information systems security information security & risk management

37
Information Systems Security Information Security & Risk Management

Post on 19-Dec-2015

264 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Information Systems Security Information Security & Risk Management

Information Systems Security

Information Security

&

Risk Management

Page 2: Information Systems Security Information Security & Risk Management

Core Principles

Confidentiality – only authorized nodes have access to information on need-to-know basis

Integrity – Information should be protected from intentional, unauthorized, or accidental change

Availability – Information is accessible by users when needed

Page 3: Information Systems Security Information Security & Risk Management

Security Concepts

Privacy Authentication Authorization Auditing Non-repudiation

Page 4: Information Systems Security Information Security & Risk Management

Type of Policies

Regulatory– Ensures company is following standards– More detailed in nature– Specific to type of industry

Advisory– Outlines expected behaviors in a company and

the associated ramifications

Page 5: Information Systems Security Information Security & Risk Management

Policies Con’td

Informative– Tool to teach employees about specific issues– Not enforceable

Page 6: Information Systems Security Information Security & Risk Management

BS/ISO 7799

Address topics in terms of policies and best practices– Organizational security policy– Asset classification– Personnel security– Physical/environmental safety– Communications security– Access control– BCP– Compliance

Page 7: Information Systems Security Information Security & Risk Management

Components of a Security Policy

Policy – Must be – Virus protection

Guides – Should be– Recommend McAfee

Standards – Will be– Will be installed on all systems

Procedures – How to– Will be updated each week from server

Control – Has it? Does it?

Page 8: Information Systems Security Information Security & Risk Management

Senior Management Role

Defines the scope, objectives, priorities, and strategies of the security program

Provides vision, funds, and enforcement Ultimately liable Without support, efforts will be doomed from

the start

Page 9: Information Systems Security Information Security & Risk Management

Security Roles

Data Owner– Data classification– Sets security requirements

System Owner– Responsible for computer system– One system – One owner

Page 10: Information Systems Security Information Security & Risk Management

Security Roles

Data Custodian– Data maintenance tasks– Implements and maintains controls to provide

necessary protection

User– Person who routinely uses company data

Page 11: Information Systems Security Information Security & Risk Management

Information Classification

Determine the value of data– Role of data– Liability if disclosed– Cost to gather– Value that opposition would pay

Classify Information– Pertaining to availability, integrity, and

confidentiality issues per data set– Assign a classification level

Page 12: Information Systems Security Information Security & Risk Management

Classification Con’td

Decide on Controls– Controls are implemented to protect data at

each classification level– Each classification level has different handling

procedures

Page 13: Information Systems Security Information Security & Risk Management

Classification Criteria

Criteria Items– Usefulness and value– Level of damage possible– Law and regulations– Who should access? Who should maintain?– Who should monitor? Who should audit?– How long will protection be required

Page 14: Information Systems Security Information Security & Risk Management

Military Classification Levels

Top Secret– Drastic effects and critical damage to NS

Secret– Significant effect and critical damage to NS

Confidential– Noticeable effects and serious damage to NS

Sensitive but Unclassified– Not cause significant damage if disclosed

Unclassified

Page 15: Information Systems Security Information Security & Risk Management

Commercial Classifications

Confidential– Extremely sensitive and for internal use only

Private– Personal data for internal use only

Sensitive– Negative impact if disclosed

Public– No negative impact if disclosed

Page 16: Information Systems Security Information Security & Risk Management

How is Liability Determined?

Due Diligence – Identifying threats and risks– Uncover potential dangers– Carry out assessments– Perform analysis on assessment data– Implement risk management– Research vulnerabilities and risks

Page 17: Information Systems Security Information Security & Risk Management

Liability Con’td

Due Care – Acting upon findings to mitigate risks– Doing the right thing– Implementing solutions based on analyses– Properly protecting the company and its assets– Acting responsibly

Prudent Person Rule– Perform duties that prudent and responsible

people would exercise in similar circumstances

Page 18: Information Systems Security Information Security & Risk Management

Risk Assessment

Identify Vulnerabilities – a flaw or weakness in system security procedures or controls that can be exploited and result in a breach

Threats – potential for a particular threat to successfully exercise a vulnerability

Page 19: Information Systems Security Information Security & Risk Management

Risk Management

Reduce– Implement safeguards

Assign– Transfer risks to another entity

Accept– Agreed to accept the consequences

Reject– Ignore that the risk exists

Page 20: Information Systems Security Information Security & Risk Management

Risk Management is Hard

Trying to predict the future Incredible number of variables Surmising all possible threats Gathering data from many sources Dealing with many unknowns Quantifying qualitative items

Page 21: Information Systems Security Information Security & Risk Management

Valuating an Asset

Cost of acquisition Replacement cost Cost of development Role of the asset in the company Amount of worth to competition Cost of maintain and protecting Production Losses Liability

Page 22: Information Systems Security Information Security & Risk Management

Categorizing Risk Analysis

Immediate vs. Delayed Loss Quantitative

– Numeric and monetary values available– Management likes it better

Qualitative– Opinion based– Uses rating system– Scenario based

Page 23: Information Systems Security Information Security & Risk Management

Qualitative Analysis

Gather company experts Present risk scenarios Rank seriousness of threats Rank countermeasures

DELPHI METHOD– Anonymous – More honest – No intimidation

Page 24: Information Systems Security Information Security & Risk Management

Quantitative Analysis

ALE (Annualized Loss Expectancy)– Expected monetary loss for an asset due to a

risk over a 1-year period. ALE = SLE * ARO

SLE (Single Loss Expectancy)– Asset Value X Exposure Factor (EF)– EF = Percentage of loss that could be

experienced

Page 25: Information Systems Security Information Security & Risk Management

Quantitative Con’td

ARO – Annualized Rate of Occurrence– Probability that a risk will occur in a year

Fire will reduce building usage by 3/4– EF = 75%

Probability that fire occurs every 10 years– ARO = .10

Page 26: Information Systems Security Information Security & Risk Management

Quantitative Con’td

Building Asset Valued at $1M– SLE = $1M * .75 = $750K– ALE = $750K * .10 = $75K

If a company’s website is attacked, it will cause 40% damage. The threat is estimated to happen once a year. The website is valued at $300K. What is the cap to be spent on safeguards?

Page 27: Information Systems Security Information Security & Risk Management

Cost/Benefit of Countermeasure

ALE prior to Countermeasure –– ALE after Countermeasure –

Annual Cost of Countermeasure =– Cost/Benefit of Countermeasure

ALE of web disruption = $40K ALE after countermeasure = $24K Cost of countermeasure = $2K/annually Benefit of countermeasure = $23K

Page 28: Information Systems Security Information Security & Risk Management

Eliminate ALL Risks?

Total Risk Versus Residual Risk– Amount of risk that exists before a safeguard is

put into place in total risk– After safeguard installed, the remaining risk is

residual risk Threat x Vulnerability x Asset Value = TR TR x Control Gap = RR

Page 29: Information Systems Security Information Security & Risk Management

Mitigate Risk

Team presents the analysis results to management

Management makes the decision about the next steps

Transfer the risk (insurance) Reduce the risk (control) Accept the risk (informed decision) Reject the risk (no decision made)

Page 30: Information Systems Security Information Security & Risk Management

Liability of Actions

Accepting Risks– Carried out in due diligence– Made an informed business decision– Better change of not being found negligent

Reject Risks– Did not practice due diligence– Decision based on ignorance of the issue– Most likely will be found negligent

Page 31: Information Systems Security Information Security & Risk Management

Employee Management

Weakest link in security is people Proper management of employees needed Communication structure in place Management structure in place Enforce acceptable usage policy Rotation of duties 20/80 Rule

Page 32: Information Systems Security Information Security & Risk Management

Employee Security Management

Separation of duties Job responsibilities Job rotation Background checks Employee agreements

Page 33: Information Systems Security Information Security & Risk Management

Firing Issues

Complete an exit interview Non-disclosure agreements Collect keys and escort out of building Disable accounts

Page 34: Information Systems Security Information Security & Risk Management

Ethics – ISC2

Four canons– Protect society and the infrastructure– Act honorably, justly, responsibly, and legally– Provide diligent and competent service– Advance and protect the profession

Page 35: Information Systems Security Information Security & Risk Management

Ethics - CEI

Compute Ethics Institute– Non-profit organization to stimulate awareness

of the ethical issues of technology– Tries to help balance civil liberty and

government monitoring– Provides advisory and consultative activities,

research, education, and public outreach

Page 36: Information Systems Security Information Security & Risk Management

Ethics - IAB

Internet Advisory Board– Coordinating committee for Internet design– Two task forces:

Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF)

– Internet use to be seen as a privilege and should be treated as such

Page 37: Information Systems Security Information Security & Risk Management

IAB Standards

Unethical behavior includes:– Seeking to gain unauthorized access to Internet– Disrupting the normal use of the Internet– Wasting resources through purposeful actions– Destroying the integrity of computer information– Compromising the privacy of others– Involving negligence in the conduct of Internet-

wide experiments