MANAGEMENT of INFORMATION SECURITY, Fifth Edition.

Slides:



Advertisements
Similar presentations
Module N° 4 – ICAO SSP framework
Advertisements

Auditing Concepts.
Chapter 5: Asset Classification
Once we know our weaknesses, they cease to do us any harm.
Risk Management: Identifying and Assessing Risk Chapter 4 Once we know our weaknesses, they cease to do us any harm. -- G.C. (GEORG CHRISTOPH) LICHTENBERG.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Principles of Information Security, 2nd Edition1 Risk Management.
Risk Management.
Risk Management Identifying and Assessing Risk
CMPS 319 Risk Management: Identifying and Assessing Risk Chapter 4
Risk Management Chapter 4.
Learning Objectives Upon completion of this material, you should be able to:
Principles of Information Security, Fifth Edition
Risk Management - Security
ITC358 ICT Management and Information Security
SEC835 Database and Web application security Information Security Architecture.
Management of Information Security, 4th Edition
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
An Overview of Risk Management
Risk Management (Risk Identification)
Lecture 32 Risk Management (Cont’d)
TEL2813/IS2820 Security Management Risk Management: Identifying and Assessing Risk Lecture 7 Feb 17, 2005.
MANAGEMENT of INFORMATION SECURITY Second Edition.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 2 Risk Identification and Risk Assessment.
Lecture 31 Risk Management. Introduction Information security departments are created primarily to manage IT risk Managing risk is one of the key responsibilities.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Slide 1 Risk Management: Identifying and Assessing Risk  “ Once we know our weakness, they cease to do us an harm” Greg Lichen.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
MANAGEMENT of INFORMATION SECURITY Third Edition CHAPTER 8 RISK MANAGEMENT: IDENTIFYING AND ASSESSING RISK Once we know our weaknesses, they cease to do.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Alaa Mubaied Risk Management Alaa Mubaied
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
SecSDLC Chapter 2.
Risk Identification and Risk Assessment
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
MANAGEMENT of INFORMATION SECURITY Second Edition.
Chapter 8-1 Chapter 8 Accounting Information Systems Information Technology Auditing Dr. Hisham madi.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Headquarters U.S. Air Force
CS457 Introduction to Information Security Systems
Auditing Concepts.
Project Management Business Management.
Risk management «Once we know our weaknesses, they cease to do us any harm.» G.C. Lichtenberg.
Principles of Information Security, Fifth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 1 The Systems Development Environment
Chapter 8: Performance-Based Strategies
Developing the Overall Audit Plan and Audit Program
Identifying and Assessing Risk
MANAGING HUMAN RESOURCES
Evaluating Existing Systems
DnDAF security views.
Evaluating Existing Systems
Chapter 1 The Systems Development Environment
Risk Management Principles of Information Security, 2nd Edition
Vision Facilitation Template
Risk Management: Principles of risk, Types of risk and Risk strategies
Cyber security Policy development and implementation
Principles of Information Security, Fifth Edition
Project Management Group
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Chapter 13: Project Stakeholder Management
Presentation transcript:

MANAGEMENT of INFORMATION SECURITY, Fifth Edition

Risk Management – Risk Identification 2 Management of Information Security, 5th Edition, © Cengage Learning

Learning Objectives: Upon completion of this chapter you should be able to: – Define risk management and its role in the organization – Describe risk management techniques to identify and prioritize risk factors for information assets – Explain how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur – Discuss the use of the results of the risk identification process 3 Management of Information Security, 5th Edition, © Cengage Learning

INTRODUCTION TO RISK MANAGEMENT Chapter 06: Risk Management: Identifying and Assessing Risk 4 Management of Information Security, 5th Edition, © Cengage Learning

Introduction InfoSec departments exist primarily to manage the risk to information assets stemming from the use of information technology Managing risk is one of the key responsibilities of every manager within the organization Risk Management includes risk identification, risk assessment, risk appetite and risk control 5 Management of Information Security, 5th Edition, © Cengage Learning

Introduction Each manager in the organization should focus on reducing risk, and is often done as follows: – General management must structure the IT and InfoSec functions in ways that will result in the successful defense of the organization’s information assets, including data, hardware, software, procedures, and people – IT management must serve the IT needs of the broader organization and at the same time exploit the special skills and insights of the InfoSec community – InfoSec management must lead the way with skill, professionalism, and flexibility as it works with the other communities of interest to balance the constant trade-offs between InfoSec utility and security 6 Management of Information Security, 5th Edition, © Cengage Learning

Risk Management Therefore I say: One who knows the enemy and knows himself will not be in danger in a hundred battles One who does not know the enemy but knows himself will sometimes win, sometimes lose One who does not know the enemy and does not know himself will be in danger in every battle --Sun Tzu 7 Management of Information Security, 5th Edition, © Cengage Learning

Knowing Yourself When operating any kind of organization, a certain amount of risk is always involved For an organization to manage risk properly, managers should understand how information is collected, processed, stored and transmitted Knowing yourself in this context requires knowing which information assets are valuable to the organization, identifying, categorizing, and classifying those assets, and understanding how they are currently being protected Armed with this knowledge, the organization can then initiate an in-depth risk management program 8 Management of Information Security, 5th Edition, © Cengage Learning

Knowing the Enemy This means identifying, examining, and understanding the threats facing the organization’s information assets Managers must be prepared to fully identify those threats that pose risks to the organization and the security of its information assets Risk management is the process of discovering and assessing the risks to an organization’s operations and determining how those risks can be controlled or mitigated 9 Management of Information Security, 5th Edition, © Cengage Learning

Accountability for Risk Management All of the communities of interest bear responsibility for the management of risks: – InfoSec—Because members of the InfoSec community best understand the threats and attacks that introduce risk, they often take a leadership role in addressing risk. – IT—This group must help to build secure systems and ensure their safe operation – Management and users—When properly trained and kept aware of the threats faced by the organization, this group plays a part in the early detection and response process. Members of this community also ensure that sufficient resources are allocated to the InfoSec and IT groups to meet the security needs of the organization 10 Management of Information Security, 5th Edition, © Cengage Learning

Accountability for Risk Management 11 Management of Information Security, 5th Edition, © Cengage Learning

Risk Identification The Risk Management project should be well organized and funded, with a clear champion, a statement of work, and all needed support. Risk identification begins with the process of self-examination Managers: – Identify the organization’s information assets – Classify and categorize them into useful groups – Prioritize them by overall importance 12 Management of Information Security, 5th Edition, © Cengage Learning

Identification and Prioritization of Information Assets The risk identification process begins with the identification of information assets, including people, procedures, data and information, software, hardware, and networking elements This step should be done without pre-judging the value of each asset; values will be assigned later in the process 13 Management of Information Security, 5th Edition, © Cengage Learning

Organizational Assets Used in Systems 14 Management of Information Security, 5th Edition, © Cengage Learning

Identifying Hardware, Software, and Network Assets Many organizations use asset inventory systems to keep track of their hardware, network, and software components Whether automated or manual, the inventory process requires a certain amount of planning Determine which attributes of each of these information assets should be tracked That will depend on the needs of the organization and its risk management efforts 15 Management of Information Security, 5th Edition, © Cengage Learning

Attributes for Assets When deciding which attributes to track for each information asset, consider the following list of potential attributes: – Name – Asset tag – IP address – MAC address – Asset type – Serial number – Manufacturer name – Manufacturer’s model or part number – Software version, update revision, or FCO number – Physical location – Logical location – Controlling entity 16 Management of Information Security, 5th Edition, © Cengage Learning

Identifying People, Procedures and Data Assets Responsibility for identifying, describing, and evaluating these information assets should be assigned to managers who possess the necessary knowledge, experience, and judgment As these assets are identified, they should be recorded via a reliable data-handling process like the one used for hardware and software 17 Management of Information Security, 5th Edition, © Cengage Learning

Suggested Attributes for People, Procedures, and Data Assets People – Position name/number/ID – Supervisor name/number/ID – Security clearance level – Special skills Procedures – Description – Intended purpose – Software/hardware/networki ng elements to which it is tied – Location where it is stored for reference – Location where it is stored for update purposes Data – Classification – Owner/creator/manager – Size of data structure – Data structure used – Online or offline – Location – Backup procedures 18 Management of Information Security, 5th Edition, © Cengage Learning

Classifying and Categorizing Information Assets Once the initial inventory is assembled, determine whether its asset categories are meaningful to the risk management program Inventory should also reflect sensitivity and security priority assigned to each information asset A data classification scheme categorizes these information assets based on their sensitivity and security needs Each of these categories designates the level of protection needed for a particular information asset Some asset types, such as personnel, may require an alternative classification scheme that would identify the clearance needed to use the asset type Classification categories must be comprehensive and mutually exclusive 19 Management of Information Security, 5th Edition, © Cengage Learning

Assessing Values for Information Assets As each information asset is identified, categorized, and classified, a relative value must be assigned Relative values are comparative judgments made to ensure that the most valuable information assets are given the highest priority, for example: – Which information asset is the most critical to the success of the organization? – Which information asset generates the most revenue? – Which information asset generates the highest profitability? – Which information asset is the most expensive to replace? – Which information asset is the most expensive to protect? – Which information asset’s loss or compromise would be the most embarrassing or cause the greatest liability? 20 Management of Information Security, 5th Edition, © Cengage Learning

Sample Asset Classification Worksheet 21 Management of Information Security, 5th Edition, © Cengage Learning

Prioritizing (Rank Ordering) Information Assets The final step in the risk identification process is to prioritize, or rank order, the assets This goal can be achieved by using a weighted table analysis 22 Management of Information Security, 5th Edition, © Cengage Learning

Weighted Factor Analysis Worksheet 23 Management of Information Security, 5th Edition, © Cengage Learning

Threat Assessment Armed with a properly classified inventory, you can assess potential weaknesses in each information asset—a process known as threat assessment Any organization typically faces a wide variety of threats; if you assume that every threat can and will attack every information asset, then the project scope becomes too complex To make the process less unwieldy, each step in the threat identification and vulnerability identification processes is managed separately and then coordinated at the end 24 Management of Information Security, 5th Edition, © Cengage Learning

Identifying Threats Each threat presents a unique challenge to information security and must be handled with specific controls that directly address the particular threat and the threat agent’s attack strategy Before threats can be assessed in the risk identification process, however, each threat must be further examined to determine its potential to affect the targeted information asset In general, this process is referred to as a threat assessment 25 Management of Information Security, 5th Edition, © Cengage Learning

Threats to Information Security 26 Management of Information Security, 5th Edition, © Cengage Learning

Assessing Threats The following can help you understand the various threats and their potential effects on an information asset Which threats… – present a danger to this organization’s information assets in its current environment? – represent the gravest danger to the organization’s information assets? – have the highest probability of success? – could result in the greatest loss if successful? – is the organization least prepared to handle? – cost the most to protect against? – cost the most to recover from? 27 Management of Information Security, 5th Edition, © Cengage Learning

Assessing Threats 28 Management of Information Security, 5th Edition, © Cengage Learning

Prioritizing Threats Just as it did with information assets, the organization should conduct a weighted table analysis with threats The organization should list the categories of threats it faces, and then select categories that correspond to the questions of interest 29 Management of Information Security, 5th Edition, © Cengage Learning

Vulnerability Assessment Once the organization has identified and prioritized both its information assets and the threats facing those assets it can begin to compare information asset to threats This review leads to the creation of a list of vulnerabilities that remain potential risks to the organization Vulnerabilities are specific avenues that threat agents can exploit to attack an information asset A list should be created for each information asset to document its vulnerability to each possible or likely attack 30 Management of Information Security, 5th Edition, © Cengage Learning

Vulnerability Assessment of a DMZ Router 31 Management of Information Security, 5th Edition, © Cengage Learning

The TVA Worksheet At the end of the risk identification process, an organization should have – a prioritized list of assets and their vulnerabilities and – a prioritized list of threats facing the The prioritized lists of assets and threats can be combined into a Threats-Vulnerabilities-Assets (TVA) worksheet, in preparation for the addition of vulnerability and control information during risk assessment 32 Management of Information Security, 5th Edition, © Cengage Learning

Sample TVA Spreadsheet 33 Management of Information Security, 5th Edition, © Cengage Learning