Stephen S. Yau CSE , Fall Risk Management
Stephen S. Yau CSE , Fall What is a risk? Information System At Risk Threat (attacker) Vulnerability Concepts revisit –A threat is a potential occurrence that can have an undesirable effect on the system assets or resources –A vulnerability is a weakness that makes a threat to possibly occur A risk is a possible future negative event that may affect the successful operations of a system –A risk is not necessarily an ongoing problem, but it may become one
Stephen S. Yau CSE , Fall Threat Category Unauthorized access threats Information compromise threats Information corruption threats Denial of service threats Software corruption threats Hardware corruption threats Hardware/software distribution threats Network-based threats
Stephen S. Yau CSE , Fall Vulnerability Category Probabilistic vulnerabilities –Caused by hardware failures, human actions and information problems in the operational environment Algorithmic vulnerabilities –Caused by design and implementation errors, which are introduced during system development [including both software and hardware]
Stephen S. Yau CSE , Fall Identify Possible Risks What is at risk? –Product design documents –Customer information –Company’s future plan –… What is the threat and where does the threat come from? –Who? (competitors, foreign agents, hackers) –Motivation (national security, money, fame, “fun”) –Target (access confidential data, change data, deface…) –Capabilities (intellect, equipment, money) What vulnerabilities can be exploited? –Technology –Process –Network –People
Stephen S. Yau CSE , Fall Cost/Benefit Analysis After identifying possible risks, cost/benefit analysis needs to be performed for the following reasons: Infeasible or sometimes impossible to implement a perfect secure systems Cost/benefit analysis helps identify risks which will most likely occur, and which will cause severe damages if occur Some risks always there (residual risk), but highly unlikely to become a problem; or even if they become problems, they can easily be contained and solved. These risks are treated as acceptable risks in a system. Results of cost/benefit analysis can help allocate limited system resources to most needed areas
Stephen S. Yau CSE , Fall Risk Analysis A process to systematically identify assets, threats, and (potential) vulnerabilities in a system, and address the following: –What to be protected –What are threatening the system –Time, effort, and money willing to be spent Should be a continuous process over the life cycle of a system (design, implementation, testing, deployment, update and termination) Two basic types of risk analysis: –Quantitative and qualitative
Stephen S. Yau CSE , Fall Quantitative Risk Analysis Attempts to establish and maintain an independent set of risk metrics and statistics, including –Annualized loss expectancy (ALE): single loss expectancy multiplied by annualized rate of occurrence. –Probability: chance, in a finite sample, that an event will occur or that a specific loss value may be attained should the event occurs. –Control: risk-reducing measure that acts to detect, prevent, or minimize loss associated with occurrence of a specified threat or category of threats.
Stephen S. Yau CSE , Fall Quantitative Risk Analysis (cont.) Pros: –Objective, independent process –Solid bases for cost/benefit analysis –Credibility for audit, management –Useful for many kinds of reliability-related design questions (e. g., redundant servers), where threats and likelihood of “events” can be easily measured
Stephen S. Yau CSE , Fall Quantitative Risk Analysis (cont.) Cons: –Problems associated with unreliability and inaccuracy of data –Probability can rarely be precise and, in some cases, promote complacency –Very time consuming, and costly to do correctly
Stephen S. Yau CSE , Fall Qualitative Risk Analysis Most widely used approach to risk analysis –Probability data not required –Only estimated potential loss used Establishing classes of loss values (impact) –Insignificant, minor, moderate, major, catastrophic –Under $10K, between $10K and $100K, between $100K and $1M, between $1M and $50M, over $50M –Type of loss (e. g. compromise of credit card #, compromise of SSN, compromise of highly personal data)
Stephen S. Yau CSE , Fall Qualitative Risk Analysis (cont.) Establishing classes of likelihood of compromise –Almost certain, likely, moderate, unlikely, rare Levels of risks –Extreme –High –Moderate –Low Focusing effort on high loss items
Stephen S. Yau CSE , Fall Determine Risk Levels LikelihoodImpact InsignificantMinorModerateMajorCatastrophic Almost Certain HighHighExtremeExtremeExtreme LikelyModerateHighHighExtremeExtreme ModerateLowModerateHighExtremeExtreme UnlikelyLowLowModerateHighExtreme RareLowLowModerateHighExtreme
Stephen S. Yau CSE , Fall Qualitative Risk Analysis (cont.) Pros: –Easy to understand and carry out –Not depend on possibly inaccurate data Cons: –More subjective to person defining classes of impacts and likelihood of compromise –Depends on history experience and expertise
Stephen S. Yau CSE , Fall Controls Countermeasures for vulnerabilities –Deterrent controls reduce likelihood of deliberate attack –Preventative controls protect vulnerabilities and make an attack unsuccessful or reduce its impact –Corrective controls reduce the effect of an attack –Detective controls discover attacks and trigger preventative or corrective controls –Recovery controls restore lost computer resources or capabilities from security violations
Stephen S. Yau CSE , Fall A Model of Risk Analysis Process ATTACK Threat Deterrent Control Detective Control Preventative Control Impact Vulnerability Corrective Control Reduce likelihood of Discovers TriggersProtects Reduces Results in Decreases Creates Exploits
Stephen S. Yau CSE , Fall Risk Management Concerned with preventing risks from becoming problems How to deal with risks identified in the risk analysis –Old philosophy: risk avoidance Do whatever you can to avoid risks –New philosophy: risk management Understand risks Deal with them in an appropriate, cost effective manner
Stephen S. Yau CSE , Fall Risk Management (cont.) Choices for each risk –Risk acceptance: tolerate those risks with low impact or rare occurrence –Risk reduction (also called risk mitigation) –Risk transfer (to another entity): let others handle the risk Typically use a combination of acceptance, reduction, and transfer for different risks
Stephen S. Yau CSE , Fall Examples Choices for risk Car theft risk Hacker break-in risk Risk acceptance Deductibles on car insurance Minimal security (delete all the spam s) Risk reduction Locks, alarms, GPS locator Strong security mechanisms (firewall, encryption, etc.) Risk transfer Car insurance covering theft Rely on Internet Service Provider (ISP) to provide security guarantees
Stephen S. Yau CSE , Fall Risk Management Process Step 1: System characterization –Input: hardware, software, system interfaces, system mission, people, data information –Output: system boundary, system functions, system and data criticality and sensitivity Step 2: Threat identification –Input: attack history, data from intelligence agencies or mass media –Output: threat statement
Stephen S. Yau CSE , Fall Risk Management Process (cont.) Step 3: Vulnerability identification –Input: prior risk assessment reports, audit comments, security requirements, security test results –Output: list of potential vulnerabilities Step 4: Control analysis –Input: current controls, planned controls –Output: evaluation results of current and planned controls
Stephen S. Yau CSE , Fall Risk Management Process (cont.) Step 5: Likelihood determination –Input: threat-source motivation, threat capacity, nature of vulnerability, current controls –Output: likelihood rating Step 6: Impact analysis –Input: mission impact analysis, asset criticality assessment, data criticality and sensitivity –Output: impact rating Step 7: Risk determination –Input: likelihood of threat exploitation, magnitude of impact, adequacy of planned or current controls –Output: risks and associated risk levels
Stephen S. Yau CSE , Fall Risk Management Process (cont.) Step 8: Control recommendations –Output: recommended controls Step 9: Results documentations –Output: A set of documents including risk identification, assessment, cost-effective evaluation, suggested control list, etc. –A well documented risk management process at one phase, which is also the starting point for the analysis at the next phase
Stephen S. Yau CSE , Fall Risk Management Process (cont.) Step 10: System monitoring: –Whether system configuration has changed: new hardware installed, software updates, mission goal changed, etc. –Performance of controls: how many possible attacks have been prevented by controls; any failures or unwanted outcome, etc. Restart the whole process from Step 1 again: –Periodically as part of system maintenance procedure –When system configuration changed, it may generate some new risks not been covered during the last risk management process –When some controls fail to prevent the risk from turning into attacks
Stephen S. Yau CSE , Fall Risk Management Process (Cont.) 1. System Characterization 2. Threat Identification 4. Control Analysis 8. Control Recommendation 6. Impact Analysis 3. Vulnerability Identification 9. Results Documentation 10. System Monitoring 7. Risk Determination 5. Likelihood Determination
Stephen S. Yau CSE , Fall Reference M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, 448 pages, ISBN J. G. Boyce, D. W. Jennings, Information Assurance: Managing Organizational IT Security Risks. Butterworth Heineman, 2002, ISBN Risk Management Guide for Information Technology Systems, July Available at: 30/sp pdf 30/sp pdf