0% found this document useful (0 votes)
2 views34 pages

Risk Managment Process

The document outlines the importance of risk management in computer security, detailing its definition, processes, and techniques for identifying and prioritizing risks to information assets. Key concepts include the roles of assets, threats, and vulnerabilities, as well as the steps involved in risk identification and assessment. It emphasizes the need for organizations to systematically evaluate risks to protect their information systems effectively.

Uploaded by

mupinibrendon12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views34 pages

Risk Managment Process

The document outlines the importance of risk management in computer security, detailing its definition, processes, and techniques for identifying and prioritizing risks to information assets. Key concepts include the roles of assets, threats, and vulnerabilities, as well as the steps involved in risk identification and assessment. It emphasizes the need for organizations to systematically evaluate risks to protect their information systems effectively.

Uploaded by

mupinibrendon12
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

CSE 3482

Introduction to Computer Security

Security
Risk Management

Instructor: N. Vlajic, Winter 2017


Required Reading

Computer Security, Stallings: Section 14.3 & 14.4


Learning Objectives

Upon completion of this material, you should be able to:


• Define risk management and its role in an organization.
• Use risk management techniques to identify and
prioritize risk factors for information assets.
• Asses risk based on the likelihood of adverse events and
the effect on information assets when events occur.
• Document the results of risk identification.
• Detail risk treatment alternatives.
True Story
A company suffered a catastrophic
loss one night when its office burned
to the ground.
As the employees gathered around the charred remains
the next morning, the president asked the secretary if
she had been performing the daily computer backups.
To his relief she replied that yes, each day before she went
home she backed up all of the financial information,
invoices, orders ...
The president then asked the secretary to retrieve the
backup so they could begin to determine their current
financial status.
“Well”, the secretary said, “I guess I cannot do that. You
see, I put those backups in the desk drawer next to the
computer in the office.”
M. Ciampa, “Security+ Guide to Network Sec. Fundamentals”, 3rd Edition, pp. 303
Introduction

“Investing in stocks carries a risk …”

“Bad hand hygiene (not washing hands) carries a risk …”

“Car speeding carries a risk …”

“An outdate (not updated) anti-virus software


carries a risk …”
Definition of Risk
• Risk – likelihood that a chosen action or activity
(including the choice of inaction) will lead to a
loss (un undesired outcome)

• Risk Management – identification, assessment,


and prioritization of risks followed by coordinated
use of resources to monitor, control or minimize
the impact of risk-related events or to maximize
the gains.
 examples: finances, industrial processes, public health
and safety, insurance, etc.
 one of the key responsibilities of every manager within
an organization
http://en.wikipedia.org/wiki/Risk_management
Risk in Information Security
• Risks in Info. Security – risks which arise from an
organization’s use of info. technology (IT)
 related concepts: asset, vulnerability, threat

http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter7.html
Risk in Information Security (cont.)
• Asset – anything that needs to be protected because it
has value and/or contributes to the successful
achievement of the organization’s objectives

• Threat – any circumstance or event with the potential


to cause harm to an asset and/or result in harm
to organization

• Vulnerability – a weakness in an asset that can be


exploited by threat

• Risk – probability of a threat acting upon a vulnerability


causing harm to an asset
Risk in Information Security (cont.)
• Interplay between Risk & other Info. Sec. Concepts
http://blog.patriot-tech.com/
Risk in Information Security (cont.)
• Asset, Threat, Vulnerability & Risk in Info. Sec.
http://en.wikipedia.org/wiki/File:2010-T10-ArchitectureDiagram.png
Risk in Information Security (cont.)
• Key Risk-Related Question: Which vulnerabilities,
in which assets, should we worry about (i.e., remove)?

Asset 1
vulnerability 1
vulnerability 2

vulnerability n
Agent 1 Event 1
Threats
Agent 2 Event 2
… …
Agent m Event k
Security Risk Management
• Security Risk Management – process of identifying
vulnerabilities in an organization’s info. system
and taking steps to protect the CIA of all of its
components.
 two major sub-processes: Identify
the
Risk Areas
Risk Identification &
Assessment
Risk Control (Mitigation) Re-evaluate
the Risks Assess the
Risk Risks

Management
Cycle
Implement Risk
Management Develop Risk
Actions Management
Plan
12
Security Risk Management (cont.)

Risk Management
Risk Identification Risk Control

Identify & Prioritize Assets


Cost-Benefit Analysis

Identify & Prioritize Threats


Avoid
Identify Vulnerabilities
Control
between Assets and Threats
(Vulnerability Analysis)
Transfer
Risk Assessment
Mitigate
Calculate Relative Risk
of Each Vulnerability Accept
Risk Identification
Risk Identification:
Asset Inventory
Risk Identification: Asset Inventory

• Risk identification begins with identification of all


information assets, including:
1) Which
traffic is let
into intranet.
2) Backup
procedure.

 No prejudging of asset values should be done at this stage


– values are assigned later!
Risk Identification: Asset Inventory (cont.)

• Identifying Hardware, Software & Networking Assets


 Can be done automatically (using specialized software)
or manually.
 Needs certain planning – e.g. which attributes of each
asset should be tracked, such as:
 name – tip: naming should not convey critical info to potential attackers
 asset tag – unique number assigned during acquisition process
 IP address
 MAC address
 software version
 serial number
 manufacturer name
 manufacturer model or part number
Risk Identification: Asset Inventory (cont.)

Example: Network Asset Tracker

http://www.misutilities.com/
http://www.misutilities.com/network-asset-tracker/howtouse.html
Risk Identification: Asset Inventory (cont.)
• Identifying People, Procedures and Data Assets
 Not as readily identifiable as other assets – require that
experience and judgment be used.
 Possible attributes:
 people – avoid personal names, as they may change, use:
∗ position name
∗ position number/ID
∗ computer/network access privileges
 procedures
∗ description
∗ intended purpose
∗ software/hardware/networking elements to which it is tied
∗ location of reference-document, …
 data
∗ owner
∗ creator
∗ manager
∗ location, …
Risk Identification:
Asset Ranking/Prioritization
Risk Identification: Asset Ranking

• Assets should be ranked so that most valuable assets


get highest priority when managing risks.

 Questions to consider when determining asset value/rank:


1) Which info. asset is most critical to overall success of
organization?

Example: Amazon’s ranking assets


Amazon’s network consists of regular desktops and web servers.
Web servers that advertise company’s products and receive orders
24/7 - critical.
Desktops used by customer service department – not so critical.
Risk Identification: Asset Ranking (cont.)

2) Which info. asset generates most revenue?

3) Which info. asset generates highest profitability?

Example: Amazon’s ranking assets


At Amazon.com, some servers support book sales (resulting in
highest revenue), while others support sales of beauty products
(resulting in highest profit).

4) Which info. asset is most expensive to replace?

5) Which info. asset’s loss or compromise would be most


embarrassing or cause greatest liability?
Risk Identification: Asset Ranking (cont.)
Risk Identification: Asset Ranking (cont.)

Example: Weighted asset ranking (NIST SP 800-30)


Not all asset ranking questions/categories may be equally important
to the company.
A weighting scheme could be used to account for this …
Each criteria is assigned a weight (0 – 100), must total 100!
information transmitted:

Each asset is
assigned a
Data asset /

score (0.1-1.0)
for each critical
factor.
Risk Identification:
Threat Identification
& Prioritization
Risk Identification: Threat Identification

• Now that assets are known, we should see if threats


to those assets exist …

Asset 1
vulnerability 1
vulnerability 2
vulnerability 3

vulnerability n
Agent 1 Event 1
Threats
Agent 2 Event 2
… …
Agent m Event k
Risk Identification: Threat Identification

• Any organization faces a wide variety of threats.


• To keep risk management ‘manageable’ …
 realistic threats must be identified and further investigated,
while unimportant threats should be set aside

Example: CSI/FBI survey of types of threats/attacks


Risk Identification: Threat Identification

Example: PwC Report “US Cybercrime: Rising Risks,


Reduced Readiness” (2014)
http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

Significant Detected Incidents Across Industries:


Risk Identification: Threat Identification

Example: PwC Report “US Cybercrime: Rising Risks,


Reduced Readiness” (2014)
http://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf

Significant Detected Incidents Across Industries:


Risk Identification: Threat Identification (cont.)

• Threat Modeling/Assessment – practice of building


an abstract model of how an attack may proceed and
cause damage [attacker-, system-, or asset- centric]

 Attacker-centric – starts from attackers, evaluates their


motivations and goals, and how they might achieve them
through attack tree.

http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Identification (cont.)

• Threat Modeling/Assessment
 System-centric – starts from model of system, and
attempts to follow model dynamics and logic, looking
for types of attacks against each element of the model.

http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Identification (cont.)

• Threat Modeling/Assessment
 Asset-centric – starts from assets entrusted to a system,
such as a collection of sensitive personal information, and
attempts to identify how CIA security breaches can happen.

http://www.uio.no/studier/emner/matnat/ifi/INF3510/v12/learningdocs/INF3510-2012-L03.pdf
Risk Identification: Threat Prioritization

• Questions used to prioritize threats:


 Which threats present a danger to organization’s assets
in its current environment? ( ‘pre-step’ )
 Goal: reduce the risk management’s scope and cost.
 Examine each category from CSI/FBI list, or as identified
through threat assessment process, and eliminate any that
do not apply to your organization.

 Which threats represent the most danger … ?


 Goal: provide a rough assessment of each threat’s potential
impact given current level of organization’s preparedness.
 ‘Danger’ might be a measured of:
1) probability that the threat attacks organization
2) severity, i.e. overall damage that the threat could create
Risk Identification: Threat Prioritization (cont.)

• Other questions used to assess/prioritize threats:


 How much would it cost to recover from a successful
attack?
 Which threats would require greatest expenditure
to prevent?

• Threat ranking can be quantitative or qualitative.

• Once threats are prioritized, each asset should be reviewed


against each threat to create a specific list of vulnerabilities.

You might also like