warning window appears, click Do not show this dialog in the future check-box and click OK.

    Screenshot

  31. RA Lab 2: Identification of threats window appears. In left pane navigate to ASSETS --> [Layer 1] Layer 1 --> [ASSETS] Asset Test, all the possible threats in risk assessment are listed. In left pane THREATS scenarios like Natural, Industrial, Errors and unintentional failures and Wilful attacks are selected as shown in the screenshot. Click save and close to continue.

    Screenshot

  32. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in A.2 Threats sub-tree select A.2.3. valuation as shown in the screenshot.

    Screenshot

  33. RA Lab 2: Valuation of Threats window appears, double click [Layer 1] Layer 1 in the ASSETS pane. [Assets] Asset Test row appears showing the percentage of threat evaluation for various crirteria like [A], [I], [C], [Auth] and [Acc]. Click save and close to continue.

    Screenshot

  34. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in Risk analysis sub-tree double-click A.3 Safeguard and select A.3.1. identification as shown in the screenshot.

    Screenshot

  35. RA Lab 2: safeguards window appears, click save and close to continue.

    Screenshot

  36. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in A.3 Safeguard sub-tree, select A.3.2. valuation (phases) as shown in the screenshot.

    Screenshot

  37. RA Labs 2: Safeguard effectiveness window appears. Right-click the empty box in current row and [H] General Protections column, select L4 – managed and measurable option from the context menu as shown in the screenshot.

    Note: In this scenario we are assuming that safeguard effectiveness in all the fields are managed and measureable i.e. L4.

    Screenshot

  38. Again Right-click the empty box in 'target' row and '[H] General Protections' column, select L5 – optimised option from the context menu as shown in the screenshot.

    Screenshot

  39. Repeat steps 36 and 37 to assign the values of safeguard effectiveness for current and target to other SAFEGUARDS options as shown in screenshot. Click save and close.

    In this scenario, we are assuming that all the criteria of the Safeguard effectiveness are currently L4 - managed and measurable and the target is L5 - optimised.

    Screenshot

  40. PILAR: [RA Lab 2] Risk Assessment 2 window appears, in A.3 Safeguard sub-tree, select A.3.3. valuation (domains) as shown in the screenshot.

    Screenshot

  41. RA Lab 2: Safeguard effectiveness window appears with the assigned value of various SAFEGUARDS. Click save and close to continue.

    Screenshot

  42. PILAR: [RA Lab 2] Risk Assessment 2 window appears. Double-click A.4 Impact & risk, double-click A.4.1. Accumulated value**s and select **A.4.1.1. impact from the sub-tree as shown in the screenshot.

    Screenshot

  43. RA Lab 2: accumulated impact window appears, accumulated impact ratings are assigned for various criteria for [Layer 1] Layer 1 as shown in screenshot. Click save and close to continue.

    Screenshot

  44. PILAR: [RA Lab 2] Risk Assessment 2 window appears. In A.4.1. Accumulated values sub-tree select A.4.1.2. risk as shown in the screenshot.

    Screenshot

  45. RA Lab 2: accumulated risk window appears, accumulated risk ratings are assigned for various criteria for [Layer 1] Layer 1 as shown in screenshot. Click save and close to continue.

    Screenshot

  46. PILAR: [RA Lab 2] Risk Assessment 2 window appears, double-click A.4.2. Deflected values and select A.4.2.1. impact from the sub-tree as shown in the screenshot.

    Screenshot

  47. RA Lab 2: deflected impact window appears showing the deflected impact assigned values for different criteria of [Assets] Asset Test as shown in screenshot. Click save and close.

    Screenshot

  48. PILAR: [RA Lab 2] Risk Assessment 2 window appears. In A.4.2. Deflected values sub-tree, select A.4.2.1. risk as shown in the screenshot.

    Screenshot

  49. RA Lab2: deflected risk window appears showing the deflected risk assigned values for different criteria of [Assets] Asset Test as shown in screenshot. Click save and close.

    Screenshot

  50. PILAR: [RA Lab2] Risk Assessment 2 window appears, in Qualitative analysis pane double-click R. Report. Double-click R.t. text, and select Risk Analysis from the sub-tree as shown in the screenshot.

    Screenshot

  51. Report data window appears, click select button in Assets field.

    Screenshot

  52. assets window appears, under ASSETS sub-tree select [Layer 1] Layer 1 and click save and close.

    Screenshot

  53. Report data window appears, click select button in Information sources field.

    Screenshot

  54. Information sources window appears, INFORMATION SOURCES is selected by default. Click save and close.

    Screenshot

  55. Report data window appears, click select button in Security domains field.

    Screenshot

  56. security domains window appears, under Security domains sub-tree tick [base] Base and [Security Domain Test] Security Domain 1 check-box as shown in screenshot. Click OK.

    Screenshot

  57. Report data window appears, click select button in Dimensions field.

    Screenshot

  58. dimensions window appears, in DIMENSIONS sub-tree tick [A] Availability, [I] Integrity, [C] Confidentiality, [Auth] Authenticity of users and information and [Acc] Accountability of service and data check-box. Click save and close.

    Screenshot

  59. Report data window appears, click select button in Project phases field.

    Screenshot

  60. project phases window appears, in Project phases sub-tree tick [Potential], [current] current situation and [target] target situation check-box. Click OK to continue.

    Since we are using 30 days Evaluation version of PILAR tool, we will not be able to save and publish the Risk Assessment Report in .RTF or .HTML format.

    Screenshot

  61. Report data window appears, click Cancel.

    Screenshot

  62. PILAR: [RA Lab2] Risk Assessment 2 window appears, in Quantitative analysis pane double-click E. Security profiles. Double-click [27002-2005] Code of practice for information security management (8.10.2012), and select Valuation from the sub-tree as shown in the screenshot.

    Screenshot

  63. RA Lab2 :: [27002-2005] Code of practice for information security management (8.10.2012) window appears showing the current and target level of various controls under [27002-2005] Code of practice for information security management (8.10.2012) as shown in the screenshot. Click save and close.

    ISO/IEC 27002:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The control objectives and controls in ISO/IEC 27002:2005 are intended to be implemented to meet the requirements identified by a risk assessment. ISO/IEC 27002:2005 is intended as a common basis and practical guideline for developing organizational security standards and effective security management practices, and to help build confidence in inter-organizational activities.

    Screenshot

  64. PILAR: [RA Lab] Risk Assessment 1 window appears. Double-click [27002-2013] Code of practice for information security controls, and select Valuation from the sub-tree as shown in the screenshot.

    Screenshot

  65. RA Lab2 :: [27002-2013] Code of practice for information security controls window appears showing the current and target level of various controls under [27002-2013] Code of practice for information security controls as shown in the screenshot. Click save and close.

    Screenshot

  66. Navigate to the menu-bar of PILAR. Click Project and select Save from the drop-down menu as shown in screenshot.

    Screenshot

  67. project (save) window appears, in File Name: field enter RA Lab2.mgr and click Save to save the PILAR project in default folder.

    Screenshot

  68. save RA Lab2.mgr window appears, click OK.

    You can encrypt the saved project by applying password in the password field.

    Screenshot

  69. After saving the project, click save and close to close the PILAR tool window.

    Screenshot

Assessment 1:

In the Report data window, identify the default classification option selected from the Classification dropdown

In Step 4, the default classification option selected from the project – classification drop-down menu is RESTRICTED.

This step shows that the classification option RESTRICTED is selected by default when setting up the project in PILAR.

Last Updated:
Next
lab 02