CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

Security+ All-In-One Edition Chapter 17 – Risk Management
OCTAVESM Process 4 Create Threat Profiles
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Bridging the gap between software developers and auditors.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Systems Security Information Security & Risk Management.
Introducing Computer and Network Security
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Unit # 3: Information Security and Risk Management
Lecture 8: Risk Management Controlling Risk
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Risk Analysis COEN 250.
Introduction to Network Defense
PRM 702 Project Risk Management Lecture #28
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Information Security Threat Assessment
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Chapter 11: Project Risk Management
EQAA 11th Session Jamil Kalat-Malho Jong Ho Lee
Conostix S.A. Sensible defence.
Security Risk Assessment Applied Risk Management July 2002.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
SEC’s Cybersecurity Risk Alert Part 2 of 3 How-To: Assessing Cybersecurity Risk Thomas J. DeMayo, CISSP, CIPP, CEH, CPT, MCSE Director, IT Audit and Consulting.
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
CREATE THE DIFFERENCE Data and Information (Special thanks to Janet Francis for this presentation)
INFORMATION SECURITY MANAGEMENT L ECTURE 7: R ISK M ANAGEMENT I DENTIFYING AND A SSESSING R ISK You got to be careful if you don’t know where you’re going,
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Question Four: Project Risk Management PMBOK definition of Project Risk Project risk management is the art and science of identifying, analyzing, and responding.
Risk Management CS5493. Risk Management The process of ● identifying, ● assessing, ● prioritizing, and ● mitigating risks.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction to Information Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
CST 481/598 Many thanks to Jeni Li.  Risk matrix or cube  Cost effectiveness analysis  Annualized Loss Expectancy  Multi-Attribute Risk Assessment.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
RISK MANAGEMENT: CONTROLLING RISK IN INFORMATION SECURITY By Collin Donaldson.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Securing Information Systems
Risk management.
Chapter 8 – Administering Security
INFORMATION RISK MANAGEMENT
TOPIC 3 RISK MANAGEMENT.
COMP3357 Managing Cyber Risk
Security Management Practices
Security Threats Severity Analysis
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Cybersecurity Threat Assessment
Basic Security Concepts
Presentation transcript:

CST 481/598 Many thanks to Jeni Li

 Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability of a threat  The probability of a vulnerability  The potential impact  A measurable quantity

o Technical o Information Security o Business o Where measured o How Measured o Who cares – stakeholders regulatory requirements, corporate governance o CIA – Confidentiality, Integrity, Availability

 "An asset is a resource controlled by the enterprise as a result of past events and from which future economic benefits are expected to flow to the enterprise.”  IOW, the stuff that has value to your company and its ability to conduct its business operations

 Information  Customer records  Sales leads  Intellectual property  Business transaction records  Systems  Workstations, servers, network infrastructure  People  Staff, clientele  Products (may be outside our scope)

 The magnitude of a potential loss  The seriousness of an event

 A weakness that provides the opportunity for a threat to occur  Examples  Operating system vulnerabilities  Exploitable Web applications  Staff members susceptible to social engineering  Server room located directly below the bathrooms?

 A possible danger that might exploit a vulnerability  Anything that could cause harm to your assets  May be accidental or intentional

 Accidental  Natural disasters  Earthquake, fire, flood, lightning  True accidents  Unintentional misuse or damage by employees  Other unintended threats  Power grid outage

 Intentional (aka, malicious)  Caused by a threat agent  Examples  Corporate espionage  Terrorist attack  Hacktivism

 An individual or group that will implement the threat. Needs the following factors:  Motivation  Why does the attacker want to attack?  Capability  Skills and resources  Opportunity  Physical or electronic access to the target  Catalyst  Something that causes the attacker to act

 Nation state sponsored  Terrorist  Pressure (activist) group  Commercial organization  Criminal group  Hacker group  Disgruntled insider

 The path or tool used by a threat agent  Examples  Spam, instant messaging, a specific worm  Sniffer, keystroke logger, dumpster diving  Pipe bomb, truck bomb

 Factors that influence the threat agent not to carry out the attack against the target

 Factors that encourage the threat agent to carry out the attack against the target

 Measures taken to eliminate or mitigate risk  Examples  Physical security (e.g., locks, barriers)  Personnel security (e.g., background checks, training)  Procedural security (e.g., policies/other documents)  Technical security (hardware, software)  Must be cost-effective  Sometimes the best control is no control at all

 Identification  Assessment  Treatment plan  Development  Implementation  Review/evaluation

 Assets  Vulnerabilities  Threats  Threat vectors  Threat agents

 Estimate or measure the risk  Can be qualitative or quantitative  Qualitative is good for comparing risks  Quantitative is good for determining ROI

(probability of event) x (impact of event) = risk

 EC: Adequacy of Existing Controls 1 (excellent) to 7 (none)  L: Likelihood of the Risk Occurring 1 (may never occur) to 5 (is expected to occur)  I: Impact/Consequence 1 (minimal to no impact) to 5 (total destruction) Risk = (7*EC + 3*L + 4*I)/84

 Asset value (AV)  Exposure factor (EF)  Single loss expectancy (SLE)  Annualized rate of occurrence (ARO)  Annualized loss expectancy (ALE)

 Asset value: What’s it worth to you?  Tangible and intangible  If we lost this asset, we would lose $...  Exposure factor: How bad would it be?  Percentage of asset loss caused by a threat  0 to 100%  Annualized rate of occurrence  How many times per year could it happen?  Once in 5 years = 1/5

 Single loss expectancy  SLE = AV x EF  Annualized loss expectancy  ALE = ARO x SLE

 ALE before safeguard/control  ALE after safeguard/control  Cost to deploy safeguard/control  ALE b – ALE a – Cost = Value of safeguard  Careful how you define those costs!

 How will you handle each risk?  Avoidance (get out of the business)  Mitigation (apply a safeguard/control)  Retention (live with it)  Transfer (buy insurance)

 Multi-Attribute Risk Assessment,  Security Attribute Evaluation Method  Monte Carlo analysis  CCTA Risk Analysis/Management Method (CRAMM)  Enterprise risk management  … and so on

 Confidentiality  Integrity  Availability  Non-repudiability

 Uses the CIA model  Identify information assets  Build an information criticality matrix  Identify systems  Build a systems criticality matrix  Determine most critical systems  Identify safeguards/controls