Title: Introduction to Information Security
1Introduction to Information Security
1
2Risk Management
3Risk Mangement
- Identify and control risks faced by an
organization - Two major tasks
- Risk identification
- Risk Control
4Risk Mangement
- Identify and control risks faced by an
organization - Two major tasks
- Risk identification
- Examining and documenting the security posture of
an organizations information technology and the
risks it faces - Risk Control
5Risk Mangement
- Identify and control risks faced by an
organization - Two major tasks
- Risk identification
- Risk Control
- Apply controls to reduce risks to an
organizations data and information systems
6Competition
- Organizations must design and create safe
environments - For business processes and procedures to function
- The environments maintain -
- Confidentiality and privacy
- Assure integrity of organizational data
7Risk Management
- Sun Tzu - The Art of War
- If you know the enemy and know yourself, you
need not fear the result of a hundred battles. If
you know yourself and not the enemy, for every
victory gained you will also suffer a defeat. If
you know neither the enemy nor yourself, you will
succumb in every battle.
8Know Yourself
- You must -
- Identify
- Examine
- Understand
- The information and systems currently in place
within your organization
9Protecting Assets
- Defined as -
- Information and systems that use, store, and
transmit information - You must understand what they are, how they add
value to the organization, and to which
vulnerabilities they are susceptible
10Protecting Assets
- Know what you have
- Know what you are doing to protect it
- If you have a control in place to protect an
asset this does not mean that the asset is
protected
11Protecting Assets
- Frequently when an organization puts a control in
place it thinks that its work is done and it has
nothing more to do - This should raise a red flag as far as security
is concerned - Controls need to be periodically reviewed,
revised, and maintained - Policies, educations, training, and technologies
that protect information must be carefully
maintained
12Know the Enemy
- Moving on to Sun Tzus next piece of advice we
examine the threats facing the organization - Determine threats that directly affect the
organization and the security of the
organizations information assets - Use your understanding of these aspects to create
a list of threats prioritized by how important
each asset is to the organization
13Communities of Interest
- A community of interest is a group of people who
share a common interest - Usually this interest is something that the
members of the community interact about on a
regular basis sharing knowledge about the domain - A community of interest is not a casual group or
club but a group of people engaged in serious
knowledge management
14Communities of Interest
- The Communities of Interest of Interest to
Information Security - Information Security
- Management and Users
- Information Technology
15Communities of Interest
- The Communities of Interest of Interest to
Information Security - Information Security
- Best understand the threats and attacks
- Take a leadership role in addressing risk
- Management and Users
- Information Technology
16Communities of Interest
- The Communities of Interest of Interest to
Information Security - Information Security
- Management and Users
- Properly trained and kept aware of threats these
groups act as early detectors and response to
threats - Information Technology
17Communities of Interest
- The Communities of Interest of Interest to
Information Security - Information Security
- Management and Users
- Information Technology
- Build secure systems
- Operate them safely
18Communities of Interest
- Information Technology
- Build secure systems
- Operate them safely
- Ensure good backups to control the risk from hard
drive failure - Evaluate valuation
- Evaluate threats
19Communities of Interest
- Other Responsibilities
- Evaluate the risk controls
- Determine which control options
- Acquiring or installing the needed controls
- Overseeing that the controls remain effective
- Essential that Communities of Interest conduct
periodic management reviews
20Identifying Risks
- Identify Information Assets
- Identify
- Classify
- Prioritize
- Assets are targets -
- Threats
- Threat Agents
21Identifying Assets
Circumstances
Settings
Assets
Vulnerabilities
22Risk Identification Process
Plan and organize the process
Risk Identification
Categorize system components
Risk Assessment
Inventory and categorize assets
Assign value to attack on assets
Identify Threats
Assets likelihood of attack on vulnerabilities
Specify vulnerable assets
Calculate relative risk factor for assets
Review possible controls
Document findings
23Asset Identification
- Identification of all of the elements of an
organizations system including -
- People
- Procedures
- Data
- Information
- Hardware
- Networking Elements
24Asset Identification
Traditional SecSDLC Risk Management System Components
People Employees Trusted Employees Other Staff
Procedures Procedures IT and business standard procedures IT and business sensitive procedures
Data Information Transmission Processing Storage
Software Software Applications Operating systems Security Components
Hardware System devices and peripherals Systems and peripherals Security devices
Networking components Intranet components Internet or DMZ components
25Identifying People, Procedures, and Data Assets
- Identifying
- Human resources
- Documentation
- Data and information
- Is more challenging than hardware and software
26Identifying People, Procedures, and Data Assets
- Assign individuals who have knowledge,
experience, and judgement to this task - As assets are identified, they need to be
recorded using a reliable data-handling process - Recording process needs to be flexible to record
various types of attributes
27Recommended Attributes
- People
- Position name/number/ID
- Supervisor
- Security clearance level
- Special skills
28Recommended Attributes
- Procedures
- Description
- Intended purpose
- Relationship to -
- Software, hardware, networking elements, storage
location
29Recommended Attributes
- Data
- Classification
- Owner
- Creator
- Manager
- Size of data structure
30Recommended Attributes
- Data (continued ...)
- Data structure used
- Online or offline
- Location
- Backup procedures
31How much can be tracked?
- Decisions must be made about what is to be
tracked - It is impossible to track all of the assets
(especially when it comes to data) - Therefore there needs to be a prioritization of
the assets in order to decide what to track and
document - Most companies do not recognize all of their
assets
32Hardware, Software, Network
- What are the attributes of hardware, software,
and network assets that should be collected? - For each type of component this will vary
- The most important thing is to be consistent in
the collection process
33Hardware, Software, Network Attributes
- Name - use a common name
- IP address
- MAC address
- Element type
- An element will have attributes that may differ
from another elements
34Hardware, Software, Network Attributes
- Element type
- An element will have attributes that may differ
from another elements - For example, a server might be identified by,
- Class of the device
- OS of the device
- Device capacity
35Hardware, Software, Network Attributes
- Serial number
- Applies to hardware and software
- Record for each instance
- Manufacturers Name
- Manufacturers Part No. and/or Model No.
- Acquisition Date
36Hardware, Software, Network Attributes
- Software version, update revision, or FCO (field
change order) - Physical Location
- Logical Location
- Controlling Entity
37Asset Valuation
- In the beginning assets are identified, then it
is necessary to determine the value of the assets
identified. - All assets will not have equal value
- All assets will not be equally protected
38Asset Valuation
- Question 1
- Which information asset(s) is/are MOST critical
to the success of the organization? - In order to answer this question we can refer to
the organizations mission and objectives
39Asset Valuation
- Which information asset(s) is/are MOST critical
to the success of the organization? - Which elements support the objectives?
- Which elements are adjuncts to the objectives?
40Asset Valuation
- Example
- Amazons uses web servers to receive and process
orders 24 hours a day seven days a week - These servers are critical to the success of
Amazons business - In customer service, the desktop systems used by
customer representatives, although important are
as critical
41Asset Valuation
- Which information asset generates the most
revenue? - How much of an organizations revenue depends on
a particular asset? - In some organizations different systems are in
place for each line of business or service
offering - Which play the greatest role in generating
revenue or delivering services?
42Asset Valuation
- Which information asset generates the most
profitability? - How much of an organizations profitability
depends on a particular asset?
43Asset Valuation
- Example
- Amazons Servers
- Some servers support sales operations
- Some servers support the auction process
- Some servers support the customer review database
- Which of these servers contribute to
profitability?
44Asset Valuation
- Sales operations servers
- Auctions servers
- Customer review database servers
- Contribute directly to profitiability
- Auction server contribute
- Do not directly contribute
45Asset Valuation
- Which asset would be most expensive to replace?
- Which asset would be the most expensive to
protect? - Which asset would be most embarrasing or cause
the greatest liability if revealed?
46Ordering the Assets
- Once the assets have been inventoried and the
value of each has been assessed it is possible to
calculate the relative importance of an asset
with a process known as weighted factor analysis
47Data Classification
- Corporate and military organizations use a
variety of schemes to classify information - This scheme is called a DATA CLASSIFICATION
SCHEME - Georgia-Pacific Corporation uses a corporate
scheme - The U.S. Military uses a more complex scheme
48Corporate Data Classification
- Confidential
- Internal
- External
49Corporate Data Classification
- Confidential
- Used for the most sensitive information that must
be tightly controlled even within the company - Access to this information is strictly on a
need-to-know basis - Internal
- External
50Corporate Data Classification
- Confidential
- Internal
- The internal classification is used to denote
information that can be viewed inside an
organization by employees, authorized
contractors, and other parties - External
51Corporate Data Classification
- Confidential
- Internal
- External
- This is all information that has been approved by
the company for public release
52Military Data Classification
- Unclassified Data
- Information to be distributed to the public
without any threats to U.S. national interests - Sensitive but Unclassified
- Confidential Data
- Secret
- Top Secret
53Military Data Classification
- Unclassified Data
- Sensitive but Unclassified
- Any information of which the loss, misuse, or
unauthorized access to, or modification of might
adversely affect U.S. National interests - Confidential Data
- Secret
- Top Secret
54Military Data Classification
- Unclassified Data
- Sensitive but Unclassified
- Confidential Data
- Any information the unauthorized disclosure of
which reasonable could be expected to cause
damage to the national security - Examples include compromise of information like
strength of U.S. forces - Secret
- Top Secret
55Military Data Classification
- Unclassified Data
- Sensitive but Unclassified
- Confidential Data
- Secret
- Any information the unauthorized exposure of
which reasonably could be expected to cause
serious damage to the national security - Examples include disruption of foreign relations
significantly affecting national security - Top Secret
56Military Data Classification
- Unclassified Data
- Sensitive but Unclassified
- Confidential Data
- Secret
- Top Secret
- Any information or material the unauthorized
disclosure of which reasonably could be expected
to cause exceptionally grave damage to the
national security - Examples include armed hostilities agains the U.S.
57A Practical Scheme
- Most organizations dont need as detailed a
classification as the military scheme - Most organizations need a scheme to protect data
58A Practical Scheme
- Public
- Information for general public dissemination
- For Official Use Only
- Sensitive
- Classified
59A Practical Scheme
- Public
- For Official Use Only
- Information that is not particularly sensitive,
but not for public release - Sensitive
- Classified
60A Practical Scheme
- Public
- For Official Use Only
- Sensitive
- Information important to the business that could
embarrass the company or cause loss of market
share if revealed - Classified
61A Practical Scheme
- Public
- For Official Use Only
- Sensitive
- Classified
- Information of the utmost secrecy to the
organization - Could severely impact the welfare of the
organization
62Security Clearances
- The other part of a data classification scheme is
the personnel scurity clearence structure - In organizations that require security clearances
each user of data must be assigned a single
authorization level - Indicates the level of classification that he or
she is authorized to view
63Threat Identification
- Once the assets are classified the next step is
to identify the threats that an organization
faces - Of these threats there are those that will be
important and those that will be unimportant - It is critical to distinguish between these types
of threats as it is impossible to attend to all
of the possible threats that could possibly
effect and organization
64Threat Assessment
- Threats
- Acts of human error or failure
- Compromises to intellectual property
- Deliberate acts of espionage or trespass
- Deliberate acts of information extortion
- Deliberate acts of sabotage or vandalism
65Threat Assessment
- Threats (continued)
- Deliberate acts of theft
- Deliberate software attacks
- Forces of nature
- Quality of service deviations from service
providers - Technical hardware failures or errors
66Threat Assessment
- Threats (continued)
- Technical software failures or errors
- Technological obsolescence
67Threat Assessment
- Each of the threats must be examined to determine
its potential to cause damage to an organization
and its assets
68Threat Assessment
- Questions to Ask
- Which threats present a danger to an
organizations assets in the given environment? - Any category is eliminated that does not apply to
the organization
69Threat Assessment
- After it has been determined which threats apply
- - It is necessary to seek examples in each category
- These examples are examined to determine if any
do not apply in the current environment
70Threat Assessment
- Which threats represent the most danger to the
organizations information? - Danger may be -
- Probability of threat of attack
- Amount of damage the threat could create
- Frequency of which an attack could occur
71Threat Assessment
- Threat Ranking
- Quantitative and Qualitative measures can be used
to rank threats - Rank threats subjectively in the order of danger
- Rate each threat on a scale from 1 to 5
- 1 not significant
- 5 very significant
72Threat Assessment
- Questions to Ask
- How much would is cost to recover from a
successful attack? - This cost is a guide to corporate spending on on
controls for the threat - Provide a rough assessment of the cost to
recover (Is it a chevy or a cadillac?)
73Threat Assessment
- Questions
- Which of the threats will require the greatest
expenditure to prevent? - Some threats like malicious code have very low
costs of protection (comparatively) - Other threats very high cost of protection
74Threat Assessment
- As seen by Computing Executives
- Deliberate software attacks (Rank 1)
- Technical software failures or errors (Rank 2)
- Acts of human error or failure (Rank 3)
- Deliberate acts of espionage or tresspass (Rank
4) - Deliberate acts of sabotage or vandalism (Rank
5)
75Threat Assessment
- As seen by Computing Executives
- Technical hardware failures or errors (Rank 6)
- Deliberate acts of theft (rank 7)
- Forces of nature (Rank 8)
- Compromises to intellectual property (Rank 9)
- Quality of service deviations from service
providers (Rank 10)
76Threat Assessment
- As seen by Computing Executives
- Technological obsolescence (Rank 10)
- Deliberate acts of information extortion (Rank
11)
77Threat Assessment
- How can you use these rankings?
- As a way to decide where to place your resources
- As a way to determine where the most likely
successful attacks will occur (according to other
executives)
78Risk Assessment
- Definition of Risk
- Risk is
- the LIKELIHOOD of the occurrence of a
vulnerability - multiplied by
- the VALUE of the information asset
- minus
- the percentage of risk mitigated by CURRENT
CONTROLS - plus
- the UNCERTAINTY of the current knowledge of the
vulnerability
79Risk Assessment
- Our goal at this point is to develop a way to
evaluate the relative risk of each of the listed
vulnerabilities
80Likelihood
- LIKELIHOOD
- Probability that a specific vulnerability within
an organization will be successfully attacked - In risk assessment a numeric value is assigned to
the likelihood of a vulnerability being
successfully exploited - NIST recommends that likelihoods are in the range
of 0.1 to 1.0
81Calculating Likelihood
- Unless it is the case that you have accumulated
significant data about a particular vulnerability
it would be difficult to calculate the likelihood - For that reason it is a good idea to use external
references whenever possible as a resource for
likelihood values
82Valuation of Information Assets
- Once the assets are identified weighted scores
can be assigned to the assets to indicate an
assets valkue - The values must be assigned by again asking the
questions, - Which threats present a danger to an
organizations assets in the given environment? - Which threats represent the most danger to the
organizations information?
83Valuation of Information Assets
- The values must be assigned by again asking the
questions, - Which threats present a danger to an
organizations assets in the given environment? - Which threats represent the most danger to the
organizations information? - How much would it cost to recover from a
successful attack?
84Valuation of Information Assets
- The values must be assigned by again asking the
questions, - Which threats present a danger to an
organizations assets in the given environment? - Which threats represent the most danger to the
organizations information? - How much would it cost to recover from a
successful attack? - Which of the threats would require the greatest
expenditure to prevent?
85Valuation of Information Assets
- Once these questions are re-evaluated the
background information from the risk
identification process is used to answer the
following question - - Which of the questions posed above for each
information asset is the most important to the
protection of information of the organization? - This question helps set priorities
86Controls
- If a vulnerability is managed by a control it no
longer needs to be considered for additional
controls and can be set aside - If a vulnerability is partially controlled,
estimate the percentage it has been controlled
87Determining the Risk
- For the purposes of RELATIVE RISK ASSESSMENT risk
equals likelihood of vulnerability occurrence
times value or impact minus percentage risk
already controlled plus an element of uncertainty - Let risk be R
- Let likelihood be l
- Let value be v
- Let percentage controlled risk be c
- Let uncertainty be u
88Determining the Risk
- Thus risk represented formulaically would be -
- R (l v) - c u
89Determining Risk
- Examples
- Example 1
- Asset A
- v50, l1.0, c0, u10
- R (50 1.0) - 0 (10 (50 1.0)) 55
90Determining Risk
- Example 2
- Asset B
- v100, 2 vulnerabilities
- l(2).5, c50,u20
- l(3).1, c0, u20
- R(B,Vulnerability 2) (100 .5) - ((100 .5)
.5) (100 .5) .2) 35 - R(B,Vulnerability 3) (100 .1) - ((100 .1)
0) ( (100 .1) .2) 12
91Possible Controls
- For each threat and its associated
vulnerabilities that have residual risk create a
preliminary list of control ideas - RESIDUAL RISK is the risk that remains after the
existing control is applied
92Types of Controls
- Three General Categories
- Category 1 - Policies
- Category 2 - Programs
- Category 3 - Technologies
93Types of Controls
- Three General Categories
- Category 1 - Policies
- Documents that specify an organizations approach
to security - Category 2 - Programs
- Category 3 - Technologies
94Types of Controls
- Three General Categories
- Category 1 - Policies
- Category 2 - Programs
- Activities performed within the organization to
improve security - Category 3 - Technologies
95Types of Controls
- Three General Categories
- Category 1 - Policies
- Category 2 - Programs
- Category 3 - Technologies
- Technical implementations of the policies defined
by the organization
96Access Controls
- Access control address the issue of allowing a
user into a trusted area of the organization - These areas can include both physical and logical
areas - An example of a physical area is a particular
office area, i.e., the area where sensitive
information is maintained - An example of a logical area is a particular
computer system where sensitive data is maintained
97Access Controls
- Access Controls consist of a combination of -
- Policies
- Programs
- Technologies
98Types of Access Controls
- Mandatory
- Limited control over access to information
resources - Non-discretionary
- Discretionary
99Types of Access Controls
- Mandatory
- Non-discretionary
- Managed by a central authority
- Can be based on an individuals role (role-based
controls) - Can be based on tasks (task-based controls)
- Discretionary
100Types of Access Controls
- Mandatory
- Non-discretionary
- Discretionary
- Implemented at the discretion or option of the
data user
101Documenting the Results
- The product of the risk assessment is a worksheet
that ranks the risks - This worksheet should contain the following items
- Asset, asset impact, vulnerability, vulnerability
likelihood, risk-rating factor
102Risk Control Strategies
- When organizational management has determined
that risks from information security threats are
creating a competitive disadvantage they empower
the information technology and information
security organizations to control the risks
103Quote
- Most organizations can spend only a reasonable
amount of time and money on information security,
and the definition of reasonable differs from
organization to organization and even from
manager to manager.
104Risk Control Strategies
- Once the risks are ranked, the team must choose
one of four strategies to control each of the
risks resulting from the vulnerabilities - These are -
- Avoidance
- Transfer
- Mitigation
- Acceptance
105Avoidance
- Prevent exploitation of the vulnerability
- Preferred approach
- Accomplished by countering threat(s), removing
vulnerabilities in assets, limiting access to
assets, and adding protective safeguards
106Avoidance
- Three Common Methods
- Application of Policy
- Training and Education
- Applying Technology
107Avoidance
- Three Common Methods
- Application of Policy
- Management mandates that certain procedures are
always followed - Training and Education
- Applying Technology
108Avoidance
- Three Common Methods
- Application of Policy
- Training and Education
- Awareness, education, and training are essential
if employees are to exhibit safe and controlled
behavior - Applying Technology
109Avoidance
- Three Common Methods
- Application of Policy
- Training and Education
- Applying Technology
- Technology is often required to assure that risk
is reduced
110Implementing Avoidance
- Risks may be avoided by -
- Countering the threats facing an asset
- Eliminating the exposure of a particular asset
- Eliminating a threat is difficult
- It can be done
111Transference
- Approach that tries to shift the risk to other
assets - Can be achieved by rethinking how processes are
implemented in the organization - - Revising deployment models
- Outsourcing
- Purchasing insurance
- Service contracts
112Transference
- The philosophy of transference becomes a business
rationale for moving non-core activities outside
of an organization while only maintaining core
activities in the organization
113Mitigation
- Reduce impact of exploitation of a vulnerability
through planning and preparation - Approach includes three types of plans
- IRP
- DRP
- BCP
114IRP
- Incident Response Plan
- This document defines the actions an organization
should take while and incident is in progress - For example, if you know your network is being
attacked by a hacker, this is the document that
will answer the question, what do you do in
response to the attack?
115DRP
- The Disaster Recovery Plan is the most common of
the mitigation procedures - The DRP frequently is largely based on a strategy
for backing up key information assets. - In reality a DRP must include significantly more
than just a backup plan
116DRP
- The DRP specifies what needs to be done when the
disaster stops. - DRPs can include strategies to limit losses
before and during the disaster - The DRP is a specification of how to get back up
and running in the event of a disaster - DRPs are frequently practiced within a
organization
117BCP
- The Business Continuity Plan addresses the issue
of how the organization will maintain business
operations during an incident or disaster - It naturally also relates to the DRP because the
BCP will transition to the DRP once the disaster
is over - BCP may require the setup of special sites that
can be used in the event that the main processing
sites for the business are adversely affected by
an incident
118Acceptance
- Acceptance differs from the other choices of how
to deal with risk in that it approaches it from
the standpoint of doing nothing about it - Under these circumstances the organization has
decided to take the consequences of the
exploitation
119Acceptance
- The only accepted use of this strategy is as
follows - - Determined the level of risk
- Assessed the probability of attack
- Estimated the potential damage that could occur
from attacks - Evaluated controls using each type of feasibility
- Decided that a particular function, service,
information, or asset did not warrant the cost of
protection
120Acceptance
- Example
- Supposing it would cost an organization 100,000
per year to protect a server - The organization has determined that to replace
the server and the data on the server, and to
cover the associated recovery costs would cost
10,000 - Under these circumstances the organization may be
satisfied with taking its chances
121Acceptance
- When an organization chooses acceptance as the
strategy to address all of its security issues it
is usually a statement about the organizations
ability to proactively respond to a threat - It also represents an organizational apathy
towards security - An organization leaves itself open to litigation
when adopting a strategy of ignorance is bliss
122Risk Evaluation Strategy
- In order to determine if a risk is viable, that
is, a strategy should be selected to address it,
a process should be followed to make this
assessment
123Risk Evaluation Strategy
Viable threats
Is system vulnerable?
Is system exploitable?
System as Designed
Vulnerability exists
Threat and vulnerability exist
Yes
Yes
No
No
No risk
No risk
Yes
Yes
Risk exists
Is the attackers gain gt cost?
Is expected loss gt organizations acceptable
level?
Risk is unacceptable
No
No
Risk may be accepted
Risk should be accepted
124Risk Evaluation Strategy
- Rules of Thumb for Strategy Selection
- When a vulnerability exists implement security
controls to reduce the likelihood of a
vulnerability being exercised - When a vulnerability can be exploited Applied
layered protection, architectural designs, and
administrative controls to minimize risk or to
prevent an occurrence
125Risk Evaluation Strategy
- Rules of Thumb for Strategy Selection
- When the attackers cost is less than his
potential gain Apply protections to increase the
attackers cost - When potential loss is substantial Apply design
principals, architectural designs, and technical
and non-technical protections to limit the extent
of the attack, thereby reducing the potential for
loss
126Ongoing Evaluation
- Like most things, the conditions which bring
about the needs for controls do not remain static - The effectiveness of controls will change over
time - The amount of risk incurred by a threat will
change over time - A control may be ineffective or may become no
longer needed over time
127Ongoing Evaluation
- For these reasons it is necessary, on an ongoing
basis to evaluate the effectiveness of controls - It is also necessary to make sure that new
threats are addressed as they arise because the
conditions that give rise to threats are changing
all of the time also
128Categories of Controls
- Four control categories are defined -
- Control function
- Architectural layer
- Strategy layer
- Information security principle
129Control Function
- Controls designed to defend systems are -
- Preventive
- Detective
130Control Function
- Controls designed to defend systems are -
- Preventive
- Stop attempts to exploit a vulnerability
- Implement enforcement of an organizational policy
or security principle - Detective
131Control Function
- Controls designed to defend systems are -
- Preventive
- Detective
- Warn organizations of violations of -
- Security principles
- Organizational policies
- Attempts to exploit vulnerabilities
132Control Function
- Controls designed to defend systems are -
- Preventive
- Detective
- Use techniques like -
- Audit trails
- Intrusion detection
- Configuration monitoring
133Architectural Layer
- Some controls apply to one or more layers of the
organizations technical architecture - Firewalls, for example, operate between the WAN
and LAN of a network
134Architectural Layer
- The layers of an information architecture are
considered to include - - Organizational policy
- External networks
- Extranets
- Intranets
- Network devices
- Systems
- Applications
135Strategy Layer
- Controls are sometimes classified by the risk
control strategy that they are operate within - - Avoidance
- Mitigation
- Transference
136Secure Information
- Controls can also be characterized according to
an accepted characteristic of secure information - A control may enforce the CONFIDENTIALITY of
information. An example of this is SSL - A control may enforce the INTEGRITY of the
information. An example of this is the CRC or
Tripwire - A control may enforce the AVAILABILITY of the
information. An example of this is the use of
redundancy in the network
137Secure Information
- A control may enforce AUTHENTICATION. An example
of this is requiring the user to identify
themselves before access to a critical
information asset is granted - A control may enforce AUTHORIZATION. In this case
the control assures that a specific user has the
rights to access a specific information asset in
a specific way
138Secure Information
- A control may enforce ACCOUNTABILITY. An example
of this is that each and every action taken that
involves an information asset can be attributed
to an employee - A control may enforce PRIVACY. In this case the
control assures that the information asset does
not in any way contain any personally identifying
information.
139Feasibility Studies
- Choosing a strategy involves exploring
- Economic implications
- Non-economic implications
- Answer the question, What are the actual and
perceived advantages to implementing a control as
opposed to the actual and perceived disadvantages
to implementing a control?
140Cost Benefit Analysis
- Determine the economic feasibility of an
implementation - Formal process to document the decision is called
a cost benefit analysis
141Cost of a Control
- Items affecting the cost of a control or
safeguard - Cost of development
- Cost of acquisition
- Cost of implementation
- Install, configure, test hardware, software,
services - Service costs (maintenance and upgrades)
- Cost of maintenance (labor expense)
142Benefit
- Definition
- The value that an organization realizes by using
controls to prevent losses associated with a
specific vulnerability - Determine how much value is at risk for the asset
- A benefit can be expressed as an ANNUALIZED LOSS
EXPECTANCY
143Asset Valuation
- Asset valuation is the process of assigning value
or financial worth to each information asset - There is an argument to be made that it is
impossible to do this - Insurance underwriters do not have valuation
tables for this purpose - Much of the work of valuation of information
asset can draw upon the work that was done during
risk identification process
144Asset Valuation
- Estimate
- Real costs of design and development of
information asset - Perceived cost of design and development of
information asset
145Asset Valuation
- Costs involve valuation of characteristics
including - - Design, development, installation, maintenance,
protection, recovery, defense against loss, and
litigation
146Components of Asset Valuation
- Value retained from the cost of creating the
information asset - Cost to the organization of developing or
collecting the information asset - Example Multimedia based training averages 350
hours of development for each hour of training
time - Average hourly rate for a programmer is 35/hour
12,250 per hour of multimedia development time
147Components of Asset Valuation
- Value retained from past maintenance of the
information asset - The expenditure to maintain the information asset
after it has been developed
148Components of Asset Valuation
- Value implied by the cost of replacing the
information - This is the actual cost of replacing the
information in the event it is lost or
compromised - This calculation includes all costs - human labor
and technical
149Components of Asset Valuation
- Value from providing the information
- This is the cost of actually providing the
information to those who use the information - Costs included here are things like database
capability, networks, and related software systems
150Components of Asset Valuation
- Value incurred from the cost of protecting the
information - This represents a recursive conundrum as we are
trying to calculate the cost of protecting the
information based on the cost of protecting the
information - It is possible to estimate the cost and that
should be used in the valuation
151Components of Asset Valuation
- Value to owners
- This is the value of the actual information asset
- For example if a company mines a database to find
a certain population of individuals that would
desire a product they manufacture, how much is
that data worth?
152Components of Asset Valuation
- Value of intellectual property
- Intellectual property is an even more difficult
type of information asset to value - We wont be able to estimate what a new idea will
be worth - for example, what would a medication
that cures a certain type of cancer be worth to
the patient that has that type of cancer?
153Components of Asset Valuation
- Value to adversaries
- What would it be worth to the competition to know
what your organization was up to? Could another
organization gain a competitive edge? Could it
mean the difference between getting and not
getting a contract?
154Components of Asset Valuation
- Loss of productivity while the information assets
are unavailable - Inside an organization, when information assets
become unavailable this may lead to an inability
to carry out work, which in turns leads to a loss
of productivity, which in turn can have a value
attached to it
155Components of Asset Valuation
- Loss of revenue while information assets are
unavailable - What if a business is unable to process a credit
card transaction and this is the only way you are
able to pay? What do they do? - At this point they will loose their revenue. They
depend on the information asset for revenue and
its unavailability has a direct effect on loss of
revenue
156Coming up with a Value
- Each collection of information must be valued.
The value is based on the following questions - - How much did it cost to create or acquire the
information? - How much would it cost to recreate or recover
this information? - How much does it cost to maintain this
information? - How much is this information worth to the
organization?
157Coming up with a Value
- Each collection of information must be valued.
The value is based on the following questions - - How much is this information worth to the
competition?
158After the assets are valued ...
- The potential loss that could occur from the
exploitation of a vulnerability can begin to be
determined - The questions to be asked at this point include -
- What damage could occur and what financial impact
could it have? - What would it cost to recover from the attack, in
addition to the financial impact of damage? - What is the single loss expectancy for each risk?
159Single Loss Expectancy
- Definition
- A SINGLE LOSS EXPECTANCY (SLE) is the calculation
of the value associated with the most likely loss
from an attack - It is a calcualtion based on the value of the
asset and the EXPOSURE FACTOR (EF) which is the
expected percentage of loss that would occur from
a particular attack as follows
160Single Loss Expectancy
- SLE asset value exposure factor
- Example
- Web site - estimated value 1,000,000
- Defaced by a hacker
- 10 of web site defaced or destroyed
- SLE 1,000,000 .10 100,000
161Probability of Attack
- Extremely difficult to estimate
- Not always references to go to
- Some sources are available for some threat-asset
pairs - Tornado-building
- For this reason the probability of an attack is
usually estimated in a table indicating the
probability for an attack in a given time frame
162Probability of Attack
- Such an estimate is called the ANNUALIZED RATE OF
OCCURANCE (ARO)
163Calculating Loss
- Once an assets value is known the next step is
to determine how much loss is expected from a
single expected attack and how often attacks will
occur - Once these values are determined, the overall
lost potential per risk can be determined - This is usually called the ANNUALIZED LOSS
EXPECTANCY (ALE)
164Calculating Loss
- ALE SLE x ARO
- For the web site we have been using as an
example, since the SLE 100,000 and the ARO
.50, the ALE 50,000 - This means that if nothing is done the company
can be expected to loose 50,000 each year as a
result of web site exploitations
165Calculating CBA
- CBA determines whether or not the control
alternative being evaluated is worth the
associated cost incurred to control the specific
vulnerability
166Calculating CBA
- The CBA is most easily calculated by -
- Using the ALE prior to the implementation of the
proposed control ALE(prior) - Subtract the revised ALE(post) which assumes the
control is in place - Complete the calculation by subtracting the
annualized cost of the safeguard (ACS)
167Calculating CBA
- The CBA is most easily calculated by -
- Summarizing -
- CBA ALE(Prior) - ALE(post) - ACS
168Benchmarking
- Benchmarking is the practice of -
- Seeking out and studying practices in other
organizations - These organizations produce results that you
would like to produce in your own - When selecting other organizations it important
to compare to other LIKE organizations
169Benchmarking
- Once the desired practices are identified an
organization will develop a way to measure how it
is performing - There are two types of measurements that are used
- - Metrics-based
- Performance-based
170Metrics-based
- Comparisons based on numerical standards
- Numbers of successful attacks
- Staff hours spent on system protection
- Dollars spent on protection
- Estimated value in dollars of the information
lost in successful attacks - Loss in productivity hours associated with
successful attacks
171Metrics-based
- The difference between an organizations measures
and those of other is often referred to as a
PERFORMANCE GAP
172Process-based Measures
- Process-based measures are more strategic than
metrics-based approaches - Process-based measures allow an organization to
examine the activities that are necessary to
achieve a goal rather than the specifics of the
goal - The primary focus of process-based measure is
method rather than outcome
173Categories of Benchmarks
- Two categories of benchmarks
- Standards of due care and due diligence
- Best practices
- Within best practices, the GOLD STANDARD is a
subcategory of practices that are considered the
best of the best
174Categories of Benchmarks
- Standard of Due Care
- Organizations adopt levels of security for a
legal defense - Must show they have done what any prudent
organization would do - Insufficient to implement these standards and
then ignore them
175Categories of Benchmarks
- Standard of Due Diligence
- When an organization administers controls at or
above the levels of due care the organization has
shown they are performing at the level of due
diligence - DUE DILEGENCE is the demonstration that the
organization is diligent in ensuring that the
implemented standards continued to provide the
required level of protection
176Applying Best Practices
- When considering the adoption of best practices -
- Does your organization resemble the identified
target organization with the best practice under
consideration? - Are the resources your organization can expend
similar to those identified with the best
practice? - Is your organization in a similar threat
environment as that proposed in the best practice?
177Problems w/ Benchmarking Best Practices
- Biggest problem
- No sharing of experience in the industry
- No reporting of successful attacks since
organizations consider these as failure - Lessons learned are not recorded
178Problems w/ Benchmarking Best Practices
- Another Problem
- No two organizations are identical
- Differences that can exist include -
- Size, composition, management philosophy,
organizational cultures, technological
infrastructures, and budgets for security
179Problems w/ Benchmarking Best Practices
- Problem 3
- Best practices are a moving target
- What worked well two years ago, may be completely
worthless against todays threats - Security practices must be kept up to date
- Methods, techniques, guidelines, policies,
educational and training approaches, and
technologies to combat threats
180Other Feasibility
- Beyond the financial feasibility, there are
several other kinds of feasibility that must be
determined - There are organization, operational, technical,
and political feasibility
181Organizational Feasibility
- Examines how well the proposed information
security alternatives will contribute to the
efficiency, effectiveness, and overall operation
of an organization
182Operational Feasibility
- Addresses user acceptance and support
- Management acceptance and support
- Overall requirements of the organizations
stakeholders - Also known as BEHAVIORAL FEASIBILITY because it
measures the behavior of users
183Technical Feasibility
- Examines whether or not the organization has or
can acquire the technology necessary to implement
and support the control alternatives
184Political Feasibility
- For some organizations the most significant
feasibility evaluated may be political - Within organizations, political feasibility
defines what can and cannot occur based on the
consensus and relationships between the
communities of interest
185Risk Appetite
- Defines the quantity and nature of risk that an
organization is willing to accept as they
evaluate the tradeoffs between perfect security
and unlimited accessibility
186Summary
- The main take away from this chapter should be
that risk plays a significant part of the picture
in any discussion about security - For any organization the determination of risk
involves calculating the value of information and
the kinds of threats the information asset may be
subject to - In addition to this calculation an estimate must
be made of the probability of each type of attack
187Summary
- The cost of instituting a control must be
compared to the potential cost that might be
incurred in the event of a successful attack - In some cases it may not be cost appropriate to
institute a control because the potential loss is
far less than the control cost