0% found this document useful (0 votes)
38 views11 pages

Crisis Lec1

Crisis

Uploaded by

Khaled Mizar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views11 pages

Crisis Lec1

Crisis

Uploaded by

Khaled Mizar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Crisis management and disaster recovery Course

Course Description:
This course addresses how risk, threats and vulnerabilities impact information
systems in the context of risk management. Topics include methods of assessing,
analyzing and managing risks, defining an acceptable level of risk for information
systems, and identifying elements of a business impact analysis, a business continuity
plan and a disaster recovery plan.

Course Summary
Major Instructional Areas
1. Risk management basics
2. Risk assessment plan
3. Risk mitigation plan
4. Cost and benefit analysis
5. Business continuity plan
6. Disaster recovery plan
Course Objectives
1. Explain the basic concepts of and need for risk management.
2. Identify compliancy laws, standards, best practices, and policies of risk
management.
3. Describe the components of an effective organizational risk management
program.
4. Describe techniques for identifying relevant threats, vulnerabilities, and
exploits.
5. Identify risk mitigation security controls.
6. Describe concepts for implementing risk mitigation throughout an organization
.7. Perform a business impact analysis for a provided scenario.
8. Create a business continuity plan (BCP) based on the findings of a given risk
assessment for an organization.
9. Create a disaster recovery plan (DRP) based on the findings of a given risk
assessment for an organization.
10. Create a Computer Incident Response Team (CIRT) plan for an organization
in a given scenario
Lec1: An Overview of Information Security and Risk
Management

Objectives:

This lesson presents an overview IS security concept. and how they


relate to plans for handling incidents and disasters. Objectives
important to this lesson:

1. Risk management
2. Contingency planning
3. Relating security policy to contingency planning

Concepts:

Chapter 1

Contingency planning as being the process that makes us prepared for incidents and
disasters related to our organization's IT assets. We are given a few examples of historic
incidents and a statistic that makes a good point. The author tells us that "80% of
businesses affected by a disaster either never reopen or close within 18 months of the
event". These are organizations that either had no disaster plans, or they had plans that
were inadequate for the disasters they encountered.

Frist, we need to know serval terms. Many should be familiar to you.

• Information Security - protection of information and the systems that collect, store,
disperse, and use it

The classic CIA concept defines security from the point of view of the IT Security staff

• Confidentiality - information should only be accessible to users who have been


granted access to it for valid reasons. Only authorized users can access data if it is
protected properly, and if authorized users do not violate security policy.
• Integrity - data may not be changed except by authorized users or processes. This
means that data must be protected from alteration, deletion, or other changes to its
intended form.
• Availability - authorized users can access data when they need to do so.
Availability includes the idea that proper access methods are provided to only to
authorized users, not to everyone.

The classic CIA concept defines security from the point of view of the IT Security staff.
The text should explain that an expansion of this concept is called by several names, one
being the McCumber Cube, another being the CNSS Security model. This is the name
used in the text. It provides three different perspectives on security, which should be
considered together to make better security decisions:

• IT Security perspective: Confidentiality, Integrity, Availability


How do we protect the information, make sure it is not tampered with, and provide
access to those who need it?
• IT Operations perspective: Storage, Processing, Transmission
How do we perform the basic IT functions of storing, processing, and transmitting
data? Are our processes secure?
• Business perspective: Policy, Education, Technology
How do we make the rules for employees about protecting information, educate
our staff about protecting it, and use the technology we have to run our business
safely?

We need to know more terms:

• Threat - a potential form of loss or damage; many threats are only potential
threats, but we plan for them because they might happen
• Threat agent - a vector for the threat, a way for the threat to occur; could be a
person, an event, or a program running an attack
• Vulnerability - a weak spot where an attack is more likely to succeed
• Exploit - a method of attack
• Control - A process that we put in place
to reduce the impact and/or probability of a risk. The author mentions that a
control can also be called a safeguard or a countermeasure.

7 Types of Cyber Security Threats

Cyber security professionals should have an in-depth understanding of the following types
of cyber security threats.

1. Malware

Malware is malicious software such as spyware, ransomware, viruses and worms. Malware
is activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can: Block access to key
network components (ransomware) Install additional harmful software Covertly obtain
information by transmitting data from the hard drive (spyware) Disrupt individual parts,
making the system inoperable

2. Emotet

The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an
advanced, modular banking Trojan that primarily functions as a downloader or dropper of
other banking Trojans. Emotet continues to be among the most costly and destructive
malware.”

3. Denial of Service

A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it


can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack
originates from a computer network. Cyber attackers often use a flood attack to disrupt the
“handshake” process and carry out a DoS. Several other techniques may be used, and
some cyber attackers use the time that a network is disabled to launch other attacks. A
botnet is a type of DDoS in which millions of systems can be infected with malware and
controlled by a hacker, according to Jeff Melnick of Netwrix, an information technology
security software company. Botnets, sometimes called zombie systems, target and
overwhelm a target’s processing capabilities. Botnets are in different geographic locations
and hard to trace.

4. Man in the Middle

A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party
transaction. After interrupting the traffic, they can filter and steal data, according to Cisco.
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers
insert themselves between the visitor and the network, and then use malware to install
software and use data maliciously.

5. Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into
opening it and carrying out the instructions inside, such as providing a credit card number.
“The goal is to steal sensitive data like credit card and login information or to install
malware on the victim’s machine,” Cisco reports.

6. SQL Injection

A Structured Query Language (SQL) injection is a type of cyber-attack that results from
inserting malicious code into a server that uses SQL. When infected, the server releases
information. Submitting the malicious code can be as simple as entering it into a vulnerable
website search box.

7. Password Attacks

With the right password, a cyber attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber
attackers use that relies heavily on human interaction and often involves tricking people
into breaking standard security practices.” Other types of password attacks include
accessing a password database or outright guessing

the graphic on the following page gives us a nice overview of a workable process for
managing risk.

• In the first phase, we identify risks, by inventorying and classifying all


our assets, and then identifying the threats that apply to those assets, and
the vulnerabilities those threats could use against us.
• The second phase takes us to the selection of appropriate controls,
and justification of their cost and value to decision makers in our organization.
The chapter continues with an expansion on each of the topics in the graphic.

• Know something about the big picture - Who and what are we protecting, from
whom and what. To know details about these subjects, do everything on the green
chart.
• Identify, classify, and assign values to assets - To know our exposure to risk, we
have to know what we have and how it is exposed. Assets can be classified by their
level of secrecy, their value to the organization, their need to be protected, or by
combinations of these factors as well as others.

In the information assets. Each is given a rating (from 0 to 1) on each of three


measures of how a compromise of that asset would affect the company. The three
measures in this case are impact on revenue, impact on profitability, and impact
on image. Assuming these are the most important impacts our organization cares
about; each is given a relative percentage score. In the example, the organization
cares 30% about revenue, 40% about profitability, and 30% about image. That is
the criterion weight. For each asset, its score for a given criterion is multiplied by
that criterion's weight, producing three weighted criterion scores for each asset. The
asset's total weighted score is the sum of its three weighted criterion scores. For
instance, the first asset has a score of .8 for revenue (weighted criterion score is .8
times 30 = 24), .9 for profitability (weighted criterion score is .9 times 40 = 36), and
.5 for image (weighted criterion score is .5 times 30 = 15), so its total weighted
score for the comparison is 75. Compare that score to the other lines, and you see
that this asset is the third most important asset in this comparison. Warning:
do not compare scores from one table to another unless they use the same criteria
and the same weights.

The text provides another example of rating assets, based on a military scale that
uses four levels for secrecy. A scale like this may be more useful for assets that do
not have a particular effect on the organization unless they are compromised.
• Threats must be identified, and matched with assets affected by them. Not all
threats will affect all assets.
• Assets must be examined again, with respect to the threats that could affect them.
How vulnerable is each asset to each of its possible threats?

Assuming you have followed the steps so far, there is an important calculation to do.

• Each asset needs to be given a value, based on its replacement cost,


its current value to the organization, or the value of the income it generates. Pick
one of those or some other value you care about. This is the Asset Value. Let's
choose $100 as an example for Asset Value.

• Next, we need to determine, for each exploit, what the probable loss would be if
that exploit occurs successfully. Would we lose the entire asset? Half of it?
Some other percentage? Which percentage we pick tells us the Exposure
Factor of a single occurrence of that exploit for this asset. Let's choose 50% as an
example for Exposure Factor.

• We are still not where we want to be. Asset Value times Exposure Factor equals
the Single Loss Expectancy. This is the Impact if the event occurs. In this
example, it is $50.

• Now, we still need the Likelihood the event will occur. The classic way to do this is
to consult your staff about the frequency of successful attacks of this type, or to
consult figures from vendors like Symantec, McAfee, or Sophos about expected
attack rates for your industry or environment. Let's assume we have done that, and
we are confident that we expect 10 successful attacks per year in our example. This
is the Annualized Rate of Occurrence.

• Taking the numbers we have so far, we should multiply the Annualized Rate of
Occurrence times the Single Loss Expectancy, which will give us the Annualized
Loss Expectancy for this asset from this kind of attack. This corresponds to
the Risk Exposure. In the example we are considering, that amounts to $500.
All that work led us to just one loss expectancy for one asset from one kind of attack. That
gives you an idea of the work involved in calculating the numbers for each asset, each
asset vulnerability, and each kind of attack on those vulnerabilities.

The next idea is to identify controls that can reduce or eliminate our risk. The text mentions
five control strategies that are often considered. The terms are a little different from some
other texts:

• Defense - also called Avoidance, this means to use policies, training, and
technology to avoid the situations that can be exploited.
• Transferal - this means to hire expertise when you do not have it, or to pay a fee
to another department or organization that is in the business of managing risk
• Mitigation - this means to reduce the damage that will be done in a successful
attack, such as not putting all assets of a given type in the same place, protected by
the same defenses.
• Acceptance - this is when you decide that a risk is not as costly to us as the
controls that might be used to avoid or mitigate that risk.
• Termination - this means that we decide to stop doing the things that put us at risk;
we simply stop doing the things that use or produce the assets that a risk applies to.

So, what do we do if we know that there are risks, and that we can't protect ourselves from
all of them? The text introduces four topics from the next several chapters.

Business impact analysis - This process is used to determine the effect that successful
attacks would have on our organization. We determine what could happen, what the effects
of that event would be, and what state the organization's functions would be in at that time.

Incident response plan - For known incident types, given the BIA done in the section
above, what should we do to handle the incident? Who do we call? How do we stop the
attack and it effects? This plan is about handling the incident.

Business continuity plan - How do we continue business when we have an incident? Do


we change our procedures? Do we use alternate locations or resources to continue
business? How do we continue providing products or services when part of our
organization has been damaged, compromised, disabled, or destroyed? Business
continuity plans discuss keeping the business in business during the incident.

Disaster recovery plan - A disaster has occurred. How do we get back to normal, or what
will be the new normal? The incident(s) has/have been handled. What do we do to return to
our undamaged state, stronger and wiser than we were before?
All four of the major topics above are part of Contingency Planning, what we do when we
know things can go wrong. The level of detail in each of the plans will be determined by the
size and complexity of the organization making that plan.

This section introduces the components you might find in a very detailed policy. It
begins with some definitions:

A policy is a rule, or a set of rules, that affects how we want our organization and
its employees to function. The idea behind a policy may start with a principle, which is
often a broad, general statement of what we believe to be right, true, or beneficial. A
policy is more detailed, and more specific about what we expect our people to do. Related
concepts:

• Principle - a general statement about what we believe or require in our area of


authority (we will use only two computer vendors at a time); what we expect
• Policy - rules about the conduct of our organization with regard to particular actions
(we will limit ourselves to particular models chosen by the IT department); how we
will approach the expectation
• Standard - a method or process that may be procedural or technical (orders are to
be placed by approved requesters within each work area); what steps are to be
followed to assure general compliance with policy
• Procedure - a detailed set of steps to follow to be in compliance (requests are to be
made to your manager, who will forward approved requests to your authorized
requester); variations or limitations that apply to specific work areas, to be followed
if they apply to your area
• Guideline - a suggested addition to any of the items above that is recommended
but optional (submit your requests two weeks before the end of a quarter to allow
processing time); do this to make it work better

The outline of the parts of a policy.

1. Statement of the policy - what it is, where it applies, and who has to do what
2. Authorized access - who is and is not allowed to use equipment or software related
to the policy, and what is private about any related data
3. Prohibited use - a graduated scale of offenses and discipline to be applied for
violations of various types
4. System management - who runs it, who watches it, how it is to be protected,
secured, and/or encrypted
5. Violations of policy - a graduated scale of offenses and discipline to be applied for
violations of various types of the policy itself
6. Policy review and modification - how often the review will take place, who will do it,
and the process to change or remove the policy
7. Limitations of liability - standard lawyer section

You might also like