The document outlines the concepts of risk management in information assurance and security, emphasizing the importance of managing risk through assessment and treatment techniques such as acceptance, avoidance, mitigation, and transfer. It also discusses trust and assurance in security systems, highlighting the role of trust mechanisms and the trusted computing base. Additionally, it describes the lifecycle management of security systems, detailing stages from evaluation to certification and accreditation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views
Finally (IAS101)
The document outlines the concepts of risk management in information assurance and security, emphasizing the importance of managing risk through assessment and treatment techniques such as acceptance, avoidance, mitigation, and transfer. It also discusses trust and assurance in security systems, highlighting the role of trust mechanisms and the trusted computing base. Additionally, it describes the lifecycle management of security systems, detailing stages from evaluation to certification and accreditation.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13
INFORMATION
ASSURANCE AND SECURITY 1 IAS101 Terms: Risk: Viega and McGraw, Building Secure Software assert that software and system security is “all about managing risk.”
• Risk is the possibility that a particular threat will
adversely impact an information system by exploiting a particular vulnerability. The assessment of risk must take into account the consequences of an exploit. • Risk management is a process for an organization to identify and address the risks in their environment. There are several risk management frameworks, and each defines a procedure for an organization to follow. Risk Management Framework:
One particular risk management procedure (from Viega and
McGraw) consists of six steps: • 1 Assess assets • 2 Assess threats • 3 Assess vulnerabilities • 4 Assess risks • 5 Prioritize countermeasure options • 6 Make risk management decisions Risk Treatments: Once the risk has been identified and assessed, managing the risk can be done through one of four techniques:
• Risk acceptance: risks not avoided or transferred are retained by the
organization. E.g. sometimes the cost of insurance is greater than the potential loss. Sometimes the loss is improbable, though catastrophic. • Risk avoidance: not performing an activity that would incur risk. E.g. disallow remote login. • Risk mitigation: taking actions to reduce the losses due to a risk; many technical countermeasures fall into this category. • Risk transfer: shift the risk to someone else. E.g. most insurance contracts, home security systems Risk Management
The risk treatments – acceptance, avoidance,
mitigation, transfer are with respect to a specific risk for a specific pary. • E.g., buying insurance is risk transfer for you, not for the insurance company. For the insurance company, it’s risk acceptance. But they may require you to take measures to avoid or mitigate their risk. Mitigation versus Avoidance
There is often a confusion about the difference between risk
avoidance and risk mitigation. • Risk avoidance is about preventing the risk from being actualized. E.g., not parking in a high crime area. • Risk mitigation is about limiting the damage should the risk be actualized. E.g., having a LoJack or cheap car stereo. Note the risk in this case is that your car will be broken into. Terms: Trust and Assurance • Trust is a generic term that implies a mechanism in place to provide a basis for confidence in the reliability/security of the system. Failure of the mechanism may destroy the basis for trust. • Trust mechanisms are the security features of a system that provide enforcement of a security policy. • The trusted computing base (TCB) is a collection of all the trust mechanisms of a computer system which collectively enforce the policy. • Assurance is a measure of confidence that the security features, practices, procedures, and architecture of a system accurately mediates and enforces the security policy. Trust Management The concept of trust management provides a unified approach to conceptualizing (parts of) IA. That is, a big part of IA is about controlling interactions among: • Actions • Principals • Policies • Credentials Various policy management systems have been built with the goal of formalizing and describing these relationships: KeyNote (1999) and Extensible Access Control Markup Language (XACML) (2009). These provide formal mechanisms for defining policy languages. Lifecycle
A lifecycle is the process by which an asset is managed from its
arrival or creation to its termination or destruction. Software engineering defines several lifecycle models for the development or acquisition of computer software in a waterfall model, the process is divided into stages performed sequentially: Requirements Design Coding Testing Deployment Production Decommission Security Systems Lifecycle Management Security systems lifecycle management is a process by which the project managers for a system will ensure that appropriate information assurance safeguards are incorporated into a system. The stages leading to acquisition by the government of a secured system might be: • 1 Evaluation of sensitivity of the application based on risk analysis • 2 Determination of security specifications • 3 Design review and perform system tests to ensure safeguards are adequate, through testing and validation that the product meets specifications • 4 System certification and accreditation, issuance of a certificate that the system meets the need and can be procured. Assurance Requirement: Some indication of various types of lifecycle concerns appear in the Common Criteria “Assurance Requirements”, including: Assurance Requirements (2) END OF OUR FINAL … NEXT FINAL EXAMINATION ! ! !
Risk Is A Function of The Likelihood of A Given Threat-Source's Exercising A Particular Potential Vulnerability, and The Resulting Impact of That Adverse Event On The Organization