Computer Security Lecture 13

Similar documents
Computer Security course

Computer Security: Principles and Practice

Risk Management Policy

UoB Risk Assessment Methodology

RISK MANAGEMENT FOR INFRASTRUCTURE

Risk Management Guide for Information Technology Systems. NIST SP Overview

NIST National Institute of Standards and Technology

ISO Information Security Management Systems Foundation

ISMS Implementation Guide

How small and medium-sized enterprises can formulate an information security management system

Information security risk management using ISO/IEC 27005:2008

Information Security Guideline for NSW Government Part 1 Information Security Risk Management

Information Security: Business Assurance Guidelines

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management

Information Services IT Security Policies B. Business continuity management and planning

Security Officer s Checklist in a Sourcing Deal

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

The new Family of Standards & ISO/IEC 27001

Risk Management Policy and Framework

Risk Management: Coordinated activities to direct and control an organisation with regard to risk.

Performing Effective Risk Assessments Dos and Don ts

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

Nova Scotia EMO. Hazard Risk Vulnerability Assessment (HRVA) Model. Guidelines for Use. October, 2010

CMS Information Security Risk Assessment (RA) Methodology

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Analyzing Risks in Healthcare. February 12, 2014

NSW Government Digital Information Security Policy

Risk-Based Assessment and Scoping of IV&V Work Related to Information Assurance Presented by Joelle Spagnuolo-Loretta, Richard Brockway, John C.

SECURITY RISK MANAGEMENT

Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery

Information Security Awareness Training

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

ITIL and Business Continuity (Service Perspective)

Managing internet security

Information Security Services

(Instructor-led; 3 Days)

A Risk Management Standard

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Information technology Security techniques Information security management systems Overview and vocabulary

Data Protection Breach Management Policy

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

security policy Purpose The purpose of this paper is to outline the steps required for developing and maintaining a corporate security policy.

Security Controls What Works. Southside Virginia Community College: Security Awareness

The potential legal consequences of a personal data breach

Office of Inspector General

Information Security Team

PAPER-6 PART-1 OF 5 CA A.RAFEQ, FCA

HIPAA Security Risk Analysis and Risk Management Methodology with Step-by-Step Instructions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1

ISO27001 Controls and Objectives

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Risk Management & Internal Compliance and Control System

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

Procedures on Data Security Breach Management Version Control Date Version Reason Owner Author 16/09/2009 Draft 1 Outline Draft Jackie Groom

Information Security Program Management Standard

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Outsourcing and Information Security

Guidance on data security breach management

ISO IEC ( ) TRANSLATED INTO PLAIN ENGLISH

Network Security: Policies and Guidelines for Effective Network Management

RISK ASSESSMENT GUIDELINES

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Outsourcing and third party access

Data Security Breach Incident Management Policy

A Structured Comparison of Security Standards

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, CEO EDS Corporation

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Guide to Vulnerability Management for Small Companies

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Information security PROVIDING PERSONAL AND PROFESSIONAL DEVLOMENT FOR IT LEADERS

SEC s Cybersecurity Risk Alert Part 2 of 3

Data Security Best Practices & Reasonable Methods

Operational Risk Publication Date: May Operational Risk... 3

DETAILED RISK ASSESSMENT REPORT

DISASTER RECOVERY PLAN

Information Security Management System Policy

Practical Overview on responsibilities of Data Protection Officers. Security measures

IT Security Management Risk Analysis and Controls

Company Management System. Business Continuity in SIA

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One

Security Risk Assessment

ISO Controls and Objectives

Information Security Management System Information Security Policy

IY2760/CS3760: Part 6. IY2760: Part 6

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two

Guidance on data security breach management

STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices

SCHOOL ONLINE SAFETY SELF REVIEW TOOL

a Medical Device Privacy Consortium White Paper

How To Secure An Extended Enterprise

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

National Cyber Security Policy -2013

BUSINESS CONTINUITY POLICY

Transcription:

Computer Security Lecture 13 Risk Analysis Erland Jonsson (based on material from Lawrie Brown) Department of Computer Science and Engineering Chalmers University of Technology Sweden Security Management Overview Security requirements means asking what assets do we need to protect? how are those assets threatened? what can we do to counter those threats? IT Security management answers these determining security objectives and risk profile perform security risk assessment of assets select, implement, monitor controls 1

IT Security Management IT Security Management: a process used to achieve and maintain appropriate levels of security (including confidentiality, integrity, availability, accountability, authenticity and reliability.) IT security management functions include: determining organizational IT security objectives, strategies, policies and security requirements identifying and analyzing security threats to IT assets identifying and analyzing risks specifying appropriate safeguards implementation and operation of safeguards developing and implement a security awareness program incident handling ISO 27000 Security Standards ISO27000 ISO27001 ISO27002 (ISO17799) ISO27003 ISO27004 ISO27005 ISO13335 a proposed standard which will define the vocabulary and definitions used in the 27000 family of standards. defines the information security management system specification and requirements against which organizations are formally certified. It replaces the older Australian and British national standards AS7799.2 and BS7799.2. currently published and better known as ISO17799, this standard specifies a code of practice detaili ng a comprehensive set of information security control objectives and a menu of best-practice security controls. It replaces the older Australian and British national standards AS7799.1 and BS7799.1. a proposed standard containing implementation guidance on the use of the 27000 series of standards following the Plan-Do-Check-Act process qualit y cycle. Publication is proposed for late 2008. a draft standard on information security management measurement to help organizations measure and report the effectiveness of their information security management systems. It will address both the security management processes and controls. Publication is proposed for 2007. a proposed standard on information security risk management. It will replace the recently released British national standard BS7799.3. Publication is proposed for 2008/9. provides guidance on the management of IT security. This standard comprises a number of parts. Part 1 defines concepts and models for information and communications technology security management. Part 2, currently in draft, will provide operational guidance on ICT security. These replace the older series of 5 technical reports ISO/IEC TR 13335 parts 1-5. 2

Detailed Risk Analysis most comprehensive alternative assess using formal structured process with a number of stages identify likelihood of risk and consequences hence have confidence controls appropriate costly and slow, requires expert analysts may be a legal requirement to use suitable for large organizations with IT systems critical to their business objectives Risk Analysis Process 3

Establish Context determine the broad risk exposure of the organisation related to wider political / social environment and legal and regulatory constraints provide baseline for organization s risk exposure specify organization s risk appetite set boundaries of risk assessment partly on risk assessment approach used decide on risk assessment criteria used 4

Asset Identification identify assets anything which needs to be protected items of value to organization to meet its objectives tangible or intangible in practice try to identify significant assets draw on expertise of people in relevant areas of organization to identify key assets identify and interview such personnel see checklists in various standards Threat Identification to identify threats or risks to assets ask 1. who or what could cause it harm? 2. how could this occur? threats are anything that hinders or prevents an asset to provide the appropriate levels of the key security services: confidentiality, integrity, availability, accountability, authenticity and reliability assets may have multiple threats 5

Vulnerability Identification identify exploitable flaws or weaknesses in organization s IT systems or processes hence determine applicability and significance of threat to organization note that you need a combination of a threat and a vulnerability to create a risk to an asset use lists of potential vulnerabilities in standards etc Analyse Risks specify likelihood of occurrence of each identified threat to asset given existing controls management, operational, technical processes and procedures to reduce risk exposure specify consequence should the threat occur hence derive overall risk rating for each threat: risk = probability threat occurs x cost to organization in practice very hard to determine probabilities exactly, thus you may need to use qualitative (rather than quantitative) ratings for each aim to order resulting risks in order to treat them 6

Determine Likelihood Rating Likelihood Expanded Definition Description 1 Rare May occur only in exceptional circumstances and may deemed as unlucky or very unlikely. 2 Unlikely Could occur at some time but not expected given current controls, circumstances, and recent events. 3 Possible Might occur at some time, but just as likely as not. It may be difficult to control its occurrence due to external influences. 4 Likely Will probably occur in some circumstance and one should not be surprised if it occurred. 5 Almost Certain Is expected to occur in most circumstances and certainly sooner or later. Determine Consequence Rating Consequence Expanded Definition. 1 Insignificant Generally a result of a minor security breach in a single area. Impact is likely to last less than several days and requires only minor expenditure to rectify. 2 Minor Result of a security breach in one or two areas. Impact is likely to last less than a week, but can be dealt with at the segment or project level without management intervention. Can generally be rectified within project or team resources. 3 Moderate Limited systemic (and possibly ongoing) security breaches. Impact is likely to last up to 2 weeks and generally requires management intervention. Will have ongoing compliance costs to overcome. 4 Major Ongoing systemic security breach. Impact will likely last 4-8 weeks and require significant management intervention and resources to overcome, and compliance costs are expected to be substantial. Loss of business or organizational outcomes is possible, but not expected, especially if this is a once off. 5 Catastrophic Major systemic security breach. Impact will last for 3 months or more and senior management will be required to intervene for the duration of the event to overcome shortcomings. Compliance costs are expected to be very substantial. Substantial public or political debate about, and loss of confidence in, the organization is likely. Possible criminal or disciplinary action is likely. 6 Doomsday Multiple instances of major systemic security breaches. Impact duration cannot be determined and senior management will be required to place the company under voluntary administration or other form of major restructuring. Criminal proceedings against senior management is expected, and substantial loss of business and failure to meet organizational objectives is unavoidable. 7

Determine Resultant Risk Consequences Likelihood Doomsday Catastrophic Major Moderate Minor Insignificant Almost E E E E H H Certain Likely E E E H H M Possible E E E H M L Unlikely E E H M L L Rare E H H M L L Risk Level Extreme (E) High (H) Medium (M) Low (L) Description Will require detailed research and management planning at an executive/director level. Ongoing planning and monitoring will be required with regular reviews. Substantial adjustment of controls to manage the risk are expected, with costs possibly exceeding original forecasts. Requires management attention, but management and planning can be left to senior project or team leaders. Ongoing planning and monitoring with regular reviews are likely, though adjustment of controls are likely to be met from within existing resources. Can be managed by existing specific monitoring and response procedures. Management by employees is suitable with appropriate monitoring and reviews. Can be managed through routine procedures. Document in Risk Register and Evaluate Risks Asset Internet Router Destruction of Data Center Threat/ Vulnerability Outside Hacker attack Accidental Fire or Flood Existing Controls Admin password only None (no disaster recovery plan) Likelihood Consequence Level of Risk Risk Priority Possible Moderate High 1 Unlikely Major High 2 8

Risk Treatment Alternatives Risk Treatment Alternatives risk acceptance risk avoidance risk transferal reduce consequence reduce likelihood 9

Summary risk assessment is an important part of the IT security management process detailed risk assessment process involves context including asset identification identify threats, vulnerabilities, risks analyse and evaluate risks deal with the risk assessment correctly 10