Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Information Technology – Guidelines for the Management of IT Security
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Control and Accounting Information Systems
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Service Design – Section 4.5 Service Continuity Management.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
The Australian/New Zealand Standard on Risk Management
By: Ashwin Vignesh Madhu
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
1 Risk management and Investigation Peter Roberts
Risk Assessment Frameworks
Risk Management Vs Risk avoidance William Gillette.
Session 3 – Information Security Policies
Computer Security: Principles and Practice
Protection Against Occupational Exposure
Introduction to Network Defense
Principles of Information Security, 2nd Edition1 Introduction.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
PRM 702 Project Risk Management Lecture #28
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
G53SEC Computer Security Introduction to G53SEC 1.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Basics of OHSAS Occupational Health & Safety Management System
1 Introduction to Security Chapter 5 Risk Management: The Foundation of Private Security.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Internal Control in a Financial Statement Audit
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
Project Management IV1021Fö5 Risk Management. Agenda Project Risk Project Risk Management The Risk Management Process Goal: get an understanding of basic.
Alaa Mubaied Risk Management Alaa Mubaied
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Project Risk Management Planning Stage
SecSDLC Chapter 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
1 Project Management C53PM Session 4 Russell Taylor Staff Work-base – 1 st Floor
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Chapter 13 Risk Management. Chapter Objectives 1.Define risk and risk management 2.Outline key risk issues and types of risk 3.Identify concrete methods.
DARSHANA RAGHU MANAGEMENT. Risk Management Risk management is the identification, assessment, and prioritization of risks followed by coordinated and.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Management Goes Global
Security Management in Practice
An Overview on Risk Management
Chapter 9 Control, security and audit
Principles and Practice
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security Management and Risk Assessment

Overview   security requirements means asking what assets do we need to protect? how are those assets threatened? what can we do to counter those threats?   IT security management answers these determining security objectives and risk profile perform security risk assessment of assets select, implement, monitor controls } next iterate process } chapter

IT Security Management  IT Security Management: a process used to achieve and maintain appropriate levels of confidentiality, integrity, availability, accountability, authenticity and reliability. IT security management functions include:  organizational IT security objectives, strategies and policies  determining organizational IT security requirements  identifying and analyzing security threats to IT assets  identifying and analyzing risks  specifying appropriate safeguards  monitoring the implementation and operation of safeguards  developing and implement a security awareness program  detecting and reacting to incidents

ISO Security Standards

IT Security Manage ment Process

Plan - Do - Check - Act

Organizational Context and Security Policy  first examine organization’s IT security: objectives - wanted IT security outcomes objectives - wanted IT security outcomes strategies - how to meet objectives strategies - how to meet objectives policies - identify what needs to be done policies - identify what needs to be done  maintained and updated regularly using periodic security reviews using periodic security reviews reflect changing technical / risk environments reflect changing technical / risk environments  examine role of IT systems in organization

Security Policy Topics  needs to address: scope and purpose including relation of objectives to business, legal, regulatory requirements scope and purpose including relation of objectives to business, legal, regulatory requirements IT security requirements IT security requirements assignment of responsibilities assignment of responsibilities risk management approach risk management approach security awareness and training security awareness and training general personnel issues and any legal sanctions general personnel issues and any legal sanctions integration of security into systems development integration of security into systems development information classification scheme information classification scheme contingency and business continuity planning contingency and business continuity planning incident detection and handling processes incident detection and handling processes how when policy reviewed, and change control to it how when policy reviewed, and change control to it

Management Support  IT security policy must be supported by senior management  need IT security officer to provide consistent overall supervision to provide consistent overall supervision manage process manage process handle incidents handle incidents  large organizations needs IT security officers on major projects / teams manage process within their areas manage process within their areas

Security Risk Assessment  critical component of process else may have vulnerabilities or waste money else may have vulnerabilities or waste money  ideally examine every asset verses risk not feasible in practice not feasible in practice  choose one of possible alternatives based on orgs resources and risk profile baseline baseline informal informal formal formal combined combined

Baseline Approach  use “industry best practice” easy, cheap, can be replicated easy, cheap, can be replicated but gives no special consideration to org but gives no special consideration to org may give too much or too little security may give too much or too little security  implement safeguards against most common threats  baseline recommendations and checklist documents available from various bodies  alone only suitable for small organizations

Informal Approach  conduct informal, pragmatic risk analysis on organization’s IT systems  exploits knowledge and expertise of analyst  fairly quick and cheap  does address some org specific issues  some risks may be incorrectly assessed  skewed by analysts views, varies over time  suitable for small to medium sized orgs

Detailed Risk Analysis  most comprehensive alternative  assess using formal structured process with a number of stages with a number of stages identify likelihood of risk and consequences identify likelihood of risk and consequences hence have confidence controls appropriate hence have confidence controls appropriate  costly and slow, requires expert analysts  may be a legal requirement to use  suitable for large organizations with IT systems critical to their business objectives

Combined Approach  combines elements of other approaches initial baseline on all systems initial baseline on all systems informal analysis to identify critical risks informal analysis to identify critical risks formal assessment on these systems formal assessment on these systems iterated and extended over time iterated and extended over time  better use of time and money resources  better security earlier that evolves  may miss some risks early  recommended alternative for most orgs

Detailed Risk Analysis Process

Establish Context  determine broad risk exposure of org related to wider political / social environment related to wider political / social environment and legal and regulatory constraints and legal and regulatory constraints provide baseline for organization’s risk exposure provide baseline for organization’s risk exposure  specify organization’s risk appetite  set boundaries of risk assessment partly on risk assessment approach used partly on risk assessment approach used  decide on risk assessment criteria used

Asset Identification  identify assets “anything which needs to be protected” “anything which needs to be protected” of value to organization to meet its objectives of value to organization to meet its objectives tangible or intangible tangible or intangible in practice try to identify significant assets in practice try to identify significant assets  draw on expertise of people in relevant areas of organization to identify key assets identify and interview such personnel identify and interview such personnel see checklists in various standards see checklists in various standards

Terminology

Threat Identification  to identify threats or risks to assets asK 1. who or what could cause it harm? 2. how could this occur?  threats are anything that hinders or prevents an asset providing appropriate levels of the key security services: confidentiality, integrity, availability, accountability, authenticity and reliability confidentiality, integrity, availability, accountability, authenticity and reliability  assets may have multiple threats

Threat Sources  threats may be natural “acts of god” natural “acts of god” man-made and either accidental or deliberate man-made and either accidental or deliberate  should consider human attackers: motivation motivation capability capability resources resources probability of attack probability of attack deterrence deterrence  any previous history of attack on org

Threat Identification  depends on risk assessors experience  uses variety of sources natural threat chance from insurance stats natural threat chance from insurance stats lists of potential threats in standards, IT security surveys, info from governments lists of potential threats in standards, IT security surveys, info from governments tailored to organization’s environment tailored to organization’s environment and any vulnerabilities in its IT systems and any vulnerabilities in its IT systems

Vulnerability Identification  identify exploitable flaws or weaknesses in organization’s IT systems or processes  hence determine applicability and significance of threat to organization  note need combination of threat and vulnerability to create a risk to an asset  again can use lists of potential vulnerabilities in standards etc

Analyse Risks  specify likelihood of occurrence of each identified threat to asset given existing controls management, operational, technical processes and procedures to reduce exposure of org to some risks management, operational, technical processes and procedures to reduce exposure of org to some risks  specify consequence should threat occur  hence derive overall risk rating for each threat risk = probability threat occurs x cost to organization risk = probability threat occurs x cost to organization  in practice very hard to determine exactly  use qualitative not quantitativ, ratings for each  aim to order resulting risks in order to treat them

Determine Likelihood

Determine Consequence

Determine Resultant Risk

Document in Risk Register and Evaluate Risks

Risk Treatment

Risk Treatment Alternatives  risk acceptance  risk avoidance  risk transferal  reduce consequence  reduce likelihood

Case Study: Silver Star Mines  fictional operation of global mining company  large IT infrastructure both common and specific software both common and specific software some directly relates to health & safety some directly relates to health & safety formerly isolated systems now networked formerly isolated systems now networked  decided on combined approach  mining industry less risky end of spectrum  subject to legal / regulatory requirements  management accepts moderate or low risk

Assets  reliability and integrity of SCADA nodes and net  integrity of stored file and database information  availability, integrity of financial system  availability, integrity of procurement system  availability, integrity of maintenance/production system  availability, integrity and confidentiality of mail services

Threats & Vulnerabilities  unauthorized modification of control system  corruption, theft, loss of info  attacks/errors affecting system

Risk Register

Summary  detailed need to perform risk assessment as part of IT security management process  relevant security standards  presented risk assessment alternatives  detailed risk assessment process involves context including asset identification context including asset identification identify threats, vulnerabilities, risks identify threats, vulnerabilities, risks analyse and evaluate risks analyse and evaluate risks  Silver Star Mines case study