A New Sustainable Model for Risk Management—RiMM
Abstract
:1. Introduction
- ✓
- minimize losses;
- ✓
- improve the identification of opportunities and threats;
- ✓
- encourage proactive management;
- ✓
- be aware of the need to identify and treat risk throughout the organization;
- ✓
- increase the likelihood of achieving objectives.
2. RiMM, a New Model for Sustainable Risk Management—The Design/Proposal
- The assessment of resources;
- The assessment of threats;
- The assessment of vulnerabilities;
- The identification, analysis and assessment of risks;
- Risk management decisions—risk treatment and countermeasures.
- The determination of critical resources (that need protection);
- The priority establishment for each resource based on the consequences of loss (1 for resources less significant, 10 for critical resources).
- The identification of threats and categories of enemies;
- The assessment of the enemies intention and motivation;
- The assessment of enemies or threats potential;
- The determination of the occurrence frequency and threats level (regarding each critical resource) of each incidents based on statistics—according to the qualitative assessment, each threat level is calculated by frequency of occurrence:
- The identification of vulnerabilities (and the actual countermeasures to reduce them) regarding the critical resources;
- The estimation of the level of each vulnerability (regarding each critical resource or threat) that is calculated by probability of success:
- The estimation of the impact level regarding each critical resource;
- The estimation of the attack probability from a potential opponent;
- The estimation of the probability regarding vulnerabilities to be exploited;
- The estimation of the risk level: threat x vulnerability;
- The classification of risks identified based on an integrated evaluation.
2.1. The Monte Carlo Method Adapted for Risk Management Process
- ▪
- The impact is a random value between the minimum and the maximum impacts (Imin and Imax) which were defined in the first step (the assessment of resources);
- ▪
- The threat represents a random value between the minimum and the maximum levels of the threat (Amin and Amax) which were defined in the second step (the assessment of threats);
- ▪
- The vulnerability represents a random value between the minimum and the maximum apparition probability levels of an incident (Vmin and Vmax) which were defined in the third step (the assessment of vulnerabilities);
- The treatment of identified risks and the identification of the countermeasures in order to reduce the vulnerabilities;
- The identification of the efficiency for each measure proposed;
- The estimation of the costs for each measure proposed;
- The preparation of a recommendation for the top management regarding the risks.
- The transfer of not treated risks;
- The transfer of not fully evaluated resources (e.g., the vulnerabilities and threats regarding a resource were not identified in time)
- The identification of new resources, threats and vulnerabilities in organization;
2.2. What Is New Regarding This Model
2.3. RiMM, a New Model for Sustainable Risk Management—Software Implementation, One Practical Exemplification and a Comparison with Other Methods
- this version of the software can be used for managing all types of risks, not only the security ones,
- the model proposed in this paper can be applied not only in classical way, without using computers, but in an automated approach (automated calculation) in order to identify, analyze, evaluate and then treat and provide countermeasures to all significant risks across an organization.
- The input data must be provided to the application which makes the analysis and assessment of security risks.
- ✓
- The probability—impact diagrams can be generated and viewed;
- ✓
- Reports generation regarding the analysis made;
- ✓
- The application allows the transition to the next analysis which implies the transfer of not treated risks and not fully evaluated resources;
- The data regarding resources, threats and vulnerabilities are introduced in the application by humans—there could be errors;
- The software application provides a list of countermeasures from which the management should choose to apply in order to treat the every analyzed risk.
2.4. The Application of the RiMM Model to a Practical Example
The Description of Risk Risk_Workstation_Backup_System_of_Information:
- ✓
- STEP 1: The assessment of resources—Resource: workstations in organization and the back-up system of information—Impact min = 5; Impact max = 7;/Resource category: equipments;
- ✓
- STEP 2: The assessment of threats—Threat: to fail to do back-up of information by the IT responsible or workstations down and possible loss of data—Threat min = Low/0.34; Threat max = Medium/1;
- ✓
- STEP 3: The assessment of vulnerabilities—Vulnerability: the back-up system is not an automated one/the workstations are old with continuous working, possible loss of data—Vulnerability min = Low/0%–33%; Vulnerability max = Medium/3%–66%;
- ✓
- STEP 4: The identification, analysis and assessment of risks—Details regarding the risk Risk_Workstation_Backup_System_of_Information: see theTable 5;
- ✓
- STEP 5: Risk management decisions—risk treatment and countermeasures—Solutions adopted and implemented in organization: the acquisition of new workstations/an automated back-up system of information so that the activity of the company not to be affected by periodical back-up, usually made at night; by this automated back-up, the availability of information is assured 24/24 and the losses of data are avoided.
- ✓
- The costs for treatment of risk R_W_BSI: 0 Euro (the responsible—IT department) for the automated back-up system of information; 500 Euro*number of workstations, for the acquisition of new workstations;
- ✓
- Is risk Risk_Workstation_Backup_System_of_Information treated? = YES.
2.5. A Short Comparison to Other Methods
- ➢
- CRAMM (C.C.T.A. Risk Analysis and Management Method)—it is a method developed by the British governmental organization C.C.T.A. (Central Communication and Telecommunication Agency). Currently, CRAMM is the UK’s preferred risk analysis method.
- ➢
- OCTAVE v2.0—Operationally Critical Threat, Asset, and Vulnerability EvaluationSM defines a strategic risk-based security technique. Octave is a “self-directed” approach, meaning people in the organization assume responsibility for setting the organization’s security strategy.
3. Conclusions
- The proposal of the model;
- The implementation of the model;
- A case study in an organization, plus a practical exemplification;
- A short comparison to other two methods for risk management.
Author Contributions
Funding
Conflicts of Interest
References
- Roper, C. Risk Management for Security Professionals; Butterworth Heinemann: Boston, MA, USA, 1999; ISBN 0-7506-7113-0. [Google Scholar]
- Pandian, R. Applied Software Risk Management; Auerbach Publications Taylor & Francis Group: London, UK, 2007; ISBN 0-8493-0524-1. [Google Scholar]
- Risk Management—Principles and Guidelines. Available online: https://www.iso.org/obp/ui/#iso:std:iso:31000:ed-1:v1:en (accessed on 20 January 2015).
- Bushnell, S. What Is the Sustainable Risk Management Process? Available online: https://www.poplarnetwork.com/news/what-sustainable-risk-management-process (accessed on 5 January 2019).
- ISO 31000:2009 International Standard: Risk Management—Principles and Guidelines. Available online: https://www.iso.org (accessed on 5 January 2019).
- Purcărea, A.A. Management and Industrial Engineering. Mathematical Models; Niculescu Publishing House: Bucharest, Romania, 2003; 320p. [Google Scholar]
- Ţigănoaia, B. Information Security Assurance in Organizations; Strategic and Security Studies Series; European Institute Publishing House: Iasi, Romania, 2013; ISBN 978-973-611-997-2. [Google Scholar]
- Jeges, R. Monte Carlo Simulation in MS Excel. 2001. Available online: http://www.projectware.com.au/ (accessed on 5 June 2015).
- Ţigănoaia, B.; Macari, C. Application Development for Analyzing and Assessing Security Risks within an Organization; MTA Review: Bucharest, Romania, 2011; Volume XXI, pp. 175–188, No. 3 (Sep), ISSN code: 1843-3391, indexing: Ulrich’s International Periodicals Directory, Index Copernicus International, CNCSIS (cod 842), The Lancaster Index, 2011. [Google Scholar]
Frequency | Level |
---|---|
Occurrence of an incident once every 6 years | Very low |
Occurrence of an incident once every 3 years | Low |
Occurrence of an incident once in a year | Medium |
Occurrence of an incident once every 6 months | High |
Occurrence of an incident once every month | Very high |
Probability | Level |
---|---|
In the worst case scenario, an incident is likely to occur 25% chance | Low |
In the worst case scenario, an incident is likely to occur between 25% and 50% chance | Medium |
In the worst case scenario, an incident is likely to occur more than 50% chance | High |
The Rule | The Type of the Risk |
---|---|
Impact <= 1 | Trivial |
1 < Impact <= 5 AND the probability of apparition <= 50% | Nominal |
Impact > 5 | Hazard |
1 < Impact <= 5 AND the probability of apparition > 50% | Sure risk |
Rule | Treatment Method |
---|---|
the probability of apparition <= 15% | Retention (accept and budget) |
15% < the probability of apparition <= 65% | Reduction (optimize–mitigate) |
the probability of apparition > 65% | Avoidance (eliminate, withdraw from or not become involved)/Sharing (transfer–outsource or insure) |
Risk | Level | Impact | Probability | Type of Risk | Treatment |
---|---|---|---|---|---|
R_W_BSI | 2 | 5.89 | 33% | Nominal | Reduction |
The Name of the Method | Level of Detail/Management—M, Operational—O, Technic—T | Free | Abilities to Introduce/Use/Mentain | Instruments | Origin Country |
---|---|---|---|---|---|
CRAMM | M, O, T | No | Specialist/Specialist/Specialist | YES, comerial | UK |
OCTAVE v2.0 | M, O | YES | Standard/Standard/Standard | YES, comercial | USA |
RiMM | M, O, T | YES | Standard/Standard/Standard | YES, software | Romania |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tiganoaia, B.; Niculescu, A.; Negoita, O.; Popescu, M. A New Sustainable Model for Risk Management—RiMM. Sustainability 2019, 11, 1178. https://doi.org/10.3390/su11041178
Tiganoaia B, Niculescu A, Negoita O, Popescu M. A New Sustainable Model for Risk Management—RiMM. Sustainability. 2019; 11(4):1178. https://doi.org/10.3390/su11041178
Chicago/Turabian StyleTiganoaia, Bogdan, Andrei Niculescu, Olivia Negoita, and Mirona Popescu. 2019. "A New Sustainable Model for Risk Management—RiMM" Sustainability 11, no. 4: 1178. https://doi.org/10.3390/su11041178
APA StyleTiganoaia, B., Niculescu, A., Negoita, O., & Popescu, M. (2019). A New Sustainable Model for Risk Management—RiMM. Sustainability, 11(4), 1178. https://doi.org/10.3390/su11041178