Model-Driven Risk Analysis The CORAS Approach

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Risk Management Awareness Presentation
Control and Accounting Information Systems
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
Supporting people with a learning disability Introduction to Project Management Presenter: Steve Raw FInstLM, FCMI.
Projmgmt-1/33 DePaul University Project Management I - Risk Management Instructor: David A. Lash.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
The Australian/New Zealand Standard on Risk Management
1 Risk evaluation Risk treatment. 2 Risk Management Process Risk Management Process.
Part II: Example-Driven Walkthrough of the CORAS Method
Computer Security: Principles and Practice
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
1 Risk management and Investigation Peter Roberts
Risk Assessment Frameworks
Tony Gould Quality Risk Management. 2 | PQ Workshop, Abu Dhabi | October 2010 Introduction Risk management is not new – we do it informally all the time.
1 What do we call Ourselves? Hazards Risk Managers of Course Greg Shaw GWU ICDRM The George Washington University Institute for Crisis, Disaster, and Risk.
Facilitator Judy Clarey CPRM FRIMA RiskAlign Training & Advisory Services October 2012 RRTO Mining Conference Risk Management Effective Risk Assessment.
Risk Analysis And New Innovations
61 What is hazard risk management?. 62 Emergency risk management is “a systematic process that produces a range of measures that contribute to the well.
CIS101 Introduction to Computing Week 06. Agenda Your questions Excel Exam during second hour Our status after the snow day Introduction to the Internet.
Application Threat Modeling Workshop
Chapter 3 Project Management
Part III: Change Management Ketil Stølen, SINTEF & UiO FOSAD CORAS.
Fundamentals of ISO.
1 Programming Concepts Module Code : CMV6107 Class Contact Hours: 45 hours (Lecture 15 hours) (Laboratory/Tutorial 30 hours) Module Value: 1 Textbook:
Risk Management & Liability Informa Brownfield Hospital Development Summit June 2009.
Basics of OHSAS Occupational Health & Safety Management System
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
Risk Management for Technology Projects Geography 463 : GIS Workshop May
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
1 TenStep Project Management Process ™ PM00.7 PM00.7 Project Management Preparation for Success * Manage Risk *
University of Palestine software engineering department Testing of Software Systems Testing throughout the software life cycle instructor: Tasneem.
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Introduction to Information Security
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
The Risk Management Process
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Computer Security By Duncan Hall.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Swedish Risk Management System Internal management and control Aiming to Transport Administration with reasonable certainty to.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Security Engineering Model-Driven Risk Analysis: The CORAS Approach Le Minh Sang Tran Università degli Studi di Trento
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Risk Assessment: A Practical Guide to Assessing Operational Risk
Template for CORAS Risk Analysis. The eight steps of a CORAS risk analysis.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
COSO and ERM Committee of Sponsoring Organizations (COSO) is an organization dedicated to providing thought leadership and guidance on internal control,
Risk Management for Technology Projects
NESSOS E-RISE Challenge 2012
Business System Development
Quality Risk Management
Chapter 10: Process Implementation with Executable Models
Risky Business Standalone ISO9001:2015 Risk-Based Thinking and Integration of Risk Management with ISO9001:2015.
Awareness and Auditor training kit
CEng progression through the IOM3
ONAP Risk Assessment – Preparation Material - Overview of the Process - Terminology - Assumptions
Presentation transcript:

Model-Driven Risk Analysis The CORAS Approach Ketil Stølen, SINTEF & UiO FOSAD 2011 CORAS

Acknowledgments The research for the contents of this tutorial has partly been funded by the European Commission through the FP7 project SecureChange and the FP7 network of excellence NESSoS CORAS

Overview Part I Introduction – Risk management and the CORAS approach Part II Example-driven walkthrough of the CORAS method Part III Change Management CORAS

Risk Management and the CORAS Approach Part I: Introduction Risk Management and the CORAS Approach CORAS

Overview of Part I What is risk? What is risk management? Central terms What is CORAS? Main concepts The CORAS process Risk modeling Semantics Likelihood reasoning The CORAS tool Further reading CORAS

What is Risk? Many kinds of risk Contractual risk Economic risk Operational risk Environmental risk Health risk Political risk Legal risk Security risk CORAS

Definition of risk from ISO 31000 Risk: Effect of uncertainty on objectives NOTE 1 An effect is a deviation from the expected — positive and/or negative NOTE 2 Objectives can have different aspects (such as financial, health and safety, and environmental goals) and can apply at different levels (such as strategic, organization-wide, project, product and process) NOTE 3 Risk is often characterized by reference to potential events and consequences, or a combination of these NOTE 4 Risk is often expressed in terms of a combination of the consequences of an event (including changes in circumstances) and the associated likelihood of occurrence NOTE 5 Uncertainty is the state, even partial, of deficiency of information related to, understanding or knowledge of an event, its consequence, or likelihood CORAS

What is Risk Management? Risk management: Coordinated activities to direct and control an organization with regard to risk [ISO 31000:2009] CORAS

Risk Analysis Involves Determining what can happen, why and how Systematic use of available information to determine the level of risk Prioritization by comparing the level of risk against predetermined criteria Selection and implementation of appropriate options for dealing with risk CORAS

Terms Vulnerability Asset Reduced risk Threat Risk Need to introduce risk treatment CORAS

Terms V Internet Infected PC Computer running Outlook Unwanted incident Computer running Outlook Vulnerability - Infected twice per year Infected mail send to all contacts V Risk Worm Threat Install virus scanner Treatment

Risk Analysis Using CORAS

Overview What is CORAS? Main concepts Process of eight steps Risk modeling Semantics Calculus Tool support Further reading CORAS

What is CORAS? CORAS consists of Method for risk analysis Language for risk modeling Tool for editing diagrams Stepwise, structured and systematic process Directed by assets Concrete tasks with practical guidelines Model-driven Models as basis for analysis Models as documentation of results Based on international standards CORAS

Main Concepts Party Vulnerability Asset Threat Treatment Likelihood Unwanted incident Risk Consequence CORAS

Definitions Asset: Something to which a party assigns value and hence for which the party requires protection Consequence: The impact of an unwanted incident on an asset in terms of harm or reduced asset value Likelihood: The frequency or probability of something to occur Party: An organization, company, person, group or other body on whose behalf a risk analysis is conducted Risk: The likelihood of an unwanted incident and its consequence for a specific asset Risk level: The level or value of a risk as derived from its likelihood and consequence Threat: A potential cause of an unwanted incident Treatment: An appropriate measure to reduce risk level Unwanted incident: An event that harms or reduces the value of an asset Vulnerability: A weakness, flaw or deficiency that opens for, or may be exploited by, a threat to cause harm to or reduce the value of an asset CORAS

Exercise I How would you represent risk in your favorite modelling language/formal notation/approach? CORAS

Process of Eight Steps Preparations for the analysis Establish context Customer presentation of the target Refining the target description using asset diagrams Approval of the target description Risk identification using threat diagrams Risk estimation using threat diagrams Risk evaluation using risk diagrams Risk treatment using treatment diagrams Establish context Assess risk Treat risk CORAS

Risk Modeling The CORAS language consists of five kinds of diagrams Asset diagrams Threat diagrams Risk diagrams Treatment diagrams Treatment overview diagrams Each kind supports concrete steps in the risk analysis process In addition there are three kinds of diagrams for specific needs High-level CORAS diagrams Dependent CORAS diagrams Legal CORAS diagrams CORAS

Example: Threat Diagram Consequence Asset Likelihood Threat Threat scenario Unwanted incident Vulnerability CORAS

Semantics How to interpret and understand a CORAS diagram? Users need a precise and unambiguous explanation of the meaning of a given diagram Natural language semantics CORAS comes with rules for systematic translation of any diagram into sentences in English Formal semantics Semantics in terms of a probability space on traces CORAS

Example Elements Relations Computer virus is a non-human threat. Virus protection not up to date is a vulnerability. Threat scenario Server is infected by computer virus occurs with likelihood possible. Unwanted incident Server goes down occurs with likelihood unlikely. Availability of server is an asset. Relations Computer virus exploits vulnerability Virus protection not up to date to initiate Server is infected by computer virus with undefined likelihood. Server is infected by computer virus leads to Server goes down with conditional likelihood 0.2. Server goes down impacts Availability of server with consequence high. CORAS

Calculus for Likelihood Reasoning Relation Mutually exclusive vertices Statistically independent vertices CORAS

Guidelines for Consistency Checking CORAS

Tool Support The CORAS tool is a diagram editor Supports all kinds of CORAS diagrams Suited for on-the-fly modeling during workshops Ensures syntactic correctness May be used during all the steps of a risk analysis Documents input to the various tasks Selection and structuring of information during tasks Documentation of analysis results Download: http://coras.sourceforge.net/ CORAS

Screenshot Pull-down menu Tool bar Palette Outline Canvas Properties window CORAS

Criticism from system developers The CORAS language is too simplistic It is too cumbersome to use graphical icons CORAS

Criticism from risk analysts What’s new with the CORAS language? We have been using something similar for years, namely VISIO! CORAS

Exercise II Discuss the statements made by the critics? Argue why the critics are wrong. CORAS

Further Reading Book: Tool: Formal semantics: www.springer.com/computer/swe/book/978-3-642-12322-1 Some chapters may be downloaded for free, including Chapter 3 which gives a Guided Tour of CORAS Tool: http://coras.sourceforge.net/ Open source Formal semantics: Gyrd Brændeland, Atle Refsdal, Ketil Stølen. Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software, volume 83, pages 1995-2013, Elsevier, 2010. CORAS