Title: Information Systems Risk Analysis and Management
1Information Systems Risk Analysis and Management
- Spyros Kokolakis
- University of the Aegean
- IPICS 2005, Chios, 18-29 July 2005
2Much about technology
- Information and Communication Technologies
Security - Networks
- Wireless
- Databases
- Internet
- Smart cards
- Keys
- Cryptography
- Intrusion detection
- ..
3Real world
4IS or ICT Security?
- Information and Communication Technologies
Security - Confidentiality, Integrity, Availability etc.
- Information System
- An Information System comprises five
interdependent elements hardware, software,
data, procedures, and people. These elements
interact for the purpose of processing data and
delivering information. - An IS exists to serve an enterprise or
organization and, consequently, it may only be
studied in the context of the organization it
serves.
5Information Systems overview
6How to fit security in the picture
- Having people as part of the system we can forget
any simple solutions. - IS security has no strict definition
- Security is a kind of feeling
- Are you secure? or Do you feel secure?
Whats the right question?
7Example Airport security
8List of possible measures
- Scissors etc. not allowed
- ID check (photo ID must be presented)
- Only the person named on the ticket can travel
- X-rays
- Lighters are not allowed anywhere in the airport
(its time to quit smoking) - Biometrics
- Boot your laptop to see if it has a battery
- Lock the captains cabin
- Armed guards on board
- Interview all passengers before boarding
9In such a complex environment
- Total security is out of the question
- Peoples behaviour is unpredictable
- We cannot account for all possible threats and we
cannot detect all vulnerabilities. - Security costs money and also time, people and
other resources. - So, what shall we do?
10Risk analysis management
- We need to employ methods that will allow us to
measure the risk associated with the operation of
an IS, in order to take measures analogous to the
level of risk. - We need risk analysis and management methods
11What is Risk and how to measure it
- Risk is determined by the following factors
- Assets (A)
- Impact (I)
- Threats (T)
- Vulnerabilities (V)
R f(A, I, T, V)
12Assets, Impacts, Threats Vulnerabilities
- Assets what needs protection
- Business impact is the outcome of a failure to
protect the assets of the IS. - Threat is any action or event that may cause
damage to an Information System. - Vulnerability is a characteristic of the IS that
may allow a threat to succeed.
13Conceptualisation of IS Sec
14Risk analysis management
15Risk management methods
- There are more than 100 methods
- CRAMM
- MARION
- SBA
- OCTAVE
16SBA (Security By Analysis)
- Developed in Sweden in the early 80s
- Very popular in Sweden and other Scandinavian
countries - Focus on people
- People involved in every day operations have a
better chance to identify problems - A set of methods
- SBA check
- SBA scenario
17CRAMM
- CCTA Risk Analysis and Management Method
- Developed in the UK in the late 80s
- Used in many countries it has been applied in
many hundreds of cases - It includes a countermeasures library
18CRAMM overview
- Stage 1 Initiation and asset valuation
- Model the IS Valuate the assets Management
review - Stage 2 Risk assessment
- Identify threats Assess threats and
vulnerabilities Calculate risks Management
review - Stage 3 Risk management
- Select countermeasures Prioritise
countermeasures and schedule implementation
Obtain management approval Monitor
19Octave
Operationally Critical Threat, Asset, and
Vulnerability Evaluation
20What is OCTAVE?
- A comprehensive, repeatable methodology for
identifying risks in networked systems through
organizational self-assessment. - Helps organizations apply information security
risk management to secure their existing
information infrastructure and to protect their
critical information assets.
21Goal of OCTAVE
- Plan how to apply good security practices to
address organizational and technical
vulnerabilities that could impact critical assets - Two versions One for large organisations (gt 300
employees) and one for small organisations - Organizational issues
- Policies or security practices
- Technical issues
- Technology infrastructure
22Information Security Risk Management Framework
23Mind the gap
- Security Practices Gaps Result From an
Organizational Communication Gap
24Octave is the bridge
- OCTAVE is an Organizational Approach to Security
Risk Management
25The process
26OCTAVE Analysis Team
- An interdisciplinary team (4-6)
- consisting of
- business or mission-related staff
- information technology staff
27(No Transcript)
28Phase 1 Organizational View
- Data gathering of the organizational perspectives
on - assets
- threats to the assets
- security requirements of the assets
- current protection strategy practices
- organizational vulnerabilities
- The perspectives will come from
- senior managers
- operational area managers (including IT)
- staff (from the operational areas and IT)
29Phase 1 Questions
- What are your organizations critical
information-related assets? - What is important about each critical asset?
- Who or what threatens each critical asset?
- What is your organization currently doing to
protect its critical assets? - What weaknesses in policy and practice currently
exist in your organization?
30Asset
- Something of value to the organization that
includes one or more of the following - information
- systems
- services and applications
- people
- Critical when there will be a large adverse
impact to the organization if - the asset is disclosed to unauthorized people.
- the asset is modified without authorization.
- the asset is lost or destroyed.
- access to the asset is interrupted.
31Asset protection requirements
- Prioritize the qualities of an asset that are
important to the organization - confidentiality
- integrity
- availability
- Example for availability Internet access should
be provided 24x7x365, 97 of the time.
32Threat
- An indication of a potential undesirable event
involving a critical asset - Examples
- A disappointed student could set a fire.
- A virus could interrupt access to the university
network. - An operator may set the firewall to deny all
access without noticing
33Threat Properties
- Critical Asset
- Actor (human, system, other)
- Motive (deliberate or accidental) human actor
only - Access (network or physical) human actor only
- Outcome
- Disclosure or viewing of sensitive information
- Modification of important or sensitive
information - Destruction or loss of important information,
hardware, or software - Interruption of access to important information,
software, applications, or services
34Asset-based risk profile
35(No Transcript)
36Phase 2 Technology View
- Identify technology vulnerabilities that provide
opportunities for impacting critical assets
37Methods / Tools
- You can use a variety of methods and tools
- Interviews with people
- Documentation analysis
- Network scanners
- Log analysers
- Vulnerability assessment tools
- etc.
38Phase 2 Questions
- How do people access each critical asset?
- What infrastructure components are related to
each critical asset? - What technological weaknesses expose your
critical assets to threats?
39(No Transcript)
40Phase 3 Risk Analysis
- Establish the risks to the organizations
critical assets. - Define mitigation plans to protect the critical
assets. - Characterize the organizations protection
strategy. - Identify the next steps to take after the
evaluation to ensure progress is made.
41Impact Evaluation Criteria
- Define the organizations tolerance for risk.
- Standard areas of impact considered include
- reputation/customer confidence
- life/health of customers
- productivity
- fines/legal penalties
- financial
- other
42Expression of Risk
- A risk is expressed using
- a threat scenario (a branch on a threat tree)
- the resulting impact on the organization
- Example
- Viruses can interrupt staff members from
accessing the network. They will not prepare
their lectures on time. - Impact value medium
43Threat scenario
44Phase 3 Questions
- What is the potential impact on your organization
due to each threat? What are your organizations
risks? - Which are the highest priority risks to your
organization? - What policies and practices does your
organization need to address? - What actions can your organization take to
mitigate its highest priority risks? - Which technological weaknesses need to be
addressed immediately?
45Outputs of Octave
46Protection Strategy
- Structured around the catalog of practices and
addresses the following areas - Security Awareness and Training
- Security Strategy
- Security Management
- Security Policies and Regulations
- Collaborative Security Management
- Contingency Planning/Disaster Recovery
- Physical Security
- Information Technology Security
- Staff Security
47Mitigation Plan
- Defines the activities required to remove or
reduce unacceptable risk to a critical asset. - Focus is on activities to
- recognize or detect threats when they occur
- resist or prevent threats from occurring
- recover from threats if they occur
- Mitigations that cross many critical assets might
be more cost effective as protection strategies
48OCTAVE-S
- Defines a more structured method for evaluating
risks in small (less than 100 employees) or
simple organizations - requires less security expertise in analysis team
- requires analysis team to have a full, or nearly
full, understanding of the organization and what
is important - uses fill-in-the-blank as opposed to essay
style - Will also be defined with procedures, guidance,
worksheets, information catalogs, and training
49OCTAVE Information
- Visit http//www.cert.org/octave
- Introduction to the OCTAVE Approach
- OCTAVE Method Implementation Guide
- OCTAVE-S (version 0.9)
- Book Managing Information Security Risks The
OCTAVE Approach by Christopher Alberts and Audrey
Dorofee from Addison-Wesley.