Module III
Module III
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk -
Systems: Access Control Mechanisms, Flow and Confinement Problem
RISK MANAGEMENT
Definition:
The formal process of identifying and controlling the risks facing an organization is
called risk management. It is the probability of an undesired event causing damage to
an asset. There are three steps
Risk Identification.
Risk Assessment
Risk Control
Risk Identification: It is the process of examining and documenting the security
posture of an organization’s information technology and the risk it faces.
Risk Assessment: It is the documentation of the results of risk identification.
Risk Control: It is the process of applying controls to reduce the risks to an
organization’s data and information systems.
To keep up with the competition, organizations must design and create safe
environments in which business process and procedures can function.
These environments must maintain Confidentiality & Privacy and assure the integrity
of organizational data-objectives that are met through the application of the principles
of risk management
Understand the threats and attacks that introduce risk into the organization.
Taking asset inventory.
Verify the threats and vulnerabilities that have been identified as dangerous to the
asset inventory, as well as the current controls and mitigation strategies.
Review the cost effectiveness of various risk control measures.
RISK IDENTIFICATION
Categorization of IT Components
People
Employees
There are two categories of employees:
Trusted
Employees who hold trusted roles and have
correspondingly greater authority and accountability,
other staff
Employees who have assignments without special
privileges.
Nonemployees
include contractors and consultants, members of other organizations
with which the organization has a trust relationship, and strangers.
Procedures
fall into two categories: IT and business standard procedures, and IT and
business sensitive procedures. The business sensitive procedures are those
that may assist a threat agent in crafting an attack against the organization
or that have some other content or feature that may introduce risk to the
organization.
Data
Components have been expanded to account for the management of
information in all stages: Transmission, Processing, and Storage.
Software
Components can be assigned to one of three categories: Applications,
Operating Systems, or security components. Software Components that
provide security controls may span the range of operating systems and
applications categories, but are differentiated by the fact that they are the
part of the information security control environment and must be protected
more thoroughly than other system components.
Hardware
is assigned to one of two categories: the usual systems devices and their
peripherals, and the devices that are part of information security control
systems. The latter must be protected more thoroughly than the former.
This examination is known as a threat assessment. You can address e ach threat
with a few basic questions, as follows:
Which threats present a danger to an organization’s assets in the given
environment?
Which threats represent the most danger to the organization’s
information?
How much would it cost to recover from a successful attack?
Which of the threats would require the greatest expenditure to prevent?
Vulnerability Identification:
Create a list of Vulnerabilities for each information asset.
Groups of people work iteratively in a series of sessions give best result.
At the end of Identification process, you have a list of assets and their
vulnerabilities.
Vulnerability Assessment of a Hypothetical DMZ Router
RISK ASSESSMENT
Assigns a risk rating or score to each Information asset. It is useful in gauging the
relative risk to each Vulnerable asset.
⁕ Assigns a risk rating or score to each Information asset.
⁕ It is useful in gauging the relative risk to each Vulnerable asset.
Valuation of Information assets
⁕ Assign weighted scores for the value to the organization of each Information
asset.
⁕ National Institute of Standards & Technology (NIST) gives some standards.
⁕ To be effective, the values must be assigned by asking he following questions.
⁕ Which threats present a danger to an organization’s assets in the given
environment?
⁕ Which threats represent the most danger to the organization’s Information?
⁕ How much would it cost to recover from a successful attack?
⁕ Which of the threats would require the greatest expenditure to prevent?
Likelihood
⁕ It is the probability of specific vulnerability within an organization will be
successfully attacked.
⁕ NIST gives some standards.
⁕ 0.1 = Low 1.0 = High
⁕ Eg: Number of network attacks can be forecast based on how many network
address the organization has assigned.
Risk Determination
Risk =
[ ( Likelihood of vulnerability occurrence ) X (Value of information Asset )]
-- ( % of risk mitigated by current controls) +
uncertainty of current knowledge of the Vulnerability
Categories of Controls
Controlling risk through avoidance, Mitigation or Transference may be
accomplished by implementing controls or safeguards.
Four ways to categorize controls have been identified.
Control function
Preventive or detective
Architectural layer
One or more layers of technical architecture
Strategy layer
Avoidance, mitigation …
Information security principle
Control Function
► Safeguards designed to defend systems are either preventive or
detective.
► Preventive controls stop attempts to exploit a vulnerability by
implementing a security principle, such as authentication, or
Confidentiality.
► Preventive controls use a technical procedure, such as encryption, or
some combination of technical means and enforcement methods.
► Detective controls – warn organizations of violations of security
principles, organizational policies, or attempts to exploit vulnerabilities.
► Detective controls use techniques such as audit trails, intrusion
detection and configuration monitoring.
Architectural Layer
► Controls apply to one or more layers of an organization’s technical
architecture.
► The following entities are commonly regarded as distinct layers in
an organization’s
Information architecture.
→ Organizational policy.
→ External Networks.
→ Extranets ( or demilitarized zones )
→ Intranets ( WANs and LANs )
► Network devices that interface network zones.(Switches, Routers,
firewalls and hubs)
► Systems [ Mainframe, Server, desktop]
► Applications.
Strategy Layer
Controls are sometimes classified by the risk control strategy they
operate within:
→ Avoidance
→ Mitigation
→ transference
Characteristics of Secure Information
☞ Confidentiality
☞ Integrity
☞ Availability
☞ Authentication
☞ Authorization
☞ Accountability
☞ Privacy
Confidentiality:
The control assures the confidentiality of data when it is stored,
processed, or transmitted. An example of this type of control is the use
of Secure Sockets Layer (SSL) encryption technology to secure Web
content as it moves from Web server to browser.
Integrity:
The control assures that the information asset properly, completely, and
correctly receives, processes, stores, and retrieves data in a consistent
and correct manner .Ex: Use of parity or cyclical redundancy checks in
data transmission protocols.
Availability:
The control assures ongoing access to critical information assets. Ex:
Deployment of a network operations center using a sophisticated
network monitoring toolset.
Authentication:
The control assures that the entity (person or computer) accessing
information assets is in fact the stated entity. Ex: The use of
cryptographic certificates to establish SSL connections, or the use of
cryptographic hardware tokens such as SecurID cards as a second
authentication of identity.
Authorization:
The control assures that a user has been specifically and explicitly
authorized to access, update, or delete the contents of an information
asset. Ex: Use of access control lists and authorization groups in the
Windows networking environment. Another example is the use of a
database authorization scheme to verify the designated users for each
function.
Accountability:
The control assures that every activity undertaken can be attributed to a
specific named person or automated process. Ex: Use of audit logs to
track when each user logged in and logged out of each computer.
Privacy: The control assures that the procedures to access, update, or
remove personally identifiable information comply with the applicable
laws and policies for that kind of information.
7 Feasibility Studies
Before deciding on the strategy (Avoidance, transference, mitigation, or
acceptance), for a specific vulnerability, all the economic and non-economic
consequences of the vulnerability facing the information asset must be explored.
Documenting Results
At minimum, each infor mation asset-vulnerability pair should have a do
cumented control strategy that clearly iden tifies any residual risk
remaining after the proposed strategy has been executed.
Some organizations doc ument the outcome of the control strategy for
each information asset-vulnerability pair a s an action plan
This action plan includ es concrete tasks, each with accountability
assigned to an organizational unit or to an individual
Recommended Practices in Controlling Risk
We must convince budget authorities to spend up to the value of the asset
to protect a particular asset from an i dentified threat
Each and every control or safeguard implemented will impact more than
one threat-asset pair
Qualitative Measures
► The spectrum of steps described above was performed with real
numbers or best guess estimates of real numbers-this is known as a
quantitative assessment.
► However, an organization could determine that it couldn’t put specific
numbers on these values.
► Fortunately, it is possible to repeat these steps using estimates based on
a qualitative assessment.
► Instead of using specific numbers, ranges or levels of values can be
developed simplifying the process
Delphi Technique
One technique for accurately estimating scales and values is the Delphi
Technique.
► The Delphi Technique, named for the Oracle at Delphi, is a
process whereby a group of individuals rate or rank a set of
information
► The individual responses are compiled and then returned to the
individuals for another iteration
► This process continues until the group is satisfied with the result.