Effectiveness of Organisational Information security measures



Similar documents
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Governance and Management of Information Security

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Information Security Management Systems

Business Plan 2012/13

The problem with privileged users: What you don t know can hurt you

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Cyber Security - What Would a Breach Really Mean for your Business?

THE HUMAN COMPONENT OF CYBER SECURITY

developing your potential Cyber Security Training

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

National Cyber Security Policy -2013

Information Security in Business: Issues and Solutions

How small and medium-sized enterprises can formulate an information security management system

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Stay ahead of insiderthreats with predictive,intelligent security

Outsourcing and Information Security

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Business Case. for an. Information Security Awareness Program

How-To Guide: Cyber Security. Content Provided by

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cyber security in an organization-transcending way

ISACA rudens konference

HMG Security Policy Framework

Logging In: Auditing Cybersecurity in an Unsecure World

Professional Services Overview

Fostering Incident Response and Digital Forensics Research

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE PERIOD

Security Controls What Works. Southside Virginia Community College: Security Awareness

Address C-level Cybersecurity issues to enable and secure Digital transformation

ISMS Implementation Guide

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Why You Need to Test All Your Cloud, Mobile and Web Applications

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Assuring Application Security: Deploying Code that Keeps Data Safe

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a

NERC CIP VERSION 5 COMPLIANCE

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Security Risk Management Strategy in a Mobile and Consumerised World

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Cybersecurity The role of Internal Audit

Defending Against Data Beaches: Internal Controls for Cybersecurity

The UK cyber security strategy: Landscape review. Cross-government

Healthcare Security: Improving Network Defenses While Serving Patients

Microsoft s Compliance Framework for Online Services

Western Australian Auditor General s Report. Information Systems Audit Report

ISO/IEC 27001:2013 webinar

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Continuous Network Monitoring

Cyber Security solutions

Information Security Awareness Training

A Guide to the Cyber Essentials Scheme

(Instructor-led; 3 Days)

Practical Overview on responsibilities of Data Protection Officers. Security measures

PACB One-Day Cybersecurity Workshop

IT Security Management 100 Success Secrets

Information Security Guideline for NSW Government Part 1 Information Security Risk Management

FINRA Publishes its 2015 Report on Cybersecurity Practices

Digital Infrastructure - A Model For Success

Protection from cyber threats

SECURITY RISK MANAGEMENT

Enterprise software risk reduction

Computer Security Lecture 13

Information Security Policy

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Committees Date: Subject: Public Report of: For Information Summary

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

FFIEC Cybersecurity Assessment Tool

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Roger s Cyber Security and Compliance Mini-Guide

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Security & privacy in the cloud; an easy road?

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

Cyber security trends & strategy for business (digital?)

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Report to the Public Accounts Committee on mitigation of cyber attacks. October 2013

IT Governance: The benefits of an Information Security Management System

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

Information Security Management System Policy

FREQUENTLY ASKED QUESTIONS

Open Certification Framework. Vision Statement

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

October 24, Mitigating Legal and Business Risks of Cyber Breaches

SECURITY. Risk & Compliance Services

VENDOR MANAGEMENT. General Overview

PREPARED DIRECT TESTIMONY OF SCOTT KING ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY

IA Metrics Why And How To Measure Goodness Of Information Assurance

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Federal Bureau of Investigation s Integrity and Compliance Program

Highland Council Information Security Policy

The Importance of Cyber Threat Intelligence to a Strong Security Posture

SECURITY INCIDENT REPORTING AND MANAGEMENT. Standard Operating Procedures

Transcription:

Effectiveness of Organisational Information security measures Evaluation methods and main findings FRISC Winter School 25th April 2013 Janne Hagen, PhD

Why is this topic relevant for researchers focusing on technical security mechanisms? Objectives of this presentation Extending the perspective: Understanding the human factor and the link to security technology An introduction to organizational security and security management get security research into a broader context An introduction on how to evaluate the effectiveness of organizational security measures

Content Threats and trends towards an increasing gap between security and threats How to mitigate the human security challenge? How to evaluate the effectiveness of organizational security measures?

Threats and trends We are every single day exposed to intelligence and industrial espionage and the attacks against humans are increasing Modern countries have huge security challenges, vulnerabilities are often detected in software and commercial of the shelves technologies and the gap between threats and security is increasing: We are publishing our lives and thoughts on social media sharing is everything Kids are on social media while they are still in the womb, and they are born with a PDA on their lap New apps and services are developed, but few developers think much about the flip side of the coin (security) or unintended use by adversaries Public sector goes digital Stuff moves into the cloud

What have we lost, and where did the risk assessment go? We are using two senses, only: Vision and hearing, the ability to taste and smell, and even feel a touch is not used, except tapping the keyboard: What does this do to us? From real money to virtual money From real friendship to virtual friendship, where the number counts more than the quality of the relation? What does this mean to information security and in particular trust?

A few questions: Easier to become a victim for targeted attacks? Is it simpler to cheat us, since we re using fewer senses? At work, digitalization enables huge control and measurements regimes and time is always a problem, is it easier to make failures under such circumstances?

The answer: Humans - The weakest link Real behavior Easy!! LOOK: How man behave when dealing with security measures Human error Conflicting objectives Security culture Attitude Oh, this is troublesome!! Knowledge Security usability Expected behavior

How do employees ommit security measures? Intended ommittance - >security simplification: Do not read security guidelines Use simple password policies, when possible, or the same password on several services De-classify work in progress Prioritize visibility in press to security - ex management (power supply) Follow mainstream everybody does Disgruntled employee Unintended ommittance: Phising Social engineering Human errors due to lack of knowledge or awareness

How to mitigate the human security challenge? Theoretical approaches Introduction to organizational security Security management principles The contributions of employees to security and insecurity The big challenge: Early training!

Theoretical approaches The beauty and the beast Socio Technical Theory and the General Deterrence Theory You probably know the tale.but in the cyber domain the beast is not always a prince.it it is a real beast and the princess is also not always the princess she claims to be but a witch

Theoretical approaches: Human roles in information security Roles Measures needed to improve/deal with each role and its theoretical connection Resource person and contributor Causing unintentional failures Dealing with conflicting goals Victim of social engineering Disgruntled employee and/or opportunistic attacker Spy or planted criminal Socio-technical Theory Awareness and training Improved working conditions Management follow-up Awareness and training Management and follow up work Screening and background checks General Deterrence Theory Sanctions and punishment Sanctions and punishment

How should we best deal with security problems and unwanted behavior? Which is the best strategy - the socio-technical approach or the general deterrence? Do the the broken window theory apply to cyberspace; if yes, what can we do about it?

The key to solve the problem: Information Security Management System

Information management system Introduction to ISO/IEC and the ISMS standards ISO/IEC 27001 and 27002 Why should organizations apply the standard? To what extent do organizations use the standards The flip side of the coin The way to successful implementation Summary

Introduction to ISO/IEC and the ISMS standards ISO/IEC 27001 and 27002 The International Standardization Organization: Founded 1947, headquarter in Geneva, Switzerland 162 members (full membership, correspondent membership and subscriber membership) Standards are copyrighted, drafts are free The International Electro-technical Commission (IEC) Founded 1906, headquarter in Geneva 86 members (full members and associated members) Standards are available for purchase, some are free

ISO/IEC 27001: 2005 Process Approach Risk management Continual improvement Change management Management commitment Interested parties IS Requirements Information Security Management System DO Implement and operate PLAN Establish CHECK Monitor and review ACT Maintain and improve Managed IS Interested parties

ISO/IEC 27002:2005: 11 controls 1. Security policy 2. Organization of information security 3. Asset management 4. Human resources security 5. Physical and environmental security 6. Communication and operations management 7. Access control 8. Information system acquisition, development and maintenance 9. Information security incident management 10.Business continuity management 11.Compliance

Why should organizations apply the standards? Compliance with national and international laws and regulations Facilitate legal requirements Provide competitive advantage Customer trust, quality and positive return on investments ISMS Commit management to IS and training employees Foster strong security Ensures a culture risk management approach Strategies for dealing with risk

To what extent do organizations use the standards? 5693 businesses worldwide are certified against the standard ISO/IEC 27001 (January 2009) Norway:10 Netherlands: 12 Sweden: 9 USA: 94 Japan: 3191! Relations to Quality Management (ISO 9001) (Norwegian) ISO/IEC 27001 50% ISO 9001 The standard as ISMS guideline/framework: The Norwegian Oil and Gas Industry, 104 - Information Security Baseline Requirements for Process Control, Safety, and Support ICT Systems

The flip side of the coin Resource intensive (knowledge, money) No guaranty for quality in implemented measures or protection Firewalls versus filter settings Education versus quality and quantity No solution to the challenge of asymmetry between protection and attack Human management challenges remain (conflicting objectives) DO Implement and operate PLAN Establish CHECK Monitor and review ACT Maintain and improve

The way to successful implementation Clear understanding of the purpose and goals Actively involved senior management ISMS embedded in regular business operational processes Identify all legal, regulatory, contractual and business requirements Select suitable risk assessment tools and train staff to use the tools Decide how to deal with risks - both risk acceptance level and strategies Improve the system when facing security incidents and non-compliance Do not forget repeated training of staff, partners and contractors Establish a regular review programme

Summary ISO/IEC 27001 and ISO/IEC 27002 used mostly as guideline Gives a good framework for establishing and operating an ISMS through the PDCA cycle When applied, ensures documentation and routines, and management involvement When properly used, ensures continual improvement and corrective and preventive actions However, no guaranty for the quality of controls

References 1. ISO/IEC 27001: 2005 Information Technology Security techniques Information Security Management Systems Requirements 2. ISO/IEC 27002: 2005 Information Technology Security techniques Information Security Management Systems Requirements 3. Baker, W. H. and L Wallace, Is Information Security Under Control? Investigating Quality in Information Security Management, IEEE Security and Privacy, January-February, 2007: 36-44 4. Brenner, J, ISO 27001 Risk Management and Compliance, Risk Management Magazine, January, 2007: 25-29 5. Humphreys, T, How to implement an ISO/IEC 27001 information security management system, ISO Management Systems, May-June 2006: 40-44 6. International Register of ISMS Certificates, http://www.iso27001certificates.com/ Downloaded 18 th August 2009 7. Norwegian certification register: http://www.kvalex.no 8. Tang, J, The Implementation of Deming s System Model to Improve Security Management: A Case Study, International Journal of Management, 254 (1) 2008:54-68

ISO/IEC 27002:2005: 11 controls 1. Security policy 2. Organization of information security 3. Asset management 4. Human resources security 5. Physical and environmental security 6. Communication and operations management 7. Access control 8. Information system acquisition, development and maintenance 9. Information security incident management 10.Business continuity management 11.Compliance

The contributions of employees to security Four case studies: Two public and two private organizations Examining formal security system, requirements, systems, routines and procedures, security awareness training Interview guide with statements and personal interviews, N= 74, examining attitudes, knowledge and behaviour Results: A good formal system does not guaranty employee compliance with policy Resilient behavior among employees results in deviations in reporting and on the spot corrections Training employees is important: Train them to observe and react!

The key to solve the problem: Information Security Management System + awareness raising and education

Knowledge of Security Instruction and Organization Statement Percentages that totally agree Private A Private B Public A Public B Sig. Knowledge: I know who the security manager is. 96 95 88 73 0.07 I know who the data security manager is. 70 30 44 65 0.03 I know where to find the instructions. 100 100 68 46 0.00 Attitudes: It is important to read the security instructions in order to have up-to-date knowledge. 78 80 48 58 0.06 Behaviour: It is less than 3 months since I last time looked up the security instructions. 65 90 32 5 0.00 It is less than 3 months since I last time contacted security personnel. 52 45 32 31 0.36 N (Number of employees asked) 23 20 25 26

Reported Security Breaches Statement Percentages that totally agree Private A Private B Public A Public B Sig. Attitude: I will report security incidents. 83 65 76 42 0.02 I will confer with a college who breaks the rules. 83 55 80 42 0.01 I will report IT vulnerabilities. 65 75 76 35 0.01 Behavior: I have witnessed a security breach in the last 12 months. 26 25 44 12 0.07 I have reported a security breach in the last 12 months. 13 20 28 4 0.12 (N) 23 20 25 26

Ranking the cases according to their formal security organization and the informal organization, or security culture Ranking measurements: 4 = low-quality; 1 = highest-quality Main characteristics: Private A: Highquality formal system Private B: Trust and culture Public A: Competence and Involvement Public B: Selfregulation Formal Security policy 1 2 4 3 Reporting 1 4 3 2 Computer security 1 4 3 2 Visitor security 1 2 1 1 Credits (rank) 4 (1) 12 (4) 11 (3) 8 (2) Informal organization, or security culture Security policy 4 2 1 3 Reporting 3 2 1 4 Computer security 1 2 3 4 Vistor security 1 3 1 2 Credits (rank): 9 (2) 9 (2) 6 (1) 13 (3)

Organizational security We know from the Norwegian Computer Crime Survey that: Mature security technologies is well distributed among Norwegian enterprises There is less security in depth, despite that insiders (own employees, consultants and contractors) are behind about half of the incidents Crime and incidents are seldom reported to the police, just the largest incidents are Enterprises implement new technologies, much of it without thinking on potential risks

The big challenge: Early training! Computer security and programming into the public school (National Strategy for Information Security) Or even into the kindergarten! Is training enough, why or why not? What should be included in such training?

Back to the research questions 1. How to mitigate the human security challenge? Education and training, awareness raising for all members of the society Reporting incidents to the police and following this harmonizing statutes on computer crime world wide because crime is world wide Risk management system (risk based approach, change management, continual improvement and management commitment) 2. How do we evaluate the effectiveness of organizational security measures?

Presumption The human factor is often neglected in the information security work within organizations, although its impact on security may be measured by the use of simple indicators and influenced significantly by security measures.

Theoretical approaches of security measurement Four perspectives for measuring effectiveness of information security measures: The risk management perspective The economic perspective return of security investments The legal perspective compliance to law The cultural perspective examining attitudes, knowledge, and behaviour aspects according to organizational policy requirements Evaluation and measurement methods: indicators, metrics, penetration testing, compliance with standards, risk assessments etc...

Research methods Research strategies: Surveys Case studies Experiments Mix of qualitative and quantitative methods contribute to: Complementary Facilitation Triangulation

A case: How to measure compliance with organizational security policy? Get an overview of the formal security system Organizational security policy Guidelines and requirements Education and training Incident handling and reactions Formulate statements: Attitudes: I will report security incidents Knowledge: I know that I am obliged to report security incidents Behavior: I have witnessed security incidents reported security incidents I have reported security incidents Interview of employees: Present mixed statements and ask follow up questions to check out facts Analyze the data Where is the problem: Any differences between attitudes, knowledge or behavior? Benchmarking among sections and departments where is the biggest problem?

To sum up: Difference between awareness and good behavior, there is not necessarily a correlation between the two A good formal security system/organization does not correlate with a good security culture

How to evaluate the effectiveness of security e- learning Enterprise case: Wilh Wilh. Group an international logistics provider E-learning program with six modules: Introduction Information security Travel security Personal security Security of facilities Internal/external communication Does it work as intended? Do employees increase their knowledge, and improve their attitudes and behavior?

Research design Field experiment, use of test group and control group 3994 employees were divided into the two groups The management informed about ISA and the forthcoming evaluation of the ISA program The first survey was conducted 1 week before the ISA program was launched The second survey three weeks after the ISA program was launched.

The three sub groups and how the test group members distribute among the modules Subgroup A (N=631) Completed module 1 Subgroup B (N=115) Subgroup C (N=356) Completed module 2 Completed module 3, 4, 5 and 6

Evaluation design Test group Test group A A B A IS A A A B A Study Pop. C A C A Control Group Control Group t 1 A t 2 A

Statistical analyses Both surveys included questions of knowledge, awareness and behavior Knowledge were measured by multiple choice questions with three possible answers, Awareness were measured by the use of a five point Likert scale Behaviour were measured at five point scale measuring frequences Used factor analysis to produce indexes that were later on included in the analysis and for the test of the hypotheses Used paired sample T-test procedure to test several hypotheses for differences between the test group and control group

Extract from independent sample t-tests when two ISA modules were completed versus more Scales: The indexes ranges from 5 (best) to 1 (poorest). The tests for the intervention group and control group are two tailed. *p<.10, **p<.05, ***p<.01,****p<.005, ***** p<.001. SD= standard deviation, T= t-value, df=degrees of freedom. Index T1 Mean (SD) T2 Mean (SD) T (df) Definition of integrity Sub Group A 1.86 (1.64) 2.04 (1.76) 1.98 (542)* Sub Group B 1.90 (1.68) 2.33 (1.89) 1.99(92)** Sub Group C 2.08 (1.78) 2.66 (1.97) 4.75(298)***** Definition of physical security Sub Group A 3.14 (2.00) 3.48 (1.95) 3.29 (542)** Sub Group B 3.32 (1.99) 3.15 (2.00) 0.67 (92) Sub Group C 3.29 (1.98) 3.52 (1.94) 1.81 (298)* Awareness: Security vs functionality Sub Group A 3.43 (0.58) 3.53 (0.58) 4.43 (542)***** Sub Group B 3.34 (0.61) 3.46 (0.59) 1.98 (92)* Sub Group C 3.53 (0.62) 3.63 (0.67) 4.00 (298)**** Reporting Sub Group A 3.80 (0.70) 3.79 (0.71) -0.25 (542) Sub Group B 3.72 (0.82) 3.81 (0.76) 1.32 (92) Sub Group C 3.78 (0.70) 3.93 (0.74) 4.04 (298)***** Behavior: Write down passwords on paper Sub Group A 4.12 (1.07) 4.24 (0.95) 2.98 (542)**** Sub Group B 4.17 (1.16) 4.28 (0.93) 1.23 (92) Sub Group C 4.28 (1.00) 4.36 (1.90) 1.74 (298)* Report incidents Sub Group A 3.91 (1.28) 4.06 (1.13) -2.59 (542)* Sub Group B 3.98 (1.26) 4.06 (1.09) -0.70 (92) Sub Group C 3.92 (1.32) 4.19 (1.11) -4.02 (298)*****

Limitations Short time distance between measurements and the ISA intervention An independent social engineering test could have strengthened the validity

Some lessons learned In field experiments you can not control for all factors, i.e. the Hawthorne effect Management commitment is important! It is difficult to make good questions, a pilot could be useful, but we did not have time for that we had a small internal review among security group members Patience is gold We used SPSS (similar freeware is PSPP) It worked well Easy help functions, explaining the theory A later follow up study documented that some effects were temporary; this indicates a need for continuous learning

Some more studies giving advice on where to put the efforts? Mapping security according to defense in depth and defense in depth Regulation of information security and the impact on top management commitment Do organizational security measures contribute to the detection and deterrence of IT-system abuses?

How can we evaluate the effectiveness of information security measures aimed at strengthening human security behavior? What we knew: Social hacking and penetration testing Audits and review Risk analysis Not much about evaluating economic effects Contribution of the dissertation: Taxonomy Method for measuring employee compliance with security policy Intervention study and evaluation of new training

How effective are these information security measures? What we knew: Malicious attacks and computer crime Humans can easily be fooled by social engineering attacks Technical measures do not give 100% protection Imperfect implementation and limited management commitment reduces the effectiveness of measures Laws have some effect on management commitment Contribution of the dissertation: Laws and good supervisory practices influence on formal security system and management attitudes and commitment A good formal system help employees detect security violations Employees ability to detect and report can be further improved by awareness training

How should these information security measures be integrated in the organization? What we knew: The practical implementation issues are covered by consultants Researchers prefer to develop new concepts, models and systems How enterprises have implemented formal security systems with emphasis on building fortresses The contribution of the dissertation: Focus on the soft core behind the stronger formal security system and perimeter security Learn from the field of safety management and apply a sociotechnical approach

Limitations Data quality, response rate, randomisation etc. Strengths and weaknesses with different methods for collecting data The filtering by the researcher (knowledge, experience etc)

Further research More research on the human factor! Develop good methods for teaching appropriate attitudes towards information security The role of business management in relation to information security Information security economy