CIST 1601 Information Security Fundamentals

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Lecture 1: Overview modified from slides of Lawrie Brown.
Security Controls – What Works
Information Security Policies and Standards
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
Introducing Computer and Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
Computer Security: Principles and Practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Introduction to Network Defense
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Basics of OHSAS Occupational Health & Safety Management System
Information Systems Security Computer System Life Cycle Security.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Information Systems Security Operational Control for Information Security.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Alaa Mubaied Risk Management Alaa Mubaied
Chapter 2 Securing Network Server and User Workstations.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Introduction to Information Security
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chap 8: Administering Security.  Security is a combination Technical – covered in chap 1 Administrative Physical controls SE571 Security in Computing.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
Prepared By: Razif Razali 1 TMK 264: COMPUTER SECURITY CHAPTER SIX : ADMINISTERING SECURITY.
Chapter 3: Business Continuity Planning. Planning for Business Continuity Assess risks to business processes Minimize impact from disruptions Maintain.
Computer Security Sample security policy Dr Alexei Vernitski.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY MANAGEMENT L ECTURE 8: R ISK M ANAGEMENT C ONTROLLING R ISK You got to be careful if you don’t know where you’re going, because you.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
CS457 Introduction to Information Security Systems
CompTIA Security+ Study Guide (SY0-401)
Risk management.
Unit 7 – Organisational Systems Security
CompTIA Security+ Study Guide (SY0-501)
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Technology Albany Technical College

Identifying Assets Asset identification is the process of identifying the types and values of assets in an organization. In some cases, the process may be as simple as counting systems and software licenses. The more difficult part of an asset-identification process is attempting to assign values to information. In some cases, you may only be able to determine what would happen if the information were to become unavailable or lost. If absence of this information would effectively shut down the business, the information is priceless.

Risk Assessment There are several ways to perform a risk assessment or risk analysis. They range from highly scientific formula-based methods to a conversation with the owner. The cost of an event and the probability that an event will occur are two of the most important factors to consider when you’re formulating a risk assessment. In general, you should attempt to identify the costs of replacing stolen data or systems, the costs of downtime, and virtually any risk factor you can imagine. You can move to risk assessment only after completing the asset identification. After you’ve determined the costs, you can then evaluate the likelihood that certain types of events will occur and the most likely outcome if they do occur.

Risk Assessment Risk Avoidance (3:10) Risk assessment helps align security objectives with business objectives. Risk analysis is part of the disaster recovery plan. Risk analysis is the process of identifying assets and their associated threats, vulnerabilities, and potential risks, and justifying the cost of countermeasures deployed to mitigate the loss. It is important to note that risk analysis is focused on a cost-benefit analysis of countermeasures, and not on the selection of countermeasures. Risk analysis also measures the amount of loss that an organization can potentially incur if an asset is exposed to loss.   During the process of risk assessment, it is necessary to review many areas, such as the following: Methods of access Authentication schemes Audit policies Hiring and release procedures Isolated services that may provide a single point of failure or avenue of compromise Data or services requiring special backup or automatic failover support.    The following are the four major objectives of a risk analysis, in order of execution: 1. To identify all existing assets and estimate their monetary value. 2. To identify vulnerabilities and threats to information assets. Vulnerability is a weakness in the system, software, hardware, or procedure. A threat agent, leading to a risk of loss potential, can exploit this weakness. A virus is an example of a threat agent, and the possibility of a virus infecting a system is an example of a threat. 3. To quantify the possibility of threats and measure their impact on business operations. 4. To provide a balance between the cost of impact of a threat and the cost of implementing the safeguard measures to mitigate the impact of threats.

Acting on Your Risk Assessment Risk Avoidance Some risks can be eliminated through a change in the technology, policy, or mechanism of employment. For example, the risk of “war-dialing” attacks can be eliminated by removing legacy dial-up telephony modem devices. Risk Transference A risk may be transferred, such as when the risk of equipment loss is covered by a full-replacement insurance policy. Risk Mitigation Most risks fall into the mitigated response area, where the application of additional effort may reduce the risk to a level documented as acceptable. Risk Deterrence Risk deterrence involves understanding something about the enemy and letting them know the harm that can come their way if they cause harm to you. This can be as simple as posting prosecution policies on your login pages and convincing them that you have steps in place to identify intrusions and act on them. Risk Acceptance Some risks cannot be addressed within a reasonable time or cost constrained and may be accepted, with proper documentation as to the reasons why the risk is acceptable.

Risk Assessment Risk Calculations (5:11) The annualized rate of occurrence (ARO) signifies the probability of an event occurring within a year. This conclusion is usually based on referencing historical data.  This measure can be used in conjunction with a monetary value assigned to data to compute single loss expectancy (SLE) and annual loss expectancy (ALE) values. SLE refers to the quantitative amount of loss incurred by a single event when a threat takes place. SLE equals the asset value (AV) multiplied by the threat exposure factor (EF). The exposure factor or probability is the percentage of loss that a realized threat could have on a certain asset. For example, a virus hits five computer systems out of 100 before it is prevented by the safeguard from further infecting the other 95 computers, resulting in a loss of five percent of the computers. If the asset value of 100 computers is $10,000, then the exposure factor will be $500, which is five percent of the total asset value. The formula for calculating SLE is: AV x EF = SLE. From the previous example: $10,000 x 5% = $500.   Annual loss expectancy (ALE) refers to the loss potential of an asset for a single year. ALE equals the single loss expectancy (SLE) times the annualized rate of occurrence (ARO) When you’re computing risk assessment, remember this formula: SLE x ARO = ALE Thus, if you can reasonably expect that every SLE will be equivalent to $1,000 and that there will be seven occurrences a year (ARO), then the ALE is $7,000. Total risk can be calculated by multiplying the threats, the vulnerabilities, and the asset value. Total risk = threats x vulnerabilities x asset value.

Risks Associated with Cloud Computing Cloud computing means using the Internet to host services and data instead of hosting it locally. Some examples would be to run Office-like applications from the Web (such as Google Docs) instead of having the applications installed on each workstation, storing data on server space rented from Amazon, using sites such as Salesforce.com, etc. Three ways to implement cloud computing: Platform as a Service – Also known as cloud platform services. Vendors allow apps to be created and run on their infrastructure. i.e. Amazon Web Services and Google Code. Software as a Service – Applications are remotely run over the Web. No local hardware is required and no software apps need be installed on the machine accessing the site. i.e. Salesforce.com. Costs are usually computed on a subscription basis. Infrastructure as a Service – Utilizes virtualization, and clients pay an outsourcer for resources used. GoGrid is a well known example. Risk related issues of cloud computing include: Regulatory Compliance – Depending on the type and size of your organization, there are any number of regulatory agency’s rules with which you must comply. User Privileges – Be cognizant of the fact that you will not have the same control over user accounts in the cloud as you did locally, and when someone locks their account by giving the wrong password too many times in a row, you /they could be at the mercy of the technical staff of the provider. Data Integration/Segregation – Data hosting companies can put more than one company’s data on a server. You should use encryption to protect your data. Be aware that your data is only as safe as the data it is integrated with.

Risks Associated with Virtualization Security risks associated with virtualization include: Breaking Out of the Virtual Machine – if you can break out of the virtualization layer you could get access to the other virtual machines and access data you shouldn’t have access to. Network and Security Controls Can Intermingle – The tools used to manage the virtual machine may not have the same granularity as those used to manage the network, which could lead to privilege escalation. Most virtualization-specific threats focus on the hypervisor, which is the virtual machine monitor, or the software that allows the virtual machine to exist. If the hypervisor can be compromised, the attacker can gain root-level access to all virtual systems. The solution to most virtualization threats is to always apply the most recent patches and keep the system(s) up to date.

Developing Policies, Standards, and Guidelines Implementing Policies Reducing Risk with Security Policies (12:24) A policy consists of the rules and requirements which should be adhered to within an organization. Policies usually cover a single area, and contain conditions of expected performance, and the consequences of non-compliance. A good policy contains several key areas besides the policy: Scope statement Outlines what the policy intends to accomplish and what documents, laws, and practices the policy addresses. Policy overview statement Policy overview statements provide the goal of the policy, why it’s important, and how to comply with it. Policy statements Once the policy’s readers understand its importance, they should be informed of what the policy is. If the policy is intended to help people determine how to lock up the building at the end of the business day, it might be helpful to provide a specific checklist of the steps that should be taken. Accountability statement Who is responsible for ensuring that the policy is enforced. Who should be contacted if a problem is discovered. What are the consequences of non-compliance? Exception statement The exception statement provides specific guidance about the procedure or process that must be followed in order to deviate from the policy. This may include an escalation contact, in the event that the person dealing with a situation needs to know whom to contact.

Developing Policies, Standards, and Guidelines Incorporating Standards A standard deals with specific issues or aspects of the business. Standards are derived from policies. A standard should provide enough detail that an audit can be performed to determine if the standard is being met. The following five points are the key aspects of standards documents: Scope and purpose Should explain or describe the intention. If a standard is developed for a technical implementation, the scope might include software, updates, add-ins, and any other relevant information to carry out the task. Roles and responsibilities This Outlines who is responsible for implementing, monitoring, and maintaining the standard. Reference documents Explains how the standard relates to the organization’s different policies, thereby connecting the standard to the underlying policies that have been put in place. In the event of confusion or uncertainty, it also allows people to go back to the source and figure out what the standard means. Performance criteria Outlines what or how to accomplish the task. It should include relevant baseline and technology standards. Maintenance and administrative requirements These standards outline what is required to manage and administer the systems or networks.

Developing Policies, Standards, and Guidelines Following Guidelines Guidelines tend to be less formal than policies or standards. Guidelines are similar to standards, in that they too detail rules and best practices that govern an organization and how business is conducted. The difference is that guidelines are not mandatory. Guidelines are usually drawn up to streamline the implementation of security policy elements. The following four items are the minimum contents of a good guidelines document: Scope and purpose The scope and purpose provide an overview and statement of the guideline’s intent. Roles and responsibilities Identifies which individuals or departments are responsible for accomplishing specific tasks. This may include implementation, support, and administration of a system or service. Guideline statements Provide the step-by-step instructions on how to accomplish a specific task in a specific manner. Again, these are guidelines—they may not be hard-and-fast rules. Operational considerations Specify and identify what duties are required and at what intervals. This list might include daily, weekly, and monthly tasks. Guidelines for systems backup might provide specific guidance as to what files and directories must be backed up and how frequently.

Business Policies Business policies address organizational and departmental business issues and have an impact on the security of an organization. Separation of duties policies describe rules that reduce the risk of fraud and other losses. These policies should define more than one person for completing business critical tasks. Multiple people conspiring to corrupt a system is less likely than a single person corrupting it.   It may involve both the separation of logons, such as day-to-day and admin accounts both assigned to the same network admin, as well as the separation of roles, such as security assignment and compliance audit procedures.

Business Policies Due care is the knowledge and actions that a reasonable and prudent person would possess or act upon. The objectives of due care policies are to protect and safeguard customer and/or client records. Due care is determined based on legislative requirements. The company exercises the practice of due care in the following manner: The company implements physical and logical access controls. The company ensures telecommunication security by using authentication and encryption. Information, application, and hardware backups are performed at regular intervals. Disaster recovery and business continuity plans are in place within the company. Periodic reviews, drills, and tests are performed by the company to test and improve the disaster recovery and business continuity plans. The company’s employees are informed regarding the anticipated behavior and implications of not following the expected standards. The company has security policies, standards, procedures, and guidelines for effective security management. The company performs security awareness training for its employees. The company network runs updated antivirus definitions at all times. The administrator periodically performs penetration tests from outside and inside the network. The company implements either a call-back or a preset dialing feature on remote access applications. The company abides by and updates external service level agreements (SLAs). The company ensures that downstream security responsibilities are being met. The company implements counter measures that ensure that software piracy is not taking place within the company. The company ensures that proper auditing and reviewing of the audit logs is taking place. The company conducts background checks on potential employees.   If a company does not exercise due care, the company’s senior management can be held legally accountable for negligence and might have to pay damages under the principle of culpable negligence legislation for the loss suffered because of insufficient security controls.

Business Policies Physical Access Control Policies refer to the authorization of individuals to access facilities or systems that contain information. They limit issues such as unauthorized disclosure of information, unauthorized access to the company facilities, and data theft.   Document Disposal and Destruction Policies detail the methods on how information that is no longer needed gets disposed. Data in all forms must be properly disposed of. Some data and data sources must be destroyed or thoroughly erased. Because many sophisticated recovery techniques exist, destroying all data and data sources may be more appropriate. Discarded hard drives might need to be physically destroyed.

Business Policies Privacy policies must clearly define: Which information can be disclosed What information cannot be disclosed What types of information employees are provided The policy must clearly state that employees should have no expectations of privacy. Employers are allowed to search desks, computers, files, and any other items brought into the building. By explicitly stating your policies, you can avoid misunderstandings and potentially prevent employees from embarrassing themselves. Acceptable-use policies (AUP) deal primarily with computers and information provided by the company. An acceptable use policy provides details that specify what users may do with their network access, including email and instant messaging usage for personal purposes, limitations on access times, and the storage space available to each user. It dictates how computers can be used within an organization. It should also outline the consequences of misuse. Employees are commonly asked to sign such a document, which is a binding agreement to adhere to the policy.

Business Policies Security Policies define what controls are required to implement and maintain the security of systems, users, and networks. Should be used as a guide in system implementation and evaluation. Mandatory Vacations This policy requires all users to take time away from work and refresh. An employee who don’t take time off can be a detriment to himself or the company. Mandatory vacations give the company the chance to make sure others can fill the void in skills. They give the company a chance to discover fraud. Job Rotation policies define intervals at which employees must rotate through positions. It helps to ensure that companies don’t become to dependent on one person. They also give the company a chance to discover fraud. Least Privilege should be used when assigning permissions. Give users only the permission they need to do their work and no more. Every OS includes the ability to limit users based on groups and individual permissions. Apply only those permissions users need and block all others.

Understanding Control Types, False Positives, and Change and Incident Management Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories: Management, Operational, and Technical.

Control types fall into three categories: Understanding Control Types, False Positives, and Change and Incident Management Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories: Management Operational Technical

Control Types Control Type Controls Management Risk Assessment Planning System and Services Acquisition Certification, Accreditation, and Security Assessment Operational Personnel Security Physical and Environmental Protection Contingency Planning Configuration Management Maintenance System and Information Integrity Media Protection Incident Response Awareness and Training Technical Identification and Authentication Access Contol

Control Types, False Positives, and Change and Incident Management Controls Technical Audit and Accountability System and Communication Protection After implementing controls based on risk you must perform audits which include reviews of user rights and permissions as well as events that occur. False Positives are events that aren’t really incidents. If the rules are not set up properly, normal traffic may set off the analyzer and generate an event. Your audits should address change management, which is the structured approach that is followed to secure the company’s assets, and incident management, which are the steps followed when events occur.

The End