Information Security - Lecture 4
Information Security - Lecture 4
Information Security - Lecture 4
4
Principals of Information Security,
Fourth Edition Chapter 4
Risk Management
Plarent Tirana Ph.D
November 21 st 2014
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
Learning Objectives
Upon completion of this material, you
should be able to:
Define risk management, risk identification,
and risk control
Describe how risk is identified and assessed
Assess risk based on probability of
occurrence and likely impact
Explain the fundamental aspects of
documenting risk via the process of risk
assessment
Principals of Information Security,
Fourth Edition
Learning Objectives
Describe the various risk mitigation
strategy options
Identify the categories that can be used
to classify controls
Recognize the existing conceptual
frameworks for evaluating risk controls
and formulate a cost benefit analysis
Describe how to maintain and
perpetuate risk controls
Principals of Information Security,
Fourth Edition
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
Critical Characteristics of
Information
The value of information comes from
the characteristics it possesses.
When a characteristic of information
changes, the value of that information
either increases, or, more commonly,
decreases.
C.I.A triangle
Confidentiality
Integrity
Availability / Accuracy / Authenticity
Principals of Information Security,
Fourth Edition
Confidentiality
Information has confidentiality when it is protected
from disclosure or exposure to unauthorized
individuals or systems.
Confidentiality ensures that only those with the
rights and privileges to access information are able
to do so.
When unauthorized individuals or systems can view
information, confidentiality is breached.
To protect the confidentiality:
Information classification
Secure document storage
Application of general security policies
Education of information custodians and end users
Principals of Information Security,
Fourth Edition
Integrity
Information has integrity when it is whole,
complete, and uncorrupted.
The integrity of information is threatened
when the information is exposed to
corruption, damage, destruction, or other
disruption of its authentic state.
Corruption can occur while information is
Being stored
Transmitted
10
11
12
13
14
15
16
17
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
18
Risk Identification
Risk identification involves identifying,
classifying, and prioritizing an organizations
assets
A threat assessment process identifies and
quantifies the risks facing each asset
Components of risk identification:
People
Procedures
Data
Software
Hardware
19
What is a risk ?
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Vulnerability Identification
Specific avenues threat agents can exploit to
attack an information asset are called
vulnerabilities
Examine how each threat could be perpetrated
and list organizations assets and
vulnerabilities
Process works best when people with diverse
backgrounds within organization work
iteratively in a series of brainstorming sessions
At end of risk identification process, list of
assets and their vulnerabilities is achieved
Principals of Information Security,
Fourth Edition
39
40
41
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
43
Risk Assessment
Risk assessment evaluates the relative risk
for each vulnerability
Assigns a risk rating or score to each
information asset
The goal at this point: create a method for
evaluating the relative risk of each listed
vulnerability
A single asset may have more than one
vulnerability.
Principals of Information Security,
Fourth Edition
44
Likelihood
The probability that a specific vulnerability
will be the object of a successful attack
Assign numeric value: number between
0.1 (low) and 1.0 (high), or a number
between 1 and 100
Zero not used since vulnerabilities with
zero likelihood are removed from
asset/vulnerability list
Use selected rating model consistently
Use external references for values that
have been reviewed/adjusted for your
Principals of Information Security,
45
circumstances
Fourth
Edition
Risk Determination
For the purpose of relative risk
assessment:
Risk EQUALS
Likelihood of vulnerability
occurrence
TIMES value (or impact)
MINUS percentage risk already
controlled
PLUS an element of uncertainty
Principals of Information Security,
Fourth Edition
46
47
48
49
50
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
51
52
53
Defend
Attempts to prevent exploitation of the
vulnerability
Preferred approach
Accomplished through countering threats,
removing asset vulnerabilities, limiting
asset access, and adding protective
safeguards
Three common methods of risk avoidance:
Application of policy
Training and education
Applying
Principals
of Information
Security,
technology
Fourth Edition
54
Transfer
Control approach that attempts to shift
risk to other assets, processes, or
organizations
If lacking, organization should hire
individuals/firms that provide security
management and administration expertise
Organization may then transfer risk
associated with management of complex
systems to another organization
experienced in dealing with those risks
President Harry Truman If cant stand the
Principals of Information Security,
55
heat,
get out of the kitchen
Fourth
Edition
Mitigate
Attempts to reduce impact of vulnerability
exploitation through planning and
preparation
Approach includes three types of plans
Incident response plan (IRP): define the actions
to take while incident is in progress
Disaster recovery plan (DRP): most common
mitigation procedure
Business continuity plan (BCP): encompasses
continuation of business activities if
catastrophic event occurs
Principals of Information Security,
Fourth Edition
56
Accept
Doing nothing to protect a
vulnerability and accepting the
outcome of its exploitation
Valid only when the particular
function, service, information, or
asset does not justify cost of
protection
Principals of Information Security,
Fourth Edition
57
Terminate
Directs the organization to avoid those
business activities that introduce
uncontrollable risks
May seek an alternate mechanism to meet
customer needs
Example - In 2007 Sprint announced it was
canceling the accounts of around 1,000
people who called customer service too
much.
At first blush, it might sound like a pretty jerk thing to
do, have bad service and then punish people who
complain
The terminated
customers
were scamming Sprint,
Principals
of Information
Security,
calling
in again and again, just to get free service
Fourth
Edition
58
When
When
When
When
a vulnerability exists
a vulnerability can be exploited
attackers cost is less than potential gain
potential loss is substantial
59
60
Feasibility Studies
Before deciding on strategy, all
information about economic/noneconomic
consequences of vulnerability of
information asset must be explored
This is an attempt to answer the question,
What are the actual and perceived
advantages of implementing a control as
opposed to the actual and perceived
disadvantages of implementing the
control?
A number of ways exist to determine
Principals of Information Security,
advantage of a specific control
61
Fourth Edition
63
64
65
66
What to do ?
CBA > 0; Good
CBA = 0; Why bother
CBA < 0; No benefit, forget it
Principals of Information Security,
Fourth Edition
67
Process
continues
as long as
Principals
of Information
Security,
Fourth
Edition
organization
continues to function
68
69
Topics
Learning Objectives
Introduction to risk management
Risk Identification
Risk Assessment
Risk Control Strategies
Quantitative versus Qualitative
Strategies
Principals of Information Security,
Fourth Edition
70
72
73
Failureofto
support
standard of due care or
Principals
Information
Security,
74
Fourth
Edition
due diligence can leave organization open
75
76
77
Political:
Fourth
Edition defines what can/cannot occur
Documenting Results
At minimum, each information asset-threat pair should
have documented control strategy clearly identifying
any remaining residual risk. Furthermore, each control
strategy should articulate which of the four
fundamental risk-reducing approaches will be used or
how they might be combined, and how that should
justify the findings by referencing the feasibility
studies.
Another option: document outcome of control strategy
for each information asset-vulnerability pair as an
action plan. This action plan includes concrete tasks,
each with accountability assigned to an organizational
unit or to an individual.
Risk assessment may be documented in a topic
specificofreport.
TheseSecurity,
are usually demand reports that
Principals
Information
are prepared
Fourth
Edition at the direction of senior management 81
82
Summary
Risk identification: formal process of
examining and documenting risk in
information systems
Risk control: process of taking carefully
reasoned steps to ensure the
confidentiality, integrity, and availability of
components of an information system
Risk identification
A risk management strategy enables
identification, classification, and prioritization
of organizations information assets
Residual
risk: risk
remaining to the information
Principals
of Information
Security,
asset
even after the existing control is applied 83
Fourth
Edition
Summary (contd)
Risk control: five strategies are used to
control risks that result from
vulnerabilities:
Defend
Transfer
Mitigate
Accept
Terminate
84
Summary (contd)
Selecting a risk control strategy
Cost Benefit Analysis
Feasibility Study
85