Unit Iii
Unit Iii
Prepared By:
Mr. S.BALAJI, AP/CSE
UNIT- III
SECURITY ANALYSIS: Risk Management: Identifying and Assessing Risk -
Assessing and Controlling Risk - Trends in Information Risk Management -
Managing Risk in an Intranet Environment.
The various components of risk management and their relationship to each other are
shown in Figure.
Consider for a moment the similarities between information security and warfare.
Information security managers and technicians are the defenders of information. Defenses
are built in layers, by placing safeguard upon safeguard. The defenders attempt to prevent,
protect, detect, and recover from a seemingly endless series of attacks. Moreover, those
defenders are legally prohibited from deploying offensive tactics, so the attackers have no
need to expend resources on defense. In order to be victorious, you, a defender, must know
yourself and know the enemy.
Know Yourself
First, you must identify, examine, and understand the information and systems currently
in place within your organization. This is self-evident. To protect assets, which are defined
here as information and the systems that use, store, and transmit information, you must
know what they are, how they add value to the organization, and to which vulnerabilities
they are susceptible. Once you know what you have, you can identify what you are already
doing to protect it. Just because a control is in place does not necessarily mean that the
asset is protected. Frequently, organizations implement control mechanisms but then
neglect the necessary periodic review, revision, and maintenance. The policies, education
and training programs, and technologies that protect information must be carefully
maintained and administered to ensure that they remain effective.
the threats facing the organization. You must determine which threat aspects most directly
affect the security of the organization and its information assets, and then use this
information to create a list of threats, each one ranked according to the importance of the
information assets that it threatens.
Management must also ensure that sufficient resources (money and personnel) are
allocated to the information security and information technology groups to meet the
security needs of the organization. Users work with the systems and the data and are
therefore well positioned to understand the value these information assets offer the
organization and which assets among the many in use are the most valuable. The
information technology community of interest must build secure systems and operate them
safely. For example, IT operations ensure good backups to control the risk from hard drive
failures. The IT community can provide both valuation and threat perspectives to
management during the risk management process.
All of the communities of interest must work together to address all levels of risk,
which range from disasters that can devastate the whole organization to the smallest
employee mistakes.
The three communities of interest are also responsible for the following:
Evaluating the risk controls
Determining which control options are cost effective for the organization
Acquiring or installing the needed controls
Ensuring that the controls remain effective
It is essential that all three communities of interest conduct periodic management reviews.
The first focus of management review is asset inventory. On a regular basis,
management must verify the completeness and accuracy of the asset inventory. In addition,
organizations must review and verify the threats to and vulnerabilities in the asset
INFORMATION SECURITY Page|4
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
inventory, as well as the current controls and mitigation strategies. They must also review
the cost effectiveness of each control and revisit the decisions on deployment of controls.
Furthermore, managers at all levels must regularly verify the ongoing effectiveness of every
control deployed.
For example, a sales manager might assess control procedures by walking through
the office before the workday starts, picking up all the papers from every desk in the sales
department. When the workers show up, the manager could inform them that a fire had
been simulated and all of their papers destroyed, and that each worker must now follow the
disaster recovery procedures to assess the effectiveness of the procedures and suggest
corrections.
RISK IDENTIFICATION
A risk management strategy calls on us to “know ourselves” by identifying,
classifying, and prioritizing the organization’s information assets.
These assets are the targets of various threats and threat agents and our goal is to
protect them from these threats.
Next comes threat identification:
– Assess the circumstances and setting of each information asset.
– Identify the vulnerabilities and begin exploring the controls that might be used
to manage the risks.
– Intended purpose
– What elements is it tied to
– Where is it stored for reference
– Where is it stored for update purposes
inventory listing must be kept current, often by means of a tool that periodically refreshes
the data.
When you move to the later steps of risk management, which involve calculations of
loss and projections of costs, the case for the use of automated risk management tools for
tracking information assets becomes stronger. At this point in the process, however, simple
word processing, spreadsheet, and database tools can provide adequate record keeping.
e) Security Clearances
The other side of the data classification scheme is the personnel security clearance
structure.
Each user of data in the organization is assigned a single level of authorization
indicating the level of classification.
Before an individual is allowed access to a specific set of data, he or she must meet
the need-to-know requirement.
This extra level of protection ensures that the confidentiality of information is
properly maintained.
Clean desk policies require all information to be stored in its appropriate storage
container at the end of each day.
Proper care should be taken to destroy any unneeded copies.
Dumpster diving can prove embarrassing to the organization.
g) Threat Identification
Each of the threats identified so far has the potential to attack any of the assets
protected.
This will quickly become more complex and overwhelm the ability to plan.
To make this part of the process manageable, each step in the threat identification and
vulnerability identification process is managed separately, and then coordinated at the
end of the process.
INFORMATION SECURITY P a g e | 11
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
i) Vulnerability Identification
Examine how each of the threats that are possible or likely could be perpetrated and
list the organization’s assets and their vulnerabilities
The process works best when groups of people with diverse backgrounds within the
organization work iteratively in a series of brainstorming sessions
At the end of the process, an information asset / vulnerability list has been developed
– this list is the starting point for the next step, risk assessment
RISK ASSESSMENT
Now that you have identified the organization’s information assets and the threats
and vulnerabilities,
you can evaluate the relative risk for each of the vulnerabilities. This process is called risk
assessment.
Risk assessment assigns a risk rating or score to each information asset. While this number
does not mean anything in absolute terms, it is useful in gauging the relative risk to each
vulnerable information asset and facilitates the development of comparative ratings later in
the risk control process.
In preparing this list we have collected and preserved factual information about the
assets, the threats they face, and the vulnerabilities they experience.
We should also have collected some information about the controls that are already in
place.
Risk Identification Estimate Factors
– Likelihood
– Value of Information Assets
– Percent of Risk Mitigated
– Uncertainty
Likelihood
Likelihood is the probability that a specific vulnerability will be the object of a
successful attack. In risk assessment, you assign a numeric value to likelihood.
Many asset/vulnerability combinations have sources for likelihood, for example:
The likelihood of a fire has been estimated actuarially for each type of structure.
The likelihood that any given e-mail contains a virus or worm has been researched.
The number of network attacks can be forecast based on how many assigned network
addresses the organization has.
Risk Determination
For the purpose of relative risk assessment:
risk = (value (or impact) of information asset ´ likelihood of vulnerability
occurrence) ´ (100% - percentage of risk already controlled + an element of
uncertainty)
INFORMATION SECURITY P a g e | 13
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
Residual risk is the risk that remains to the information asset even after the existing
control has been applied.
There are three general categories of controls: policies, programs, and
technologies.
Policies are documents that specify an organization’s approach to security.
There are four types of security policies:
general security policies,
program security policies,
issue-specific policies,
systems-specific policies.
Access Controls
Access controls are used to determine if and how to admit a user into a trusted area of
the organization. These areas can include information systems, physically restricted
areas such as computer rooms and the organization in its entirety.
Access controls usually consist of a combination of policies, program and technologies.
There are a number of approaches to controlling access
– Access controls can be mandatory, discretionary or nondiscretionary.
Lattice-based Control
Another type of nondiscretionary access is lattice-based control, where a lattice
structure (or matrix) is created containing subjects and objects, and the boundaries
associated with each pair is contained.
This specifies the level of access each subject has to each object.
In a lattice-based control the column of attributes associated with a particular object are
referred to as an access control list or ACL.
INFORMATION SECURITY P a g e | 14
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
The row of attributes associated with a particular subject (such as a user) is referred to
as a capabilities table.
Four basic strategies are used to control the risks that result from vulnerabilities:
– Apply safeguards (avoidance)
– Transfer the risk (transference)
– Reduce the impact (mitigation)
– Inform themselves of all of the consequences and accept the risk without control or
mitigation (acceptance)
Avoidance
Avoidance attempts to prevent the exploitation of the vulnerability.
This is the preferred approach, as it seeks to avoid risk in its entirety rather than
dealing with it after it has been realized.
Accomplished through countering threats, removing vulnerabilities in assets, limiting
access to assets, and/or adding protective safeguards.
Three areas of control:
– Application of policy
– Training and education
– Application of technology
Transference
Transference is the control approach that attempts to shift the risk to other assets, other
processes, or other organizations.
If an organization does not already have quality security management and
administration experience, it should hire individuals or firms that provide such expertise.
This allows the organization to transfer the risk associated with the management of
these complex systems to another organization with established experience in dealing
with those risks.
Mitigation
Mitigation attempts to reduce the impact of exploitation through planning and
preparation.
Three types of plans:
– disaster recovery planning (DRP)
– business continuity planning (BCP)
– incident response planning (IRP)
The most common of the mitigation procedures is the disaster recovery plan or DRP.
INFORMATION SECURITY P a g e | 16
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
The actions to take while the incident is in progress are defined in the incident response
plan or IRP.
Longer term issues are handled in the business continuity plan or BCP.
Acceptance
Acceptance of risk is doing nothing to close a vulnerability and to accept the outcome of
its exploitation.
Acceptance is valid only when:
– Determined the level of risk
– Assessed the probability of attack
– Estimated the potential damage
– Performed a thorough cost benefit analysis
– Evaluated controls using each appropriate feasibility
– Decided that the particular function, service, information, or asset did not
justify the cost of protection
Risk appetite describes the degree to which an organization is willing to accept risk as a
trade-off to the expense of applying controls.
Selecting a Risk Control Strategy
Risk control involves selecting one of the five risk control strategies for each
vulnerability. The flowchart in Figure guides you through the process of deciding how to
proceed with one of the five strategies.
INFORMATION SECURITY P a g e | 17
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
Categories of controls
Controlling risk through avoidance, mitigation, or transference may be accomplished
by implementing controls or safeguards.
One approach to selecting controls is by category:
– Control Function
– Architectural Layer
– Strategy Layer
– Information Security Principles
INFORMATION SECURITY P a g e | 18
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
Control Function
Controls or safeguards designed to defend the vulnerability are either preventive or
detective.
Preventive controls stop attempts to exploit vulnerability by implementing enforcement
of an organizational policy or a security principle, such as authentication or
confidentiality.
Detective controls warn of violations of security principles, organizational policies, or
attempts to exploit vulnerabilities.
Detective controls use techniques such as audit trails, intrusion detection, or
configuration monitoring.
Architectural Layer
Some controls apply to one or more layers of an organization’s technical architecture.
Among the architectural layer designators in common use are:
– organizational policy
– external networks
– extranets (or demilitarized zones)
– Intranets (WAN and LAN)
– network devices that interface network zones (switches, routers, firewalls, and
hubs)
– systems (computers for mainframe, server or desktop use)
– applications
Strategy Layer
Controls are sometimes classified by the risk control strategy they operate within:
– avoidance
– mitigation
– transference
– Accountability
– Privacy
CBA: Benefits
Benefit is the value that the organization recognizes by using controls to prevent losses
associated with a specific vulnerability.
This is usually determined by valuing the information asset or assets exposed by the
vulnerability and then determining how much of that value is at risk.
Asset valuation is the process of assigning financial value or worth to each information
asset.
The valuation of assets involves estimation of real and perceived costs associated with
the design, development, installation, maintenance, protection, recovery, and defense
against market loss and litigation.
These estimates are calculated for each set of information bearing systems or
information assets.
There are many components to asset valuation.
CBA: Formula
CBA is whether or not the control alternative being evaluated is worth the associated
cost incurred to control the specific vulnerability.
While many CBA techniques exist, for our purposes, the CBA is most easily calculated
using the ALE from earlier assessments.
CBA = ALE(prior) – ALE(post) – ACS
Where:
– ALE prior is the Annualized Loss Expectancy of the risk before the implementation
of the control.
INFORMATION SECURITY P a g e | 21
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
– ALE post is the ALE examined after the control has been in place for a period of
time.
– ACS is the Annual Cost of the Safeguard.
INFORMATION SECURITY P a g e | 22
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
INFORMATION SECURITY P a g e | 23
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
Operational Feasibility
Addresses user acceptance and support, management acceptance and support, and the
overall requirements of the organization’s stakeholders.
Sometimes known as behavioral feasibility, because it measures the behavior of users.
One of the fundamental principles of systems development is obtaining user buy-in on a
project and one of the most common methods for obtaining user acceptance and support
is through user involvement obtained through three simple steps:
– Communicate
– Educate
– Involve
Technical Feasibility
The project team must also consider the technical feasibilities associated with the
design, implementation, and management of controls.
INFORMATION SECURITY P a g e | 24
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
Examines whether or not the organization has or can acquire the technology necessary
to implement and support the control alternatives.
Political Feasibility
For some organizations, the most significant feasibility evaluated may be political.
Within organizations, political feasibility defines what can and cannot occur based on the
consensus and relationships between the communities of interest.
The limits placed on an organization’s actions or behaviors by the information security
controls must fit within the realm of the possible before they can be effectively
implemented, and that realm includes the availability of staff resources.
INFORMATION SECURITY P a g e | 25
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
INFORMATION SECURITY P a g e | 26
DEPARTMENT OF CSE
MANAKULA VINAYAGAR INSTITUTE OF TECHNOLOGY
INFORMATION SECURITY P a g e | 27
DEPARTMENT OF CSE