Security Risk Analysis & Management

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

Security Risk Analysis & Management
Module 1 Evaluation Overview © Crown Copyright (2000)
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Introducing Computer and Network Security
The Australian/New Zealand Standard on Risk Management
Stephen S. Yau CSE , Fall Risk Management.
Computer Security: Principles and Practice
The Information Systems Audit Process
Auditing Auditing & Automated Systems Chapter 22 Auditing & Automated Systems Chapter 22.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Consultancy.
SEC835 Database and Web application security Information Security Architecture.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Chapter 11: Project Risk Management
Security Risk Assessment Applied Risk Management July 2002.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
David N. Wozei Systems Administrator, IT Auditor.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Information Security What is Information Security?
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Alaa Mubaied Risk Management Alaa Mubaied
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
SOFTWARE PROJECT MANAGEMENT
Project Risk Management Planning Stage
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
University of Sunderland CIFM02 Unit 5 COMM02 Project Hazard Management and Contingency Planning Unit 5.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Improving performance, reducing risk Dr Apostolos Noulis, Lead Assessor, Business Development Mgr Thessaloniki, 02 June 2014 ISO Energy Management.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Information Security Management Goes Global
An Overview on Risk Management
Internal Control Principles
Risk management.
Security measures deployed by e-communication providers
INFORMATION SYSTEMS SECURITY AND CONTROL.
ISSeG Integrated Site Security for Grids WP2 - Methodology
IFRS 4 Phase 2 Insurance Contract Model
Chapter 8 – Administering Security
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
INFORMATION RISK MANAGEMENT
Software Quality Engineering
Learn Your Information Security Management System
ESET 419 Engineering Technology Capstone I
Understand mechanisms to control organisational IT security
Security Management Practices
Security Engineering.
Auditing & Investigations I
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Chapter 27 Security Engineering
Richard Henson University of Worcester February 2017
How to conduct Effective Stage-1 Audit
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Security Risk Analysis & Management Dr. X

Security in System Development Risk Analysis & Management needs to be a part of system development, not tacked on afterwards Baskerville's three generations of methods 1st Generation: Checklists Example: BS 7799 Part 1 2nd Generation: Mechanistic engineering methods Example: this risk analysis method 3rd Generation: Integrated design Not yet achieved [Baskerville, R. (1993). Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys 25(4): 375-414.]

} } Introduction Risk Analysis and Management Framework Assets Threats Vulnerabilities } Analysis Risks } Management Security Measures

Definitions The meanings of terms in this area is not universally agreed. We will use the following Threat: Harm that can happen to an asset Impact: A measure of the seriousness of a threat Attack: A threatening event Attacker: The agent causing an attack (not necessarily human) Vulnerability: a weakness in the system that makes an attack more likely to succeed Risk: a quantified measure of the likelihood of a threat being realised

Definitions 2 Risk Analysis involves the identification and assessment of the levels of risk, calculated from the Values of assets Threats to the assets Their vulnerabilities and likelihood of exploitation Risk Management involves the identification, selection and adoption of security measures justified by The identified risks to assets The reduction of these risks to acceptable levels

Goals of Risk Analysis All assets have been identified All threats have been identified Their impact on assets has been valued All vulnerabilities have been identified and assessed

Problems of Measuring Risk Businesses normally wish to measure in money, but Many of the entities do not allow this Valuation of assets Value of data and in-house software - no market value Value of goodwill and customer confidence Likelihood of threats How relevant is past data to the calculation of future probabilities? The nature of future attacks is unpredictable The actions of future attackers are unpredictable Measurement of benefit from security measures Problems with the difference of two approximate quantities How does an extra security measure affect a ~10-5 probability of attack?

Measuring Risks Answer the following questions. You can work in groups: Propose different metrics of risk. Think how you would measure risk. Can we as computer scientists create instruments for measuring risk? Is accuracy important when we measure risk? Why?

Risk Levels Precise monetary values give a false precision Better to use levels, e.g. High, Medium, Low High: major impact on the organisation Medium: noticeable impact (“material” in auditing terms) Low: can be absorbed without difficulty 1 - 10 Express money values in levels, e.g. For a large University Department a possibility is High Medium Low

Risk Analysis Steps Decide on scope of analysis Set the system boundary Identification of assets & business processes Identification of threats and valuation of their impact on assets (impact valuation) Identification and assessment of vulnerabilities to threats Risk assessment

Risk Analysis – Defining the Scope Draw a context diagram Decide on the boundary It will rarely be the computer! Make explicit assumptions about the security of neighbouring domains Verify them!

Risk Analysis - Identification of Assets Types of asset Hardware Software: purchased or developed programs Data People: who run the system Documentation: manuals, administrative procedures, etc Supplies: paper forms, magnetic media, printer liquid, etc Money Intangibles Goodwill Organisation confidence Organisation image

Risk Analysis – Impact Valuation Identification and valuation of threats - for each group of assets Identify threats, e.g. for stored data Loss of confidentiality Loss of integrity Loss of completeness Loss of availability (Denial of Service) For many asset types the only threat is loss of availability Assess impact of threat Assess in levels, e.g H-M-L or 1 - 10 This gives the valuation of the asset in the face of the threat

Risk Analysis – Process Analysis Every company or organisation has some processes that are critical to its operation The criticality of a process may increase the impact valuation of one or more assets identified Identify critical processes Review assets needed for critical processes Revise impact valuation of these assets

Risk Analysis – Vulnerabilities 1 Identify vulnerabilities against a baseline system For risk analysis of an existing system Existing system with its known security measures and weaknesses For development of a new system Security facilities of the envisaged software, e.g. Windows NT Standard good practice, e.g. BS 7799 recommendations of good practice

Risk Analysis – Vulnerabilities 2 For each threat Identify vulnerabilities How to exploit a threat successfully; Assess levels of likelihood - High, Medium, Low Of attempt Expensive attacks are less likely (e.g. brute-force attacks on encryption keys) Successful exploitation of vulnerability; Combine them Vulnerability Likelihood of Attempt Likelihood of Success Low Med High

Risk Assessment Assess risk If we had accurate probabilities and values, risk would be Impact valuation x, probability of threat y, probability of exploitation z Plus a correction factor for risk aversion Since we haven't, we construct matrices such as Impact valuation Risk Low Med High Low Low Low Med Vulnerability Med Low Med High High Low Med High

Responses to Risk Responses to risk Avoid it completely by withdrawing from an activity Accept it and do nothing Reduce it with security measures

Responses to Risk Think and answer the following questions: How can you convince your superiors to not just accept risk and take action? Write at least two arguments. In which cases/examples/scenarios can you apply risk avoidance? Can one ever completely eliminate risk?

Security Measures Possible security measures Transfer the risk, e.g. insurance Reduce vulnerability Reduce likelihood of attempt e.g. publicise security measures in order to deter attackers e.g. competitive approach - the lion-hunter’s approach to security Reduce likelihood of success by preventive measures e.g. access control, encryption, firewall Reduce impact, e.g. use fire extinguisher / firewall Recovery measures, e.g. restoration from backup

Risk Management Identify possible security measures Decide which to choose Ensure complete coverage with confidence that: The selected security measures address all threats The results are consistent The expenditure and its benefits are commensurate with the risks

Iterate Adding security measures changes the system Vulnerabilities may have been introduced After deciding on security measures, revisit the risk analysis and management processes e.g. introduction of encryption of stored files may remove the threat to Confidentiality but introduce a threat to Availability What happens if the secret key is lost?

Conclusion: Problems of Risk Analysis and Management Lack of precision Volume of work and volume of output Integrating them into a ”normal” development process

Current Risk Management Techniques

Risk Management Techniques 1 Commercial tools Mostly rely on check lists CRAMM (CCTA Risk Assessment and Management Methodology): UK Government approach Supported by software PROTEUS (BSI) software: Gap analysis to identify necessary actions and existing strengths Comprehensive practical guidance and the text of BS 7799 Reporting, for easy monitoring and maintenance Evidence to customers and auditors

Risk Management Techniques 2 Generic processes Threat trees Threat analysis Based on fault trees Only addresses the threat identification stage Attack trees Vulnerability analysis