Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.

Slides:



Advertisements
Similar presentations
HIPAA AWARENESS TRAINING
Advertisements

Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
Confidentiality and HIPAA
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
HIPAA PRIVACY REQUIREMENTS Dana L. Thrasher Constangy, Brooks & Smith, LLC (205) ; Victoria Nemerson.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
NAU HIPAA Awareness Training
Regulatory Issues in Campus Computing Privacy and Security in a Digital World Presented by David Gleason, Esq. University Counsel University of Maryland,
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
Legal and Ethical Issues. 1. Describe and explain legal and ethical issues. 2. Describe guidelines for avoiding legal action and list methods for protecting.
Principles of Information System Security: Text and Cases
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Security Controls – What Works
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
Legal, Ethical, and Professional Issues In Information Security.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Health Sciences.  Principles  Code of Conduct for right and wrong  Values  Core of all health care decisions.
The University of Kansas Medical Center Shadow Experience Training.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Electronic Records Management: What Management Needs to Know May 2009.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Other Laws (Primarily for E-Government) COEN 351.
Health Insurance Portability and Accountability Act (HIPAA)
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HIPAA EFFECTS OF HEALTH CARE LEGISLATION. Evaluation of the influences of HIPAA  How it affected health care system  How it works as a law  Changes.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Textbook for Nursing Assistants Chapter 4: Legal and Ethical Issues.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
LEGAL AND ETHICAL RESPONSIBILITIES. LEGAL RESPONSIBILITY THOSE THAT ARE AUTHORIZED OR BASED ON LAW.
Lecture 11: Law and Ethics
Fair Labor, Family Medical Leave, Residency, Drug Testing, Electronic Monitoring, Digital Imagery, and Social Networking Chapter 14.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Chapter 4: Laws, Regulations, and Compliance
Patriot Act (2002)Patriot Act (2002) Dylan Plassmeyer-Pd:8.
Medical Documentation
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
HEALTH CARE & LAW. HEALTH CARE & THE LAW The integrity of health care is dependent upon providing individualized, competent, and safe care to clients.
Public Health IT Privacy, Confidentiality and Security of Public Health Information This material (Comp13_Unit2) was developed Columbia University, funded.
HEALTH CARE & LAW. HEALTH CARE & THE LAW The integrity of health care is dependent upon providing individualized, competent, and safe care to clients.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Privacy and the Law.
Legal and Ethical Responsibilities
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
USA PATRIOT ACT WHAT DOES IT STAND FOR?.
LifeBridge Health Sinai Hospital Orientation.
CompTIA Security+ Study Guide (SY0-401)
The Health Insurance Portability and Accountability Act
Presentation transcript:

Risk Assessment

InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy

Risk Assessment Assigns a risk rating for each asset Likelihood refers to the probability of a known vulnerability being attacked –Likelihood of fire forecast from actuarial data –Likelihood of virus estimated from volume of handled and number of servers in use –Likelihood of a network attack estimated from the number of network addresses in use

Risk Assessment How to assign value to information assets? –NIST SP contains parameters to check –Critical assets are assigned the value 100 –Non-critical but essential asset gets the value 50 –Least critical assets get the value 1 What factors to look for in valuation? –Which threats present a danger? –Which threats present a significant danger? –Cost to recover from an attack –Threats that require maximum cost to prevent

Risk Assessment Risk determination:  Risk = likelihood * value – risk percentage + uncertainty  Example: Asset A has vulnerability score 50 Number of vulnerabilities 1 Likelihood value 1 with no controls Data are 90% accurate Hence, Risk = 1 * 50 – 0% + 10% = % of (1 * 50) = = 55

Risk Assessment  Example: Asset B has vulnerability score 100 Number of vulnerabilities 2 Likelihood value 0.5 for 1 st vulnerability which addresses 50% of risk Data are 80% accurate Hence, Risk = 0.5 * 100 – 50% + 20% = 50 – (50% of 50) + (20% of 50) = 50 – = 35

Risk Assessment  Example: Asset B has vulnerability score 100 Number of vulnerabilities 2 Likelihood value 0.1 for 2 nd vulnerability with no controls Data are 80% accurate Hence, Risk = 0.1 * 100 – 0% + 20% = 10 – 0 + (20% of 10) = = 12

Risk Assessment The generic risks to the business are: –Loss of key assets Information the network skilled people –Disruption of key processes Revenue regulatory reporting

Risk Factors Assess risk based on these factors: –Impact Size –Rate of Change –Business Impact –Complexity –Recoverability –Value –Management Team Focus

Definitions Civil law addresses violations of rules that result in monetary loss as well as other forms of damage caused to individuals or organizations Criminal law addresses violations that are harmful to society Tort law addresses violations by individuals that result in personal, physical, or financial injury to an individual Private law regulates relationships between an individual and an organization Public law regulates relationships between citizens

Definitions Ethics is defined as socially acceptable behavior Code of conduct is a set of rules that an organization defines as acceptable

Laws governing Information Security Computer Security Act Communications Assistance to Law Enforcement Act Computer Fraud and Abuse Act USA PATRIOT Act

Computer Security Act Passed in Official designation PL Law gave NIST the authority over unclassified non-military government computer systems NSA originally had this power Main goals: –Develop policies for federal agencies concerning computer security –Develop procedures to identify vulnerabilities in computer security

Computer Security Act Provide mandatory security awareness training to all federal employees dealing with sensitive information Identify all computer systems that contain sensitive information

CALEA Passed in 1994 Works in conjunction with FCC regulations Telephone companies to include hardware to their switches that will facilitate tapping of conversations by law enforcement agencies Telcos are not responsible for decrypting any intercepted communication Telcos will be provided reasonable compensation for the addition of interception hardware to switches

Computer Fraud and Abuse Act Originally passed in 1994 and amended in 1996 PATRIOT Act amends this act further CFAA’s main provisions relate to the following: –having knowingly accessed a computer without authorization –intentionally accesses a computer without authorization –knowingly and with intent to defraud, accesses a protected computer without authorization –Prison time of up to 10 years is possible for any violation If damage caused is below $5,000 then only criminal penalties apply and no civil penalties apply

USA PATRIOT Act Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Passed in October 2001 Gives extensive powers to the federal government to suspend notification provisions of existing laws Provides authorization for information search without knowledge of the individual Law expires in December 2004, unless renewed by Congress

Privacy and Ethics Information privacy Information privacy laws –Federal Privacy Act of 1974 –Electronic Communications Privacy Act of 1986 –Communications Act of 1996 –HIPAA of 1996 –Computer Security Act of 1987 –USA PATRIOT Act of 2001 Ethical aspects of information handling

Information Privacy Privacy refers to personally identifiable information about an individual or an organization Privacy does not mean absolute freedom from observation Privacy means “state of being free from unsanctioned intrusion” Financial and medical institutions treat privacy as part of their compliance requirements Information is collected by cookies and points of sale

Information Privacy Privacy is a risk management issue Ability to collect information from multiple sources and combine them in different ways have resulted in powerful databases that can shed more light than previously possible

Information Privacy Laws Federal Privacy Act of 1974 –Requires all government agencies from protecting the privacy information of individuals and businesses –Certain agencies have exemption to release aggregate data Census Bureau National Archives Congress Comptroller General Credit agencies

Information Privacy Laws Electronic Communications Privacy Act of 1986 –Regulates interception of wire, electronic, and oral communications –Works in conjunction with the Fourth Amendment providing protection against unlawful search and seizure

Information Privacy Laws Communications Act of 1996 –Regulates interstate and international communications –Communications decency was part of this Act

Information Privacy Laws Health Insurance Portability and Accountability Act (HIPAA) of 1996 –Protect confidentiality and security of health care data –Electronic signatures are allowed –Patients have a right to know who have access to their information and who accessed it

References NIST Risk Assessment Guide for Information Technology Systems, SP Mike Godwin, “When copying isn’t theft,” win.article Michael Whitman, “Enemy at the Gates: Threats to Information Security,” Communications of ACM, 2003

References Financial institutions: HTML HTML Risk Assessment Process: ISACA Risk Assessment Guidelines Risk Assessment: ecurity/02_info_security_%20risk_asst.htm ecurity/02_info_security_%20risk_asst.htm