Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Museum Presentation Intermuseum Conservation Association.
Module 1 Evaluation Overview © Crown Copyright (2000)
OCTAVESM Process 4 Create Threat Profiles
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Topic Outline — Information security? — Security Why? — Security approach — Vocabulary — The weakest link — Real life security sample.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 1: Overview modified from slides of Lawrie Brown.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
1 An Overview of Computer Security computer security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Introducing Computer and Network Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Information Security Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 General Policy and Law Issues.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Network Security PHILADELPHIA UNIVERSITY Ahmad Alghoul Module 1 Introduction: To Information & Security  Modified by :Ahmad Al Ghoul  Philadelphia.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
SEC835 Database and Web application security Information Security Architecture.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Security Architecture
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Risk Management Issues in Information Security Amanda Kershishnik COSC April 2007.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
CS457 Introduction to Information Security Systems
Risk management.
Security Of Information Systems
Chapter 8 – Administering Security
INFORMATION SYSTEMS SECURITY and CONTROL
Accounting Information Systems & Computer Fraud
Presentation transcript:

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information Security Risk Assessment Module 1: Introduction to Risk  Module 2: Definitions and Nomenclature Module 3: Security Risk Assessment Module 4-5: Methodology and Objectives Module 6: Case Study Module 7: Summary

Module 2 Definitions and Nomenclature

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 3 Students should be able to: –Define information security risk formally –Understand the nomenclature of risk –Be able to identify threats, vulnerabilities, and assets –Understand different types of risk. Definitions and Nomenclature Learning Objectives

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 4 Definitions and Nomenclature Concept Map Source: Australian Standard Handbook of Information Security Risk Management – HB Threats exploit system vulnerabilities which expose system assets. Security controls protect against threats by meeting security requirements established on the basis of asset values.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 5 Assets- Something that the agency values and has to protect. Assets include all information and supporting items that an agency requires to conduct business. Vulnerability- A weak characteristic of an information asset or group of assets which can be exploited by a threat. 1 Consequence of weaknesses in controls. Threat- Potential cause of an unwanted event that may result in harm to the agency and its assets. 1 A threat is a manifestation of vulnerability. Controls- Implementations to reduce overall risk and vulnerability. Security Risk- is the probability that a specific threat will successfully exploit a vulnerability causing a loss. 1 Definitions and Nomenclature Basic Definitions

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 6 Definition – protection of information systems and data from unauthorized (accidental or intentional) modification, destruction, or disclosure. –Protection includes confidentiality, integrity, authentication, access control and availability (CIA 3 ) of these systems and data Goals – identification, measurement, control, and minimization of security risks in information systems to a level commensurate with the value of the assets protected Definitions and Nomenclature Information Security

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 7 Assets– things that agency values wants to protect. Includes all information and supporting items that an agency requires to conduct business. Asset Categories and Threats to Assets Data –Breach of confidentiality –Loss of data integrity –Denial of service –Corruption of Applications –Disclosure of Data Organization –Loss of trust –Embarrassment –Management failure Definitions and Nomenclature Assets Personnel –Injury and death –Sickness –Loss of morale

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 8 Infrastructure –Electrical grid failure –Loss of power –Chemical leaks –Facilities & equipment –Communications Legal –Use or acceptance of unlicensed software –Disclosure of Client Secrets Definitions and Nomenclature Assets Cont’d Operational –Interruption of services –Loss/Delay in Orders –Delay in Shipments

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 9 Vulnerabilities –flaws within an asset (e.g. operating system, router, network, or application), that allow an asset to be exploited by a threat. Examples –Software design flaws –Software implementation errors –System misconfiguration (e.g. misconfigured firewalls) –Inadequate security policies –Poor system management –Lack of physical protections –Lack of employee training (e.g. passwords on post-it notes in drawers or under keyboards) Definitions and Nomenclature Vulnerabilities

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 10 Threats are potential causes of events which have a negative impact. –Threats exploit vulnerabilities causing impact to assets Examples –Denial of Service (DOS) Attacks –Spoofing and Masquerading –Malicious Code –Human Error –Insider Attacks –Intrusion Definitions and Nomenclature Threats

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 11 Definitions and Nomenclature Sources of Threats SourceExamples of Reasons External Hackers with Malicious Intent Espionage Intent to cause damage Terrorism External Hackers Seeking Thrill Popularity Insiders with Malicious Intent Anger at company Competition with co-worker(s) Accidental Deletion of Files and Data User errors Environmental Damage Floods Earthquakes Fires Equipment and Hardware Failure Hard disk crashes

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 12 Risk –probability that a specific threat will successfully exploit a vulnerability causing a loss. Evaluated by three distinguishing characteristics: –loss associated with an event, e.g., disclosure of confidential data, lost time, and lost revenues. –likelihood that event will occur, i.e. probability of event occurrence –Degree that risk outcome can be influenced, i.e. controls that will influence the event Definitions and Nomenclature Security Risk Various forms of threats exist Different stakeholders have various perception of risk Several sources of threats exist simultaneously

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 13 Physical Asset Risks –Relating to items with physical and tangible items that have an associated financial value Mission Risks –Relating to functions, jobs or tasks that need to be performed Security Risks –Integrates with both asset and mission risks Definitions and Nomenclature Types of Risk

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 14 Relatively new field Constantly changing information systems & vulnerabilities Human factors related to security No standard of practice Lack of formal models Lack of data Evolving threats Definitions and Nomenclature Why is security risk different?

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 15 Assets are valuables which an organization wants to protect. Vulnerabilities are weaknesses in assets that can be exploited by threats. Threats exploit vulnerabilities to impact threats Risk is the potential impact of threats resulting in a loss Risk can be minimized through use of controls. Definitions and Nomenclature Summary