35
Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Embed Size (px)

Citation preview

Page 1: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition

Chapter 8Risk Management: Identifying and

Assessing Risk

Page 2: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 2© Cengage Learning 2014

Objectives

• Define risk management and its role in the organization

• Describe risk management techniques to identify and prioritize risk factors for information assets

• Explain how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur

• Discuss the use of the results of the risk identification process

Page 3: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 3© Cengage Learning 2014

Risk Management

• To reduce risk, an organization must (1) know itself and (2) know its enemy– Locate the weaknesses of their organization’s

operations– Understand how the organization’s information is

processed, stored, and transmitted– Identify what resources are available

Page 4: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 4© Cengage Learning 2014

Knowing Yourself

• For an organization to know itself:– Managers should understand how information is

processed, stored, and transmitted– Requires knowing which information assets are

valuable to the organization, identifying, categorizing, and classifying those assets

– Must also know how they are currently being protected

• Frequently, risk management mechanisms are implemented but not maintained or kept current– Risk management is a process

Page 5: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 5© Cengage Learning 2014

Knowing the Enemy

• Knowing the enemy means:– Identifying, examining, and understanding the

threats facing the organization’s information assets• Risk management: process of discovering and

assessing the risks to an organization’s operations– Also determining how those risks can be controlled

or mitigated• Risk analysis: the identification and assessment of

levels of risk in the organization– A major component of risk management

Page 6: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 6© Cengage Learning 2014

Accountability for Risk Management Part 1

• All communities of interest are responsible for the management of risks

• Each has a particular strategic role to play:– InfoSec - members best understand the threats and

attacks that introduce risk• Usually take a leadership role in addressing risk

– IT - this group must help build the secure systems and ensure their safe operation

– Management and users - this group plays a part in the early detection and response process• When properly trained and kept aware of threats

Page 7: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 7© Cengage Learning 2014

Accountability for Risk Management Part 2

• All communities of interest are responsible for the management of risks

• Each has a particular strategic role to play:– InfoSec - members best understand the threats and

attacks that introduce risk• Usually take a leadership role in addressing risk

– IT - this group must help build the secure systems and ensure their safe operation

– Management and users - this group plays a part in the early detection and response process• When properly trained and kept aware of threats

Page 8: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 8© Cengage Learning 2014

Accountability for Risk Management Part 3

• Community of interests must be actively involved in the following activities:– Evaluating risk controls– Determining which control options are cost effective– Acquiring or installing the appropriate controls– Overseeing processes to ensure that the controls

remain effective– Identifying risks– Assessing risks– Summarizing the finding

Page 9: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 9© Cengage Learning 2014

Figure 8-1 Risk identification and assessment process

Page 10: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 10© Cengage Learning 2014

Risk Identification

• Risk identification - begins with the process of self-examination

• In this stage, managers:– Identify the organization’s information assets– Classify and categorize them into useful groups– Prioritize them by their overall importance

• Must be done to identify weaknesses and the threats they present

Page 11: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 11© Cengage Learning 2014

Creating an Inventory of Information Assets

• Risk identification process begins with identification of information assets, including:– People– Procedures– Data– Software– Hardware– Networking components

Page 12: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 12© Cengage Learning 2014

Table 8-1 Organizational assets used in systems

IT System Components Risk Management Components Example Risk Management Components

People Internal personnel External personnel

Trusted employeesOther staff membersPeople we trust outside our organizationStrangers

Procedures Procedures IT and business standard proceduresIT and business sensitive procedures

Data Data/information TransmissionProcessingStorage

Software Software Applications Operating systems Security components

Hardware Hardware Systems and peripherals Security devices

Networking Networking Local Area Network components Intranet components Internet or extranet components Cloud-based components

Page 13: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 13© Cengage Learning 2014

Identifying Hardware, Software, and Network Assets

• Asset inventory systems - keep track of hardware, network, and perhaps software components– Usually up to the CISO or CIO to determine which

package best serves the needs of the organization• Organizations that do not use an automated

inventory system must create a manual process• The inventory process requires a lot of planning• Must determine which attributes of each

information asset should be tracked

Page 14: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 14© Cengage Learning 2014

Identifying Hardware, Software, and Network Assets (continued)

• Consider the following list of potential attributes:– Name– Asset tag– Internet Protocol (IP) address– Media Access Control (MAC) address– Asset type– Serial number– Manufacturer name, model or part number– Software version, update revision, or FCO number– Physical and logical location– Controlling entity

Page 15: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 15© Cengage Learning 2014

Identifying People, Procedures, and Data Assets Part 1

• The record-keeping system should be flexible, allowing you to link assets to attributes based on the nature of the information asset being tracked

• Basic attributes for various classes of assets include:– People

• Position name/number/ID• Supervisor name/number/ID• Security clearance level• Special skills

Page 16: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 16© Cengage Learning 2014

Identifying People, Procedures, and Data Assets Part 2

• Basic attributes for various classes of assets include (cont’d):– Procedures

• Description• Intended purpose• Software/hardware/networking elements to which the

procedure is tied• Location where procedure documents are stored• Location where it is stored for update purposes

Page 17: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 17© Cengage Learning 2014

Identifying People, Procedures, and Data Assets Part 3

• Basic attributes for various classes of assets include (cont’d):– Data

• Classification• Owner/creator/manager• Size of data structure• Data structure used• Online or offline• Location• Backup procedures

Page 18: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 18© Cengage Learning 2014

Classifying and Categorizing Assets

• Determine whether asset categories are meaningful to the organization– Example: if the category “Internet components” is

too general, further divide it into subcategories of servers, networking devices, protection devices

• A classification scheme should be developed that categorizes information assets based on their sensitivity and security needs– Example: confidential, internal, and public

• Classification categories must be comprehensive and mutually exclusive

Page 19: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 19© Cengage Learning 2014

Assessing Values for Information Assets Part 1

• As each information assets is identified, categorized, and classified– A relative value must be assigned to it

• Relative values are comparative judgments intended to ensure the most valuable information assets are given the highest priority

• A relative assessment helps to ensure that higher value assets are protected first

Page 20: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 20© Cengage Learning 2014

Assessing Values for Information Assets Part 2

• The following basic questions can help develop the weighting criteria to be used for valuation:– Which information asset is the most critical to the

success of the organization?– Which information asset generates the most

revenue?– Which information asset generates the highest

profitability?– Which information asset is the most expensive to

replace?

Page 21: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 21© Cengage Learning 2014

Assessing Values for Information Assets Part 3

• The following basic questions can help develop the weighting criteria to be used for valuation (cont’d):– Which information asset is the most expensive to

protect?– Which information asset’s loss or compromise would

be the most embarrassing or cause the greatest liability?

• You can use a worksheet, like the one on the following slide, to collect answers to the questions

Page 22: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 22© Cengage Learning 2014

Threat Identification

• Threat identification - process of assessing potential weaknesses in each information asset

• Do not assume every threat can and will attack every information asset– Project scope will become too complex

• Each step in the threat identification and vulnerability identification process should be managed separately – Then coordinated at the end

Page 23: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 23© Cengage Learning 2014

Identify and Prioritize Threats and Threat Agents

• Threat assessment– Each identified threat must be further examined to

determine its potential to affect the targeted information asset

• Posing the following questions can help with understanding threats and their potential effects:– Which threats present a danger to this organization’s

information assets in its current environment?– Which threats represent the gravest danger to the

organization’s information assets?

Page 24: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 24© Cengage Learning 2014

Table 8-3 Threats to InfoSecThreat Examples

Compromises to intellectual property Software piracy or other copyright infringement

Deviations in quality of service from service providers

Fluctuations in power, data, and other services

Espionage or trespass Unauthorized access and/or data collection

Forces of nature Fire, flood, earthquake, lightning, etc.

Human error or failure Accidents, employee mistakes, failure to follow policy

information extortion Blackmail threat of information disclosure

Sabotage or vandalism Damage to or destruction of systems or information

Software attacks Malware: viruses, worms, macros, denial-of-services, or script injections

Technical hardware failures or errors Hardware equipment failure

Technical software failures or errors Bugs, code problems, loopholes, backdoors

Technological obsolescence Antiquated or outdated technologies

Theft Illegal confiscation of equipment or information

Page 25: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 25© Cengage Learning 2014

Frequency of Attacks

• The number of detected attacks is steadily decreasing– Fewer organizations have reported unauthorized use

of their computer systems every year since 2000• The number of organizations reporting malware

attacks has increased• The number of organizations willing to report the

number or costs of successful attacks is decreasing

• Whether an attack is successful depends on the company’s security efforts

Page 26: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 26

Methods of Assessing Threats

• A 2012 survey of computing executives asked “In your organization’s risk management efforts, what basis do you use to assess threats?”

Table 8-7 Basis of threat assessment

Threat (Based on Money and Effort Spent to Defend Against or React to It)

2012 Rating Average

2012 Ranking 2003 CACM Ranking

Espionage or trespass 4.07 1 6Software attacks 3.94 2 1

Theft 3.18 3 7Quality-of-service deviations by service providers 3.10 4 5

Forces of nature 3.06 5 10

Sabotage or vandalism 3.00 6 8Technological obsolescence 2.99 7 9Technical software failures or errors 2.71 8 3

Technical hardware failures or errors 2.64 9 4Compromises to intellectual property 2.55 10 11Human error or failure 2.25 11 2

Information extortion 2.00 12 12

Page 27: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 27© Cengage Learning 2014

Vulnerability Assessment

• Once information assets have been identified– Review of each asset to identify threats can begin

• The review leads to the creation of a list of vulnerabilities

• Vulnerabilities - specific avenues that threat agents can exploit to attack an information asset

• A list like the one on the following slide must be created for each information asset– Process works best when groups of people with

diverse backgrounds work together

Page 28: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 28© Cengage Learning 2014

Table 8-8 Vulnerability assessment of a DMZ router

Threat Possible VulnerabilitiesCompromises to intellectual property Router has little intrinsic value, but other assets protected by

this device could be attacked if it is compromised.Espionage or trespass Router has little intrinsic value, but other assets protected by

this device could be attacked if it is compromised.forces of nature All information assets in the organization are subject to forces

of nature unless suitable controls are provided.Human error or failure Employees or contractors may cause an outage if

configuration errors are made.Information extortion Router has little intrinsic value, but other assets protected by

this device could be attacked if it is compromised.Quality-of-service deviations from service providers Unless suitable electrical power conditioning is provided,

failure is probable over time.Sabotage or vandalism IP is vulnerable to denial-of-service attacks.

Device may be subject to defacement or cache poisoning.Software attacks IP is vulnerable to denial-of-service attacks.

Outsider IP fingerprinting activities can reveal sensitiveinformation unless suitable controls are implemented.

Technical hardware failures or errors Hardware could fail and cause an outage. Power system failures are always possible.

Technical software failures or errors Vendor-supplied routing software could fail and cause an outage.

Technological obsolescence If it is not reviewed and periodically updated, a device may fall too far behind its vendor support model to be kept in service.

Theft Router has little intrinsic value, but other assets protected by this device could be attacked if it is compromised.

Page 29: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 29

Likelihood and Consequences Part 2

• Table 8-10 shows:– Consequences evaluated on five levels

Table 8-10 Consequence levels for organizational threats

Level Descriptor Example of Description

1 Insignificant No injuries, low financial loss

2 Minor First aid treatment, onsite release immediately contained, medium financial loss

3 Moderate Medical treatment required, onsite release contained with outside assistance, high financial loss

 4 Major Extensive injuries, loss of production capability, offsite release with no detrimental effects, major financial loss

5 Catastrophic Death, toxic release offsite with detrimental effect huge financial loss

Page 30: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 30

Likelihood and Consequences Part 3

• Table 8-11 shows:– The qualitative likelihood assessment levels

Table 8-11 Likelihood levels for organizational threats

Level Descriptor Explanation

A Almost certain Is expected to occur in most circumstances

B Likely Will probably occur in most circumstances

C Possible Might occur at some time

D Unlikely Could occur at some time

E Rare May occur only in exceptional circumstances

Page 31: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 31© Cengage Learning 2014

Identify Possible Controls

• For each threat and its associated vulnerabilities that have residual risk– The organization should create a preliminary list of

control ideas– Purpose of the list is to identify areas of residual risk

• Residual risk: risk that remains even after the existing control has been applied

• “Controls”, “safeguards”, and “countermeasures” are terms used to describe security mechanisms– Which counter attacks, reduce risk, resolve

vulnerabilities, and improve security

Page 32: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 32© Cengage Learning 2014

Access Controls

• Access controls address the admission of users into trusted areas of the organization– Usually consist of a combination of policies,

programs, and technologies• A number of approaches to, and categories of,

access controls exist:– Mandatory– Nondiscretionary– Discretionary

Page 33: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 33© Cengage Learning 2014

Summary Part 1• Risk management examines and documents an

organization’s information assets• Management is responsible for identifying and

controlling the risks that an organization encounters• A key component of a risk management strategy is the

identification, classification, and prioritization of the organization’s information assets

• Assessment is the identification of assets, including all the elements of an organization’s system

• Elusive assets should be identified and described using knowledge, experience, and judgment

Page 34: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 34© Cengage Learning 2014

Summary Part 2• After identifying and performing a preliminary

classification of information assets, the threats facing an organization should be examined.

• Each information asset is evaluated for each threat it faces.

• The goal of risk assessment is the assignment of a risk rating or score that represents the relative risk for a specific vulnerability of a specific information asset

Page 35: Management of Information Security, 4 th Edition Chapter 8 Risk Management: Identifying and Assessing Risk

Management of Information Security, 4th Edition 35© Cengage Learning 2014

Summary Part 3• Controls, safeguards, and countermeasures should

be identified for each threat and its associated vulnerabilities

• In general, three categories of controls exist: policies, programs, and technologies

• Access controls can be classified as mandatory, discretionary, or nondiscretionary

• The risk identification process should designate what function the resulting reports serve, who is responsible for preparing them, and who reviews them