Page 664 - StudyBook.pdf
P. 664

648    Chapter 11 • Operational and Organizational Security: Incident Response

                 Risk identification is the process of ascertaining what threats pose a risk to a
             company so that it can be dealt with accordingly.There are many different types of
             risks that can affect a business, and each organization faces different ones. For
             example, an e-commerce site is at risk of credit card information being acquired by
             a hacker, while a public information site with no sensitive data would not consider
             this to be a potential problem. For this reason, you cannot identify risks by
             adopting a list created by another organization. Each business must identify the
             risks they may be in danger of confronting.
                 A common type of risk is a disaster, which can be naturally occurring or the
             result of accidents and malfunctions. Natural disasters include storms, floods, fires,
             earthquakes, tornadoes, or any other environmental event.They can also include
             situations that may cause damage to an organization, such as when a fire breaks out
             due to faulty wiring, a pipe bursts, or a power outage occurs. In addition to these
             risks, an organization is commonly at risk for equipment failures, such as air condi-
             tioning breaking down in the server room, a critical system failing, or any number
             of other problems.As will be seen in Chapter 12, disasters can create massive
             damage to a company, so countermeasures must be established to deal with them.
                 Risks from external sources do not just come in the form of natural occur-
             rences.As discussed throughout this book, there are a number of different risks that
             result from malicious persons and the programs they use and disseminate.Trojan
             horse attacks, viruses, hackers, and various other attacks can devastate an organiza-
             tion as effectively as any natural disaster.An attack on systems can result in disrup-
             tion of services or the modification, damage, or destruction of data.
                 Internal risks are often overlooked.These are risks in which consequences result
             from the actions of persons employed by an organization. Corporate theft costs busi-
             nesses considerable amounts of money every year.This not only relates to the theft
             of computers and other office equipment, but to small thefts that add up over time.
                 Software and data are also targets of corporate theft. Employees may steal instal-
             lation CDs or make copies of software to install at home.A single program can cost
             hundreds or even thousands of dollars, while copied CDs that are illegally installed
             can result in piracy charges and legal liability. If an employee takes sensitive data
             from a company and sells it to a competitor or uses it for other purposes, the com-
             pany could lose millions of dollars or face liability suits or even criminal charges if
             the stolen data breaches client confidentiality. In cases where data involves corpo-
             rate financial information, embezzlement could also result. By failing to address the
             risk of such theft, a company can be at risk of huge losses.
                 When incidents occur, the impact of an event could pose additional risks. If a
             company loses confidence in a business, sales could drop significantly. For example,



          www.syngress.com
   659   660   661   662   663   664   665   666   667   668   669