Security Risk Analysis Prepared By: Ahmed Alkhamaiseh Supervised By: Dr. Lo’a i Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) 2007.

Slides:



Advertisements
Similar presentations
Risk Management Introduction Risk Management Fundamentals
Advertisements

FINANCIAL AUDIT METHODOLOGY PETER CARLILL UK NATIONAL AUDIT OFFICE.
Chapter 14 Fraud Risk Assessment.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Introduction to Risk Management 26 September 2014 Peter Fowler CPPD.
Auditing Concepts.
1 The critical challenge facing banks and regulators under Basel II: improving risk management through implementation of Pillar 2 Simon Topping Hong Kong.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Service Design – Section 4.5 Service Continuity Management.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
1 Regulatory Impact Assessment: Methodology and Best Practices David Shortall INMETRO International Workshop on Conformity Assessment Rio de Janeiro, Brazil.
Risk Management Infection prevention and control (IP&C) professionals have, amongst other things, duty to identify unsafe and hazardous IP&C practices.
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
1 Risk management and Investigation Peter Roberts
Tony Gould Quality Risk Management. 2 | PQ Workshop, Abu Dhabi | October 2010 Introduction Risk management is not new – we do it informally all the time.
Bureau of Workers’ Comp PA Training for Health & Safety (PATHS)
Security Risk Management Paula Kiernan Ward Solutions.
Introduction to Network Defense
COBIT® 5 for Risk Introduction
Executive summary prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY RISK MANAGEMENT.
Chapter 16 ©2001 South-Western College Publishing Pamela S. Lewis Stephen H. Goodman Patricia M. Fandt Slides Prepared by Bruce R. Barringer University.
© 2010 Plexent – All rights reserved. 1 Change –The addition, modification or removal of approved, supported or baselined CIs Request for Change –Record.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
IAEA International Atomic Energy Agency How do you know how far you have got? How much you still have to do? Are we nearly there yet? What – Who – When.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Conostix S.A. Sensible defence.
Audit objectives, Planning The Audit
Chapter 10 Contemporary Project Management Kloppenborg
Security Risk Management
Audit Risk. "Audit risk" means the risk that the auditor gives an inappropriate audit opinion when the financial statements are materially misstated Audit.
Internal Control in a Financial Statement Audit
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
6. Problem Bank Resolution 1. Some basic terms  Resolution;  reorganization;  administration;  insolvency;  liquidation  problem bank 2.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Session 9 & 10. Definition of risk assessment and pre condition for risk assessment Establishment of clear, consistent agency objectives. Risk assessment.
Risk Management & Corporate Governance 1. What is Risk?  Risk arises from uncertainty; but all uncertainties do not carry risk.  Possibility of an unfavorable.
Alaa Mubaied Risk Management Alaa Mubaied
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
©Ian Sommerville 2000Dependability Slide 1 Chapter 16 Dependability.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
IB Business & Management
Security Risk Analysis Dr. Lo’ai Tawalbeh Prepared for: The Arab Academy for Business and Financial Sciences (AABFS)-2007.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
Company LOGO Chapter4 Internal control systems. Internal control  It is any action taken by management to enhance the likelihood that established objectives.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Auditing Concepts.
PLANNING, MATERIALITY AND ASSESSING THE RISK OF MISSTATEMENT
Quality Risk Management
A New Concept for Laboratory Quality Management Systems
Presentation transcript:

Security Risk Analysis Prepared By: Ahmed Alkhamaiseh Supervised By: Dr. Lo’a i Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) 2007

Ahmed Alkhamaiseh (AABFS) AMMAN2 Security Risk Analysis Guidelines Security risk analysis, otherwise known as risk assessment, is fundamental to the security of any organization. It is essential in ensuring that controls and expenditure are fully commensurate with the risks to which the organization is exposed. However, many conventional methods for performing security risk analysis are becoming more and more untenable in terms of usability, flexibility, and critically... in terms of what they produce for the user.

Ahmed Alkhamaiseh (AABFS) AMMAN3 Risk Analysis cont. Security in any system should be commensurate with its risks. However, the process to determine which security controls are appropriate and cost effective, is quite often a complex and sometimes a subjective matter. One of the prime functions of security risk analysis is to put this process onto a more objective basis. There are a number of distinct approaches to risk analysis. However, these essentially break down into two types: quantitative and qualitative.

Ahmed Alkhamaiseh (AABFS) AMMAN4 1. Quantitative Risk Analysis This approach employs two fundamental elements; the probability of an event occurring and the likely loss should it occur. Quantitative risk analysis makes use of a single figure produced from these elements. This is called the 'Annual Loss Expectancy (ALE)' or the 'Estimated Annual Cost (EAC)'. This is calculated for an event by simply multiplying the potential loss by the probability. It is thus theoretically possible to rank events in order of risk (ALE) and to make decisions based upon this.

Ahmed Alkhamaiseh (AABFS) AMMAN5 Quantitative Risk Analysis cont. The problems with this type of risk analysis are usually associated with the unreliability and inaccuracy of the data. Probability can rarely be precise and can, in some cases, promote complacency. In addition, controls and countermeasures often tackle a number of potential events and the events themselves are frequently interrelated. Notwithstanding the drawbacks, a number of organizations have successfully adopted quantitative risk analysis.

Ahmed Alkhamaiseh (AABFS) AMMAN6 2. Qualitative Risk Analysis This is by far the most widely used approach to risk analysis. Probability data is not required and only estimated potential loss is used. Most qualitative risk analysis methodologies make use of a number of interrelated elements:  THREATS  VULNERABILITIES  CONTROLS

Ahmed Alkhamaiseh (AABFS) AMMAN7 Qualitative Risk Analysis cont. THREATS  These are things that can go wrong or that can 'attack' the system.  Examples might include fire or fraud. Threats are ever present for every system. VULNERABILITIES  These make a system more prone to attack by a threat or make an attack more likely to have some success or impact.  For example, for fire a vulnerability would be the presence of inflammable materials (e.g. paper).

Ahmed Alkhamaiseh (AABFS) AMMAN8 Qualitative Risk Analysis cont. CONTROLS  These are the countermeasures for vulnerabilities. There are four types: Deterrent controls reduce the likelihood of a deliberate attack Preventative controls protect vulnerabilities and make an attack unsuccessful or reduce its impact Corrective controls reduce the effect of an attack Detective controls discover attacks and trigger preventative or corrective controls.

Ahmed Alkhamaiseh (AABFS) AMMAN9 These elements can be illustrated by a simple relational model

Ahmed Alkhamaiseh (AABFS) AMMAN10 Risk Assessment Business Objectives: FOCUS on key assets PROTECT against likely threats PRIORITISE future actions BALANCE cost with benefits IDENTIFY / JUSTIFY appropriate

Ahmed Alkhamaiseh (AABFS) AMMAN11 Risk Assessment … cont. Positive Factors Enables security risks to be managed Maximises cost effectiveness Safeguards information assets Enables IT risks to be taken more safely

Ahmed Alkhamaiseh (AABFS) AMMAN12 Balancing the Risk Cost of Security Cost of Insecurity

Ahmed Alkhamaiseh (AABFS) AMMAN13 Risks Unauthorised or accidental disclosure Unauthorised or accidental modification Unavailability of facilities / services Destruction of assets

Ahmed Alkhamaiseh (AABFS) AMMAN14 Risk Impact Monetary losses Loss of personal privacy Loss of commercial confidentiality Legal actions Public embarrassment Danger to personal safety

Ahmed Alkhamaiseh (AABFS) AMMAN15 Risk Control Strategy Risk prevention Reduction of impact Reduction of likelihood Early detection Recovery Risk transfer

Ahmed Alkhamaiseh (AABFS) AMMAN16 Risk Assessment

Ahmed Alkhamaiseh (AABFS) AMMAN17 Risk Assessment Recap. Risk Assessment is a business requirement Risk Assessment is part of overall security management Can be complex Methods exist Approach must suit your organisation

Ahmed Alkhamaiseh (AABFS) AMMAN18 Why Risk Assessment Methodologies? Quality Consistency It makes you think through the problem Credibility Ability to justify recommendations Trusted results

Ahmed Alkhamaiseh (AABFS) AMMAN19 General Requirements Fits company culture Flexible Easy and quick to use Modelling capability Secure Specific Requirements Use at any stage of Project Life Cycle Identify all or selected risks Classify systems and projects Countermeasure guidance Audit trail

Ahmed Alkhamaiseh (AABFS) AMMAN20 Potential Users of Methodology Project Managers Systems Developers Systems Managers Systems Audit Business Managers Security Managers

Ahmed Alkhamaiseh (AABFS) AMMAN21 Choosing Methodologies Assumed expertise of reviewer Complexity of environment When to apply Risk Analysis Consideration of existing controls Level of detail Scope

Ahmed Alkhamaiseh (AABFS) AMMAN22 The Benefits of: Security Risk Analysis Cost Justification Productivity: Audit/Review Savings Breaking Barriers - Business Relationships Self-Analysis Security Awareness Targeting Of Security 'Baseline' Security and Policy. Consistency. Communication.

Ahmed Alkhamaiseh (AABFS) AMMAN23 Cost Justification Additional security almost always involves additional expense. As this does not directly generate income, it should always be justified in financial terms. The Risk Analysis process should directly and automatically generate such justification for security recommendations in business terms. Productivity: Audit/Review Savings A Risk Analysis programmed should enhance the productivity of the security or audit team. By creating a review structure, formalizing a review, security knowledge in the system's "knowledge base" and utilizing "self- analysis" features, much more productive use of time is possible. The ability to 'build-in' expertise should also alleviate the need for expensive external security consultants.

Ahmed Alkhamaiseh (AABFS) AMMAN24 Breaking Barriers - Business Relationships  Security should be addressed at both business management and IT staff. Business management are responsible for decisions relating to the security risk/level that the enterprise is willing to accept at a given time. IT management are responsible for decisions relating to specific controls and application.  Risk Analysis should relate security directly to business issues.

Ahmed Alkhamaiseh (AABFS) AMMAN25 Self-Analysis The Risk Assessment system should be simple enough to enable its use without necessitating particular security knowledge, or indeed, IT expertise. This approach enables security to be driven into more areas and to become more devolved. It enables security to become part of the enterprises culture, allowing business unit management to take more of the responsibility for ensuring an adequate and appropriate level of security. Security Awareness The widescale application of a risk assessment programmed, by actively involving a range of, and greater number of, staff, will place security on the agenda for discussion and increase security awareness within the enterprise.

Ahmed Alkhamaiseh (AABFS) AMMAN26 Targeting Of Security Security should be properly targeted, and directly related to potential impacts, threats, and existing vulnerabilities. Failure to achieve this could result in excessive or unnecessary expenditure. Risk Analysis promotes far better targeting and facilitates related decisions. 'Baseline' Security and Policy Many enterprises require adherence to certain 'baseline' standards. This could be for a variety of reasons, such as legislation (eg: Data Protection Act), enterprise policy, regulatory controls, etc. The Risk Analysis methodology should support such requirements and enable rapid identification of any failings.

Ahmed Alkhamaiseh (AABFS) AMMAN27 Consistency A major benefit of the application of Risk Analysis is that it brings a consistent and objective approach to all security reviews. This not only applies across different applications, but different types of business system. Communication By obtaining information from different parts of a business unit, a Risk Assessment aids communication and facilitates decision making. There are also a number of other important, but less tangible, benefits to be accrued via the application of Risk Analysis

Ahmed Alkhamaiseh (AABFS) AMMAN28 SUMMARY It can be seen that the potential benefits to be accrued via the application of a Risk Analysis methodology are substantial. Dr P G Dory, former Head Of Information Security, Barclays Bank PLC Say: "Problems aside, we are rapidly approaching a situation where risk management is no longer an option. In a highly competitive business environment, companies cannot afford to have costly or inappropriate security. Effective risk management can be nothing less than the defense of company profitability."

Ahmed Alkhamaiseh (AABFS) AMMAN29 The End