• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.951 ■ Spring 2024 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Course
      • Unit 0a – Introduction
      • Unit 0b – The Threat Environment
      • Unit 1a – System Security Plan
      • Unit 1b – Planning and Policy
      • Unit 2a – Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Unit 2b – Cryptography
      • Unit 3a – Secure Networks
      • Unit 3b – Firewalls, Intrusion Detection and Protection Systems
    • Second Half of the Course
      • Unit 4b – Case Study 2 Data Breach at Equifax
      • Unit 5a – Access Control
      • Unit 5b Host Hardening
      • Unit 6a Application Security
      • Unit 6b Data Protection
      • Unit 7a – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Team Project Instructions
  • Harvard Coursepack

NIST SP 800-100, Chapter 10 “Risk Management”

January 1, 2022 by Jose Gomez 29 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 0b - The Threat Environment Tagged With:

Reader Interactions

Comments

  1. Shijie Yang says

    February 28, 2024 at 9:32 am

    An effective risk management process is an important component of a successful information security program. Risk management is an aggregation of three processes that have their roots in several federal laws, regulations, and guidelines. If there is to be risk management, a risk assessment is required, and the risk assessment process for federal agencies is usually repeated at least every three years, and the risk assessment should be conducted and integrated into the SDLC of the information system as a good practice that supports the business goals or mission of the organization.

    The first stage of risk management defines the steps of risk management as 1. characterizing, characterizing an information system establishes the scope of the risk assessment effort. 2. Threat Identification, Threats are mainly divided into natural, man-made and environmental threats. 3. Vulnerability Identification, a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach or a violation of the system’s security policy. 4. Risk Analysis 5. Control Recommendations 6. Risk Mitigation

    The second phase of the risk management process is risk mitigation.
    1.Prioritize actions.
    2.Evaluate recommended control options.
    3.Conduct cost-benefit analyses.
    4.Select controls.
    5.Assign responsibility.
    6.Develop a safeguard implementation plan.
    7.Implement selected control(s).

    The final phase in the risk management process is evaluation and assessment.

    Log in to Reply
  2. Xiaozhi Shi says

    February 28, 2024 at 8:54 pm

    An effective risk management process is mentioned in this chapter as an important component of a successful information security program. The primary objective of an organization’s risk management process is to protect the organization and its ability to carry out its mission, not just its information assets.
    It also describes that risk management is an aggregation of three processes, which are risk assessment, risk mitigation, and assessment and evaluation.

    Log in to Reply
  3. Yuanjun Xie says

    February 29, 2024 at 1:40 am

    An effective risk management process is an important component of a successful
    information security program. The principal goal of an organization’s risk
    management process is to protect the organization and its ability to perform its
    mission, not just its information assets. Therefore, the risk management process
    should not be treated primarily as a technical function carried out by the information
    security experts who operate and manage the information security system, but as an
    essential management function of the organization that is tightly woven into the
    system development life cycle (SDLC), 67 as depicted in Figure 10-1. Because risk
    cannot be eliminated entirely, the risk management process allows information
    security program managers to balance the operational and economic costs of
    protective measures and achieve gains in mission capability. By employing practices
    and procedures designed to foster informed decision making, agencies help protect
    their information systems and the data that support their own mission.

    Log in to Reply
  4. Xinyi Peng says

    February 29, 2024 at 2:17 am

    Risk management is the process of identifying, assessing, prioritizing, and mitigating risks to an organization’s assets, operations, and objectives. It involves analyzing potential threats and vulnerabilities and implementing strategies to minimize the likelihood and impact of adverse events.Overall, effective risk management is essential for organizations to protect their assets, achieve their objectives, and maintain trust with stakeholders in an increasingly complex and dynamic threat landscape.

    Log in to Reply
  5. Guanhua Xiao says

    February 29, 2024 at 2:58 am

    I think the key point is that risk management involves three processes. These processes are risk assessment, risk mitigation and assessment and assessment. In these processes, risk assessment is an essential process, the purpose of risk assessment is to identify and assess the risk in a particular environment.
    Risk assessment estimates the likelihood that a particular threat will successfully exploit a particular vulnerability by assessing motivations, opportunities, and methods for exploiting threat sources. Vulnerabilities are analyzed to discover potential impacts on the confidentiality, integrity, and availability of systems and the data they process.
    The depth of the risk assessment can vary widely, depending on the criticality and sensitivity of the system, for example as applied to confidentiality, integrity, and availability.

    Log in to Reply
  6. Shuting Zhang says

    February 29, 2024 at 5:34 am

    The first phase pf the risk management is risk assessment , the risk assessment process consists of several steps:
    1.System Characterization
    2.Threat Identification
    3.Vulnerability Identification
    4. Risk Analysis
    5.Control Recommendations
    6.Results Documentation
    Then, second phase of the risk management process is risk mitigation.
    The third and final phase in the risk management process is evaluation and assessment.
    I would like to focus on the step of Risk Mitigation. Risk mitigation is a crucial stage in the risk management process as it involves taking actions to reduce or eliminate identified risks. This step is essential for ensuring the security and resilience of information systems against potential threats and vulnerabilities.

    Log in to Reply
  7. Hongli Ma says

    February 29, 2024 at 6:04 am

    Chapter 10 of NIST SP 800-100, “Risk Management,” emphasizes the importance of integrating risk management into an organization’s overall governance structure. One particularly impactful point is the concept of risk appetite, which refers to the amount of risk an organization is willing to accept in pursuit of its objectives. The chapter explains that risk appetite should be aligned with the organization’s mission, values, and strategic goals. This concept resonates because it highlights the need for organizations to balance risk-taking with risk mitigation strategies, ensuring that risks are managed within acceptable limits. By defining and communicating its risk appetite, an organization can make informed decisions about which risks to accept, avoid, mitigate, or transfer, ultimately enhancing its ability to achieve its objectives while managing risk effectively.

    Log in to Reply
  8. Chun Liu says

    February 29, 2024 at 6:27 am

    Risk management is the process of identifying, assessing and controlling financial, legal, strategic and security risks to an organization’s capital and earnings. These threats, or risks, could stem from a wide variety of sources, including financial uncertainty, legal liabilities, strategic management errors, accidents and natural disasters.
    If an unforeseen event catches your organization unaware, the impact could be minor, such as a small impact on your overhead costs. In a worst-case scenario, though, it could be catastrophic and have serious ramifications, such as a significant financial burden or even the closure of your business.
    To reduce risk, an organization needs to apply resources to minimize, monitor and control the impact of negative events while maximizing positive events. A consistent, systemic and integrated approach to risk management can help determine how best to identify, manage and mitigate significant risks.

    Log in to Reply
  9. Xiaozhi Shi says

    February 29, 2024 at 7:20 am

    By reading Chapter 10, I learned that: An effective risk management process is an important part of a successful information security program. The three processes are risk assessment, risk mitigation, and evaluation and assessment. Risk Objective The assessment process is to identify and evaluate the risks of a given environment. On the other hand, a seven-step approach is commonly used to guide the selection of security controls in the risk response risk mitigation process: 1. prioritize actions; 2. evaluate recommended control options; 3. perform a cost-benefit analysis; 4. select controls; 5. assign responsibilities; 6. develop an assurance implementation plan, and 7. implement selected controls. Reducing the level of risk through this approach can effectively avoid uncontrollable risks.
    The risk management process continues throughout the system development life cycle, from the early stages of project initiation to the decommissioning of the system and its data. From the outset, the organization considers the threats and risks to which the system may be exposed in order to better prepare for safe and effective operation in the intended environment and to keep risks within manageable limits.

    Log in to Reply
  10. Yawen Du says

    February 29, 2024 at 7:38 am

    The process of identifying, assessing, mitigating, and monitoring information security risks is discussed in detail in Chapter 10, Risk Management, of the NIST SP 800-100 Information Security Handbook. Risk management is a core component of information security because it helps organizations understand the threats and vulnerabilities they face and develop strategies to mitigate those risks. Risk management is an ongoing process that requires collaboration and joint efforts between different departments and teams within an organization. By implementing an effective risk management strategy, organizations can reduce information security risks, protect their critical information and assets, and ensure business continuity and stability.

    Log in to Reply
  11. Haoran Wang says

    February 29, 2024 at 9:29 am

    Based on the readining ,The risk management included three process.Risk assessment,risk mitigation,and risk evaluation and assessment.The risk assessment included six step,which are:
    1.System Characterization
    2.Threat Identification
    3.Vulnerability Identification
    4.Risk Analysis
    5.Control recommendations
    6.Results Documentation
    Overall,I think risk assessment is the most important ,because risk assessment help the organization find the risks and provide information about the risks.

    Log in to Reply
  12. Shuyi Dong says

    February 29, 2024 at 1:33 pm

    The Risk Assessment Process breaks down complex tasks into smaller, more manageable parts, allowing organizations to conduct a comprehensive and accurate assessment of the company. The detailed characterization of system features is given a primary and central place in this process. Any negligence or omission in this part of the process can lead to an incomplete network and infrastructure security program, exposing potential weaknesses. While other security measures may be solid enough, as soon as an attacker recognizes and exploits this weakness, the entire security defense can fall apart.

    Once the preliminary work is properly completed, the next two assessment components can go hand in hand. One is the in-depth identification of threats and vulnerabilities, which is also critical. This step is like intelligence gathering on the battlefield, helping us to understand the attacker’s possible tactics and providing a basis for formulating effective countermeasures.

    Overall, the meticulousness and accuracy of the first three steps are critical to the success of the entire assessment process, and they provide a solid foundation for the subsequent work, ensuring the integrity and effectiveness of the overall risk assessment.

    Log in to Reply
  13. Yujie Cao says

    February 29, 2024 at 9:46 pm

    NIST SP 800-100, Chapter 10 is about risk management. After reading this chapter, what impresses me most is risk assessment, which includes six steps: system characteristic description, threat identification, vulnerability identification and risk analysis, control suggestion and result record archiving. I think the most important of them is the fourth step: risk analysis, which includes control analysis, likelihood determination, impact analysis and risk determination.

    Log in to Reply
  14. Zhang Yunpeng says

    February 29, 2024 at 10:10 pm

    The integration of the two perspectives on risk management reveals that risk management encompasses three fundamental processes: risk assessment, risk mitigation, and evaluation and assessment. Risk assessment, a crucial component, aims to identify and evaluate risks within a specific environment. This process involves estimating the likelihood of a particular threat successfully exploiting a vulnerability by considering motivations, opportunities, and methods. Vulnerabilities are analyzed to assess potential impacts on the confidentiality, integrity, and availability of systems and their associated data. The depth of the assessment depends on the system’s criticality and sensitivity.

    The risk management process begins with risk assessment, which encompasses several steps: system characterization, threat identification, vulnerability identification, risk analysis, control recommendations, and results documentation. Following the assessment, the second phase is risk mitigation, a crucial stage in the process that involves taking actions to reduce or eliminate identified risks. This step is essential for ensuring the security and resilience of information systems against potential threats and vulnerabilities.

    Finally, the third and final phase of the risk management process is evaluation and assessment. This phase involves assessing the effectiveness of the risk mitigation strategies implemented and identifying any remaining risks that require further attention. By continuously evaluating and adapting risk management strategies, organizations can improve their resilience and security, protecting against ever-evolving threats and vulnerabilities.

    Log in to Reply
  15. Yiwei Hu says

    February 29, 2024 at 10:34 pm

    After reading the article, I have learned the following: Effective risk management process is an important part of a successful information security plan. Risk management involves three processes: risk assessment, risk mitigation, and evaluation and evaluation. The risk assessment process consists of six steps which are
    1. System feature description 2. Threat identification 3. Vulnerability identification 4. Risk analysis 5. Control Suggestion 6. Result record
    Risk management is an ongoing process that is essential in order for organizations to operate and thrive in today’s market environment.

    Log in to Reply
  16. Xuanwen Zheng says

    March 1, 2024 at 2:16 am

    An efficient risk management process is a key component of a successful information security program. The primary goal of an organization’s risk management process is to protect the organization and its ability to fulfill its mission, not just its information assets. Therefore, the risk management process should not only be regarded as a technical function of the information security system operated and managed by the information security administrator, but also as a basic management function of the organization closely woven into the development life cycle of the system. In other words, the risk management process is like an umbrella, holding up a safe world for the organization’s information system. When operating and managing information security systems, information security experts should not only play their technical expertise, but also integrate risk management into the life cycle of organizational system development, just like fixing the umbrella bone on the umbrella handle, making it stand in the wind and rain. Let’s express it in a more literary way: the risk management process is like a solid barrier to the organization’s information system, which not only protects the information assets, but also protects the organization’s ability to fulfill its mission. When operating and managing information security systems, information security experts should regard risk management as an indispensable part of the development life cycle of the organization system, just like a shield in the hand of a warrior, blocking the danger for the organization at critical moments.

    Log in to Reply
  17. Yue Ma says

    March 1, 2024 at 3:13 am

    The risk management process should consist of three parts, namely, risk assessment, risk mitigation, and evaluation and assessment. Risk mitigation is not possible to remove all risk from the system after the risk assessment process. I think risk management has to be a continuous cycle. In particular, since technology is always involved and changing dynamic and threatening situations. I think Chapter 10 does a good job of outlining the dynamics of the IT risk management process. This chapter is very useful for us in identifying, accessing, and mitigating risks.

    Log in to Reply
  18. Yujie Cao says

    March 1, 2024 at 5:36 am

    This chapter is about risk management. After reading this chapter, what impresses me most is risk assessment, which includes six steps: system characteristic description, threat identification, vulnerability identification and risk analysis, control suggestion and result record archiving. I think the most important of them is the fourth step: risk analysis, which includes control analysis, likelihood determination, impact analysis and risk determination.

    Log in to Reply
  19. Yue Wang says

    March 1, 2024 at 10:18 am

    Through reading and thinking, I believe that risk is divided into two major parts: risk strategy and risk management:
    1, risk strategy includes risk frameworks and standards, such as Cobit 5 risk, COSO ERM framework, ISO31000 implementation of risk management principles and guidance, etc., relying on this framework as a methodology, can guide our enterprise risk management work.
    In enterprises, risks are usually roughly graded, such as strategic risks, operational risks, compliance risks, etc., and are disposed of through the strategic level, project level, operational level, etc. There are also three lines of defence to maximise the effectiveness of risk management.
    2、Risk Management
    Through the risk framework and enterprise risk management, the specific implementation of risk management will be based on risk categories, risk scenarios, opportunities and risks, as well as risk management life cycle to carry out risk specific work.

    Log in to Reply
  20. Zhaomeng Wang says

    March 1, 2024 at 12:03 pm

    Information security management: Supervise and make necessary decisions to achieve business goals by protecting an organization’s information assets. Information security management is manifested through the development and use of information security policies, procedures, and guidelines, which are then applied by all relevant personnel throughout the organization.
    Risk assessment includes:
    System Characterization
    Threat Identification
    Vulnerability Identification
    Risk Analysis
    Control Analysis
    Control Recommendations
    Results Documentation

    Log in to Reply
  21. Zhaomeng Wang says

    March 1, 2024 at 12:07 pm

    Information security management: Supervise and make necessary decisions to achieve business goals by protecting an organization’s information assets. Information security management is manifested through the development and use of information security policies, procedures, and guidelines, which are then applied by all relevant personnel throughout the organization.
Risk assessment includes:
System Characterization
Threat Identification
Vulnerability Identification
Risk Analysis
Control Analysis
Control Recommendations
Results Documentation

    Log in to Reply
  22. Zhaomeng Wang says

    March 1, 2024 at 12:07 pm

    Information security management: Supervise and make necessary decisions to achieve business goals by protecting an organization’s information assets. Information security management is manifested through the development and use of information security policies, procedures, and guidelines, which are then applied by all relevant personnel throughout the organization.
Risk assessment includes:
System Characterization
Threat Identification
Vulnerability Identification
Risk Analysis
Control Analysis
Control Recommendations
Results Documentation。

    Log in to Reply
  23. Chenhao Zhang says

    March 1, 2024 at 9:02 pm

    NIST SP 800-100, the Risk Management Framework (RMF), provides organizations with a comprehensive, structured approach to managing information security risks. The framework is designed to help organizations identify, assess, mitigate and monitor information security risks to ensure the security and confidentiality of their information systems, data and assets.
    RMF includes the following key steps:
    Category and sub-category determination, security and control objective determination, security control assessment, authorization, monitoring.
    Authorizing maintenance and updating RMFS is an iterative process that requires organizations to constantly evaluate and adjust their security controls. By implementing RMF, organizations can better understand the risks to their information systems and take appropriate measures to manage those risks, thereby protecting the security of their business and data.
    It is important to note that the NIST SP 800-100 “Risk Management Framework” is a directive document that does not mandate organizations to follow a specific methodology or tool. Instead, it provides a flexible framework where organizations can customize and implement risk management strategies according to their needs and circumstances.

    Log in to Reply
  24. Hao Zhang says

    March 1, 2024 at 10:36 pm

    Risk management should be considered when designing a system in the systems development life cycle (SDLC) by understanding what type of hardware, software, and data are going to be included in the system. Using this and additional information the system can be used to establish scope of a risk assessment and ultimately be used to determine if any potential risks are acceptable or unacceptable and need to be mitigated. Lastly, the mitigations put in place can be used to determine any remaining residual risk.

    Log in to Reply
  25. Yuming He says

    March 1, 2024 at 11:52 pm

    Risk management is an ongoing process that includes risk assessment, risk mitigation, and evaluation and assessment. The risk management lifecycle starts with system classification, selecting and implementing security controls, evaluating security controls, authorizing information systems, monitoring security controls, and then repeating as needed.

    Log in to Reply
  26. Hao Li says

    March 2, 2024 at 3:09 am

    Through the reading of this chapter, I have learned that risk management consists of three main elements: risk assessment, risk mitigation, and assessment and evaluation. Risk management is a fundamental process that every organization should focus on and implement because it helps support the organization’s goals and establishes a system security plan. The importance of embedding the risk management process into the system development life cycle. Since the goal of risk management is to protect the organization’s systems and assets and to enable the organization to achieve its goals and mission, risk management should be considered as one of the primary management functions rather than a job for security personnel.

    Log in to Reply
  27. Chunqi Liu says

    March 2, 2024 at 5:47 am

    Risk Management forms a core part of an entity’s information system security and since it is impossible to eliminate all risks, this process – by way of risk assessment, risk evaluation, risk mitigation helps establish an acceptable information system security risk. That is, the risk an entity is willing to undertake in achieving its objectives.

    Log in to Reply
  28. Yi Liu says

    March 2, 2024 at 2:06 pm

    Risk assessment should be conducted and integrated into the SDLC of information systems, not because it is required by law or regulation, but because it is good practice and supports the business objectives or mission of the organization. The steps of risk assessment are as follows: 1. Description of system characteristics. Describing the characteristics of an information system establishes the scope of the risk assessment effort, delineates the boundaries of operational authorization (or accreditation), and provides information. 2. Threat identification. This step should eventually result in a “threat statement,” or a comprehensive list of potential sources of threats. 3. Vulnerability identification. Penetration testing can be used to enhance vulnerability source reviews and identify vulnerabilities that may not have been previously identified in other sources. 4. Risk analysis. The analysis needs to consider closely intertwined factors such as reviewing the system’s security controls, the likelihood of inadequate or ineffective system protection, and the impact of failure. 5. Control suggestions. The objective of the control proposal is to reduce the level of risk to the information system and its data to a level that an organization considers acceptable. 6. Result document. The risk assessment report is the mechanism used to formally report the results of all risk assessment activities.

    Log in to Reply
  29. Haixu Yao says

    March 2, 2024 at 7:59 pm

    An effective risk management process is an important part of a successful information security program. Risk management consists of three basic processes: risk assessment, risk mitigation, and evaluation and evaluation. The risk management process begins with risk assessment, which consists of several steps: system characterization, threat identification, vulnerability identification, risk analysis, control recommendations, and result documentation. The second stage is risk reduction, which involves taking action to reduce or eliminate the identified risks. This step is critical to ensuring the security of information systems and their resilience against potential threats and vulnerabilities. The third phase is assessment and evaluation, which involves assessing the effectiveness of the risk mitigation strategies implemented and identifying any remaining risks that require further attention.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

READINGS & CASE STUDY QUESTIONS

  • 0a – Introduction (1)
  • 0b – The Threat Environment (5)
  • 1a – System Security Plan (4)
  • 1b – Planning and Policy (4)
  • 2a – Case Study 1 (4)
  • 2b – Cryptography (4)
  • 3a – Secure Networks (5)
  • 3b – Firewalls and IDS and IPS (3)
  • 4b – Case Study 2 (4)
  • 5a – Access Control (5)
  • 5b – Host Hardening (3)
  • 6a – Application Security (4)
  • 6b – Data Protection (2)
  • 7a – Incident and Disaster Response (3)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in