Presentation is loading. Please wait.

Presentation is loading. Please wait.

Information Systems Security Information Security & Risk Management.

Similar presentations


Presentation on theme: "Information Systems Security Information Security & Risk Management."— Presentation transcript:

1 Information Systems Security Information Security & Risk Management

2 Core Principles  Confidentiality – only authorized nodes have access to information on need-to-know basis  Integrity – Information should be protected from intentional, unauthorized, or accidental change  Availability – Information is accessible by users when needed

3 Security Concepts  Privacy  Authentication  Authorization  Auditing  Non-repudiation

4 Type of Policies  Regulatory –Ensures company is following standards –More detailed in nature –Specific to type of industry  Advisory –Outlines expected behaviors in a company and the associated ramifications

5 Policies Con’td  Informative –Tool to teach employees about specific issues –Not enforceable

6 BS/ISO 7799  Address topics in terms of policies and best practices –Organizational security policy –Asset classification –Personnel security –Physical/environmental safety –Communications security –Access control –BCP –Compliance

7 Components of a Security Policy  Policy – Must be –Virus protection  Guides – Should be –Recommend McAfee  Standards – Will be –Will be installed on all systems  Procedures – How to –Will be updated each week from server  Control – Has it? Does it?

8 Senior Management Role  Defines the scope, objectives, priorities, and strategies of the security program  Provides vision, funds, and enforcement  Ultimately liable  Without support, efforts will be doomed from the start

9 Security Roles  Data Owner –Data classification –Sets security requirements  System Owner –Responsible for computer system –One system – One owner

10 Security Roles  Data Custodian –Data maintenance tasks –Implements and maintains controls to provide necessary protection  User –Person who routinely uses company data

11 Information Classification  Determine the value of data –Role of data –Liability if disclosed –Cost to gather –Value that opposition would pay  Classify Information –Pertaining to availability, integrity, and confidentiality issues per data set –Assign a classification level

12 Classification Con’td  Decide on Controls –Controls are implemented to protect data at each classification level –Each classification level has different handling procedures

13 Classification Criteria  Criteria Items –Usefulness and value –Level of damage possible –Law and regulations –Who should access? Who should maintain? –Who should monitor? Who should audit? –How long will protection be required

14 Military Classification Levels  Top Secret –Drastic effects and critical damage to NS  Secret –Significant effect and critical damage to NS  Confidential –Noticeable effects and serious damage to NS  Sensitive but Unclassified –Not cause significant damage if disclosed  Unclassified

15 Commercial Classifications  Confidential –Extremely sensitive and for internal use only  Private –Personal data for internal use only  Sensitive –Negative impact if disclosed  Public –No negative impact if disclosed

16 How is Liability Determined?  Due Diligence – Identifying threats and risks –Uncover potential dangers –Carry out assessments –Perform analysis on assessment data –Implement risk management –Research vulnerabilities and risks

17 Liability Con’td  Due Care – Acting upon findings to mitigate risks –Doing the right thing –Implementing solutions based on analyses –Properly protecting the company and its assets –Acting responsibly  Prudent Person Rule –Perform duties that prudent and responsible people would exercise in similar circumstances

18 Risk Assessment  Identify Vulnerabilities – a flaw or weakness in system security procedures or controls that can be exploited and result in a breach  Threats – potential for a particular threat to successfully exercise a vulnerability

19 Risk Management  Reduce –Implement safeguards  Assign –Transfer risks to another entity  Accept –Agreed to accept the consequences  Reject –Ignore that the risk exists

20 Risk Management is Hard  Trying to predict the future  Incredible number of variables  Surmising all possible threats  Gathering data from many sources  Dealing with many unknowns  Quantifying qualitative items

21 Valuating an Asset  Cost of acquisition  Replacement cost  Cost of development  Role of the asset in the company  Amount of worth to competition  Cost of maintain and protecting  Production Losses  Liability

22 Categorizing Risk Analysis  Immediate vs. Delayed Loss  Quantitative –Numeric and monetary values available –Management likes it better  Qualitative –Opinion based –Uses rating system –Scenario based

23 Qualitative Analysis  Gather company experts  Present risk scenarios  Rank seriousness of threats  Rank countermeasures  DELPHI METHOD –Anonymous – More honest – No intimidation

24 Quantitative Analysis  ALE (Annualized Loss Expectancy) –Expected monetary loss for an asset due to a risk over a 1-year period.  ALE = SLE * ARO  SLE (Single Loss Expectancy) –Asset Value X Exposure Factor (EF) –EF = Percentage of loss that could be experienced

25 Quantitative Con’td  ARO – Annualized Rate of Occurrence –Probability that a risk will occur in a year  Fire will reduce building usage by 3/4 –EF = 75%  Probability that fire occurs every 10 years –ARO =.10

26 Quantitative Con’td  Building Asset Valued at $1M –SLE = $1M *.75 = $750K –ALE = $750K *.10 = $75K  If a company’s website is attacked, it will cause 40% damage. The threat is estimated to happen once a year. The website is valued at $300K. What is the cap to be spent on safeguards?

27 Cost/Benefit of Countermeasure  ALE prior to Countermeasure – –ALE after Countermeasure –  Annual Cost of Countermeasure = –Cost/Benefit of Countermeasure  ALE of web disruption = $40K  ALE after countermeasure = $24K  Cost of countermeasure = $2K/annually  Benefit of countermeasure = $23K

28 Eliminate ALL Risks?  Total Risk Versus Residual Risk –Amount of risk that exists before a safeguard is put into place in total risk –After safeguard installed, the remaining risk is residual risk  Threat x Vulnerability x Asset Value = TR  TR x Control Gap = RR

29 Mitigate Risk  Team presents the analysis results to management  Management makes the decision about the next steps  Transfer the risk(insurance)  Reduce the risk (control)  Accept the risk(informed decision)  Reject the risk (no decision made)

30 Liability of Actions  Accepting Risks –Carried out in due diligence –Made an informed business decision –Better change of not being found negligent  Reject Risks –Did not practice due diligence –Decision based on ignorance of the issue –Most likely will be found negligent

31 Employee Management  Weakest link in security is people  Proper management of employees needed  Communication structure in place  Management structure in place  Enforce acceptable usage policy  Rotation of duties  20/80 Rule

32 Employee Security Management  Separation of duties  Job responsibilities  Job rotation  Background checks  Employee agreements

33 Firing Issues  Complete an exit interview  Non-disclosure agreements  Collect keys and escort out of building  Disable accounts

34 Ethics – ISC 2  Four canons –Protect society and the infrastructure –Act honorably, justly, responsibly, and legally –Provide diligent and competent service –Advance and protect the profession

35 Ethics - CEI  Compute Ethics Institute –Non-profit organization to stimulate awareness of the ethical issues of technology –Tries to help balance civil liberty and government monitoring –Provides advisory and consultative activities, research, education, and public outreach

36 Ethics - IAB  Internet Advisory Board –Coordinating committee for Internet design –Two task forces:  Internet Engineering Task Force (IETF)  Internet Research Task Force (IRTF) –Internet use to be seen as a privilege and should be treated as such

37 IAB Standards  Unethical behavior includes: –Seeking to gain unauthorized access to Internet –Disrupting the normal use of the Internet –Wasting resources through purposeful actions –Destroying the integrity of computer information –Compromising the privacy of others –Involving negligence in the conduct of Internet- wide experiments


Download ppt "Information Systems Security Information Security & Risk Management."

Similar presentations


Ads by Google