Risk Management October 1998. What is RISK MANAGEMENT? –The process concerned with identification, measurement, control and minimization of security risks.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 17 – Risk Management
Advertisements

OCTAVESM Process 4 Create Threat Profiles
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Introducing Computer and Network Security
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
23 January 2003© All rights Reserved, 2002 Understanding Facilitated Risk Analysis Process (FRAP) and Security Policies for Organizations Infocomm Security.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Randy Marchany VA Tech Computing Center
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Introduction to Network Defense
SEC835 Database and Web application security Information Security Architecture.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Storage Security and Management: Security Framework
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”.
Chapter 11: Project Risk Management
N ational I NFOSEC E ducation and T raining P rogram Educational Solutions for a Safer World http//
Ethics and the Law.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Lecture 1: Overview modified from slides of Lawrie Brown.
1 Forensics: The use of science and technology to investigate and establish facts in criminal or civil courts of law. Computer Forensics: Commonly defined.
Risk Assessment Farrokh Alemi, Ph.D. Monday, July 07, 2003.
SEC’s Cybersecurity Risk Alert Part 2 of 3 How-To: Assessing Cybersecurity Risk Thomas J. DeMayo, CISSP, CIPP, CEH, CPT, MCSE Director, IT Audit and Consulting.
A Survivability Validation Framework for OASIS Program Technologies.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Information Security What is Information Security?
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Alaa Mubaied Risk Management Alaa Mubaied
Risk Assessment Richard Newman. Six Phases of Security Process 1. Identify assets 2. Analyze risk of attack 3. Establish security policy 4. Implement.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
CSCE 548 Secure Software Development Security Operations.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction to Project Management Chapter 9 Managing Project Risk
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Risk Management Issues in Information Security Amanda Kershishnik COSC April 2007.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Headquarters U.S. Air Force
CS457 Introduction to Information Security Systems
Risk management.
ISSeG Integrated Site Security for Grids WP2 - Methodology
Chapter 8 – Administering Security
Risk Assessment Richard Newman
RISK MANAGEMENT An Overview: NIPC Model
Presentation transcript:

Risk Management October 1998

What is RISK MANAGEMENT? –The process concerned with identification, measurement, control and minimization of security risks in information systems to a level commensurate with the value of the assets protected. ( Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Course Objective –The student will be able to DETERMINE a risk index.

Introduction to Risk Management Implement Risk Management Actions Identify the Risk Areas Re-evaluate the Risks Develop Risk Management Plan Risk Management Cycle Assess the Risks Risk Assessment Risk Mitigation

Balance of Risk Management Risk Ignorance Risk Management Risk Avoidance

RISK - The likelihood that a particular threat using a specific attack, will exploit a particular vulnerability of a system that results in an undesirable consequence. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

THREAT -Any circumstance or event with the potential to cause harm to an information system in the form of destruction, disclosure, adverse modification of data, and/or the denial of service. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Threat Example - Hackers

Threat Example - Electrical Storms

Definition of Likelihood –LIKELIHOOD of the threat occurring is the estimation of the probability that a threat will succeed in achieving an undesirable event.

Considerations in Assessing the Likelihood of Threat –Presence of threats –Tenacity of threats –Strengths of threats –Effectiveness of safeguards

Statistical Threat Data

Two Schools of Thought on Likelihood Calculation Assume Don’t Don’tAssume

ATTACK –An attempt to gain unauthorized access to an information system’s services, resources, or information, or the attempt to compromise an information system’s integrity, availability, or confidentiality, as applicable. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

VULNERABILITY -Weakness in an information system, cryptographic system, or other components (e.g..., system security procedures, hardware design, internal controls) that could be exploited by a threat. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Vulnerability Example

CONSEQUENCE –A consequence is that which logically or naturally follows an action or condition.

RM/RA RISKMANAGEMENT RISKMITIGATION RISK ASSESSMENT

RISK ASSESSMENT -A process of analyzing THREATS to and VULNERABILITIES of an information system and the POTENTIAL IMPACT the loss of information or capabilities of a system would have. The resulting analysis is used as a basis for identifying appropriate and cost-effective counter-measures. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Why Risk Assessment?

Benefits of Risk Assessment –Increased awareness –Assets, vulnerabilities, and controls –Improved basis for decisions –Justification of expenditures

Risk Assessment Process –Identify assets –Determine vulnerabilities –Estimate likelihood of exploitation –Compute expected loss

Identify Assets –People, documentation, supplies

Properties of Value Analysis -Confidentiality -Integrity -Availability -Non-repudiation

Definition -Confidentiality: Assurance that information is not disclosed to unauthorized persons, processes, or devices. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Definition - Integrity: Quality of an information system reflecting the logical correctness and reliability of the operating system; the logical completeness of the hardware and software implementing the protection mechanisms; and the consistency of the data structures and occurrence of the stored data. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Definition -Availability: Timely, reliable access to data and information services for authorized users. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Definition -Non-repudiation: Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Determine Vulnerabilities Open Network Open Communications Lines

Likelihood

Expected Loss

Risk Measure –RISK MEASURE is a description of the kinds and degrees of risk to which the organization or system is exposed.

Communicating Risk –To be useful, the measurement should reflect what is truly important to the organization.

How do we calculate risk?

Primary Risk Calculation Methodologies Q uantitative & Q ualitative

The Quantitative Method

The Qualitative Method

Qualitative Example: –“The system is weak in this area and we know that our adversary has the capability and motivation to get to the data in the system so the likelihood of this event occurring is high.”

Quantitative and Qualitative Merged

Delphi Approach

Probability Density Function

Examples of documented risk assessment systems –Aggregated Countermeasures Effectiveness (ACE) Model –Risk Assessment Tool –Information Security Risk Assessment Model (ISRAM) –Dollar-based OPSEC Risk Analysis (DORA) –Analysis of Networked Systems Security Risks (ANSSR) –Profiles –NSA ISSO INFOSEC Risk Assessment Tool

Formula for Risk dv + zqm/ {2a} bc = wxyz lm +op * dz = tgm\bvd 2b or n2b mkt/40 = 9j*X

Threat and Vulnerability Revisited The capability or intention to exploit, or any circumstance or event with the potential to cause harm such as a hacker. A weakness in a system that can be exploited.

Threat+ Vulnerability

Likelihood Vs. Consequence

Likelihood –The Likelihood of a successful attack is the probability that an adversary would succeed in carrying out an attack.

Factors influencing an attack –Level of threat –Vulnerabilities –Countermeasures applied

Determine Level of Threat –Criteria for evaluating the level of threat: History Capability Intention or motivation

Determine Vulnerabilities

Criteria for Evaluating the Vulnerability –Number of vulnerabilities –Nature of vulnerability –Countermeasures

COUNTERMEASURE –A countermeasure is an action, device, procedure, or technique used to eliminate or reduce one or more vulnerabilities.

Examples of Countermeasures –Procedures: security policies and procedures training personnel transfer –Hardware: doors, window bars, fences paper shredder alarms, badges –Manpower: guard force

CONSEQUENCE –A consequence is that which logically or naturally follows an action or condition.

Determination of the Consequence of the Attack –“The worse the consequence of a threat harming the system, the greater the risk” Attack Consequence Success

Risk Calculation Process –determine: the threat the vulnerability the likelihood of attack the consequence of an attack –apply this formula by: postulating attacks estimating the likelihood of a successful attack evaluating the consequences of those successful attacks

NSA ISSO Risk Assessment Methodology –Developed in the NSA Information Systems Security Organization –Used for INFOSEC Products and Systems –Can Use During Entire life Cycle –Not Widely Used Outside of DI

The NSA ISSO Risk Assessment Process –Understanding the system –Developing attack scenarios –Understanding the severity of the consequences –Creating a risk plane –Generating a report

The Risk Plane X -axis The likelihood of a successful attack Y -axis The severity of the Consequences of that successful attack.

Risk Index Risk Index, as defined by the “Yellow Book”, is the disparity between the minimum clearance or authorization of system users and the maximum sensitivity of data processed by a system.

Risk Index –Minimum User Clearance=Rmin –Maximum Data Sensitivity=Rmax –Risk Index=Rmax - Rmin

Rating Scale for Minimum User Clearance (Rmin)

Rating Scale for Maximum Data Sensitivity (Rmax)

Computer Security Requirements * = Security Requirements Beyond State of the Art

Automated Risk Assessment Tools

NIST Special Publication

LAVA L Los A Alamos V Vulnerability and Risk A Assessment Tool

Threats Considered by LAVA –natural and environmental hazards –accidental and intentional on-site human threats (including the authorized insider) –off-site human threats

RiskPAC –a knowledge-based system that uses a questionnaire metaphor to interact with the user and measure risk in government-related and other topics.

A.L.E. A Annualized L Loss E Exposure Calculator

RISKWATCH

Risk Management Research Laboratory

Risk Mitigation –Risk Mitigation is any step taken to reduce risk.

Residual Risk –Portion of risk remaining after security measures have been applied. (Definition from National Information Systems Security (INFOSEC) Glossary, NSTISSI No. 4009, Aug. 1997)

Residual Risk and Safeguards

Summary –Risk Mitigation –Risk Calculation Methods –Risk Index

?

Sampling of General INFOSEC Resources on the Web Defense Information Systems Agency (DISA) Awareness and Training Facility: Information Security News: Information Security Mall: National INFOSEC Education Colloquium: International Information Systems Security Certification Consortium: National Institute for Standards and Technology (NIST) Computer Security Clearinghouse: National INFOSEC Telecommunications and Information Systems Security Committee(NSTISSC): President’s Commission on Critical Infrastructure Protection: Security Site Links:

Sampling of Web Addresses for Colleges and Universities with INFOSEC Courses, Programs, Centers Dartmouth College: George Mason University Center for Secure Info Systems: Georgia Tech Information Security Center: Harvard University: Idaho State University: Indiana University: Iowa State: James Madison University: National Defense University: North Carolina State University: Purdue University: University of California at Davis: University of Texas, Austin: Western Connecticut State University: