SecurityRiskMnagt-v3-Sp2012

Risk Management:
Information Technology, Infrastructure and
Security
MBA 8125
Spring 2012
Acknowledgement:: Parts of this session are based upon material from
Cecil Chua, Deb Dey, Kimball, Dorothy Dennings, Ray Panko, Graeme
Payne, Ernst & Young, Gartner Group, Arjan Raven, Jessup and
Valacich, J. Steten, Forrester
Duane Truex
Veda C. Storey
Carl Stucke
Why Study Security?
Country
Privacy
Cyber attacks
Company
Corporate
database attacks
Individual
Tracking,
Spyware
Identity theft
2
What are we willing to accept?
3
Generalized Security Design Model
Threats
1. Destruction
2. Modification
3. Disclosure
Targets
1. Physical
Hardware, facilities, people
2. Software
3. Data
4. Communications
Controls
1. Avoidance
2. Tolerance
3. Mitigation
Sources
1. People
2. Mother nature
4
Generalized Security Design Model
Threats
1. Destruction
2. Modification
3. Disclosure
Targets
1. Physical
Hardware, facilities, people
2. Software
3. Data
4. Communications
Controls
1. Avoidance
2. Tolerance
3. Mitigation
Sources
1. People
2. Mother nature
5
Risk -- (Cost) Benefit Analysis Model
• EC = Pi * ∑Ci
• Ev = Bi - EC
• Overall utility of scenarios
– Where Bi = ∑ j (b i,j X Wj)
– Where Bi is the expected benefit assigned to a strategy I given
its effect on scenario j and where Wj is the weighting given to
scenario j
Q: What is an inherent weakness in this formulation?
Q: Are traditional investment decision metrics adequate?
6
The Big Picture:
Technology Emergence, Impact, Dependency
Technology
Disruptive
•New way of doing things
•Does not meet needs of existing customers
•Opens new markets/destroys old ones
•Start in low end; evolve to high-end
competitors
Sustaining
•Produces improved customer product
•Better / faster / cheaper
“By eliminating time and distance, the Internet makes it possible to perform business in ways not previously
imaginable.” Ref: Baltzan and Phillips, 2011
7
Agenda
Item 1
• Information Technology Infrastructure
Item 2
• Data Set: Sources, Storage, and Challenges
• Risk Management
Item 3
• Organizational Perspectives
• Risk Management Life Cycle
• Business Impact Analysis
• The Digital Firms: Where are the Risks?
• Information Security
Item 4
• Framework
• Unauthorized Access and Human Error
• Four Factors: 1.What you Know 2.What you are 3.What you have 4.Where you are
• Communication Line Access
• Corporate Server Protection
8
Agenda (cont’d)
• Attacks
Item 5
• Why so many attacks?
• Attacks Via Social Engineering
• Attackers
Item 6
• Who Are They?
• Spamming
• Management Issues
Item
7
• Disasters and business continuity planning
• Security levels
• Business value of security
• Takeaways
9
Item 1: Information Technology
Infrastructure
Hardware
Human
Resources
Software
Information
Systems
Infrastructure
Services
Communication
and
Collaboration
Facilities
Jessup & Valacich, 2008
Data and
Knowledge
10
The Data Set
Data Sources and Storage
Data Sources:
What?
Storage:
If you were in charge of protecting
your data assets, where would you
start from a risk management
point of view?
Database
11
Item 2: Data Set
Challenges
Business Strategy
Rules Processes
12
Agenda Item 3: Risk Management
13
Risk Management
Risk
Avoidance
Cost of
Doing
Business
ROI
“Risk management is based on the notion that history repeats itself, but not
quite.” Peter Bernstein
14
Risk Management:
Organizational Perspective
BOARD OF DIRECTORS
RISK MANAGEMENT COMMITTEE
R
E
G
U
L
A
T
I
O
N
S
Strategic
F
I
N
A
N
C
I
A
L
O
P
E
R
A
T
I
O
N
A
L
STRATEGIC
REPUTATION
REVENUE
CREDIT
MARKET
FIDUCIARY
INTELLECTUAL PROPERTY
RISK FINANCING AND INSURANCE
INFO SECURITY AND AVAILABILITY
I
PROJECT MANAGEMENT
T
CAPACITY AND PERFORMANCE
HUMAN CAPITAL
PRIVACY
PHYSICAL SECURITY
R
I
S
K
P
O
L
I
C
I
E
S
BUSINESS UNITS
Copyright © 2002
15
Risk Management Life Cycle:
Mitigation and Risk Abatement
Start/Update Risk Planning
Monitor Results / Initiate Update
Mitigate
Accept
Transfer
Eliminate, avoid, reduce Create/Implement BCP Contractual, risk financing, insurance
Analyze/assess/measure
How much, how often, how related, what business impact?
Identify Risks
Who, what, where, when, why, how?
Inventory Assets
Who, what, what value, what priority?
Adapted From
16
Risk Management:
Business Impact Analysis (BIA)
Competition
Customer service
Lost sales
Productivity
Canceled orders
Legal/contractual obligations
Penalties
Regulatory requirements
Insurance issues
160
140
120
100
Cash flow
Cost to business
Interest expense
80
60
40
20
0
Shareholder
confidence
Day 1
Lost Sales
Day 4
Order Cancel
Week 1
Penalties
Week 2
Interest
Company
viability
17
Risk Management
The Digital Firm: Where Are The Risks?
•Multiple Failure Points
•Human Error
•Performance / Capacity
•Outsourced Service Providers
•Natural Disasters
•Downtime (planned/unplanned)
•Security Incidents
•Links to Third Parties
Source: Laudon & Laudon
18
Agenda Item 4: Information
Security
• Information Security
Item
4
• Framework
• Unauthorized Access and Human Error
• Four Factors:
• What you Know
• What you are
• What you have
• Where you are
• Communication Line Access
• Corporate Server Protection
19
Information Security
Policies, procedures, and technical measures
used to prevent unauthorized access,
alteration, theft, or physical damage to
information systems.
Source: Laudon & Laudon
Primary Issues
• Confidentiality
– no “data spills”
• Integrity
• Availability
Sample Question: Why is “availability” considered a primary issue of information security?
20
Information Security:
Framework for Understanding Challenges in Organizations
Source: Laudon & Laudon
Question: What is the major use of this framework?
21
Unauthorized Access & Human Error
• Strong passwords; change frequently
• Use additional authentication
– something you know, you have, you are, where you are
•
•
•
•
•
Encrypt data
Install anti-virus, anti-spyware, and firewall
Minimize data stored on client
Limit data access to need to know basis
Software Bugs
– Updates and patches
• Input mistakes
– Application controls (http://www.sans.org/top20/ )
• SPAM and Phish
http://images.businessweek.com/ss/05/05/hacker_phishing/index_01.htm
22
Factor One:
What You Know
Attacks against a weak link: passwords
• Brute Force Attack
 Try every combination possible
 Defeated by long passwords
• Default Password Attack
 Check if user never changed password from default
 Defeated by changing password
• Dictionary Attack
 Dictionary of common passwords
 Name, Common words, Famous people, Domain specific
• Good passwords
– Minimum Length – 8 characters
– Passwords should use:
• Lowercase
• Uppercase
• Numbers
• Special characters such as !@#$%^&*(){}[]
– My favorite song is “Sing to the Wind”. Password: “mFSI!19202023”
23
Factor Two:
What You Are
Facial Recognition
Iris Scan
Signature Recognition
Speech Recognition
Retinal Scan
Fingerprint Scan
Biometric examples are from Kelly Rainer.
24
Factor Three:
What You Have
Smart ID Card
Hardware Token
25
Factor Four:
Where You Are
GPS
26
Communications Line Access
• Secure physical communications lines
• Encrypt communications
http://computer.howstuffworks.com/vpn.htm
• Authenticate sender & receiver
• Use digital signatures to prevent
alteration and identify sender
(http://computer.howstuffworks.com/question571.htm )
27
Corporate Server Protection
• Limit external access
– use firewalls
– use anti-virus software
– use “patches” for server software
– use intrusion detection software
• Limit data/functions on servers
• Encrypt data on servers
28
Agenda: Attacks and Attackers
•Attacks
Item 5
Item 6
• Why so many attacks?
• Attacks Via Social Engineering
• Types of Attacks
• Virus
• Denial of Service Attacks
•Attackers
• Who Are They?
• Spamming
29
Why So Many Attacks?
• Today’s Systems
• Internet Growth
• Attackers Organized
– Teach each other and novices
– Exchange tools and information
• Attackers Develop Better Tools
– Build on each other’s work
– Build on work of security community
• Attacks Easy, Low Risk, Hard to Trace
– Investigations difficult; often international
• Lack of Security Awareness, Expertise, or Priorities
– .0025 percent of revenue spent on information security [Forrester]
• Organized Crime involved!
30
Attacks via Social Engineering
• Acquisition of sensitive information or
inappropriate access privileges by an
outsider, based upon the building of an
inappropriate trust relationship with insiders.
Kevin Mitnick
“The World’s Most Famous
Hacker”
• Manipulation of human beings to obtain
information or confidence pertaining to the
security of networked computer systems
(with malicious intent)
We are the weakest link….
http://www.kevinmitnick.com/
31
Social Engineering Tactics &
Defenses
Sarah Granger,
SecurityFocus
Area of Risk
Hacker Tactic
Combat Strategy
Phone (Help
Desk)
Impersonation and persuasion
Train employees/help desk to never give out
passwords or other confidential info by phone
Building entrance
Unauthorized physical access
Tight badge security, employee training, and security
officers present
Office
Shoulder surfing
Don’t type in passwords with anyone else present (or
if you must, do it quickly!)
Phone (Help
Desk)
Impersonation on help desk calls
All employees should be assigned a PIN specific to
help desk support
Office
Wandering through halls looking for
open offices
Require all guests to be escorted
Mail room
Insertion of forged memos
Lock & monitor mail room
Machine
room/Phone
closet
Attempting to gain access, remove
equipment, and/or attach a protocol
analyzer to grab confidential data
Keep phone closets, server rooms, etc. locked at all
times and keep updated inventory on equipment
Phone & PBX
Stealing phone toll access
Control overseas & long-distance calls, trace calls,
refuse transfers
Dumpsters
Dumpster diving
Keep all trash in secured, monitored areas, shred
important data, erase magnetic media
Intranet-Internet
Creation & insertion of mock
software on intranet or internet to
snarf passwords
Continual awareness of system and network changes,
training on password use
Office
Stealing sensitive documents
Mark documents as confidential & require those
documents to be locked
GeneralPsychological
Impersonation & persuasion
Keep employees on their toes through continued
awareness and training programs
32
Attacks
• Virus
– Piece of code embedded in e-mail
attachment
• Denial of Service
– Generate large number of useless service
requests
– Overload and system crash
33
Attackers: Who are they?
34
Attackers: Who are they?
• Kid down the street?
• Professional, working
for your competitors?
• Foreign intelligence
agency?
• Ex-employee?
• Disgruntled coworker?
• “Professional” funded
by organized crime
“It’s really just a bunch of really smart
kids trying to prove themselves. I
know I was.”
– Splurge, sm0ked crew
“It’s power at your fingertips. You can
control all these computers from the
government, from the military, from
large corporations. … That’s power;
it’s a power trip.”
– anonymous
“You do get a rush from doing it –
definitely.”
“I’m like your nosy neighbor on steroids,
basically.”
– Raphael Gray (aka Curador) [stole
and posted 26,000 credit card numbers]
Source: Dorothy Denning
35
Spammers are winning:
And it's not even close
• Size of Problem
– Approximately 150 billion messages/day
• Approximately 2 million email messages / second
• approximately 78% spam
– Mobile Spam
• Defense
– Software
– Can Spam Act 2003:
[Forbids “deceptive subject lines, headers, return addresses,
etc. as well as the harvesting of email addresses from
websites. It requires businesses that send spam to maintain a
do-not-spam list and to include a posting mailing address in
that message.]
http://www.news.com/8301-10784_3-9869269-7.html?part=rss&subj=news&tag=2547-1_3-0-20
36
Agenda: Management Issues
•Management Issues
Item
7
• Disasters and business continuity planning
• Developing Security Service levels
• Business value of security
• Takeaways
• Management Concerns
• Strategic Alignment and business Priorities
• Components for a Successful Information Security Program
• Management Responsibilities
37
Management Challenges: Disasters
(Can and Cannots)
Cannot
– prevent natural disaster
– prevent all human-initiated
disaster
Can
– create business continuity /
disaster recovery plans
– choose where people,
process, and technology
located
Power
outages,
fires, floods
38
Disaster Recovery and Business Continuity
Planning
Question: What is a disaster?
-- 10 users out of service for 1 hour not a disaster
(unless one is the CEO …  )
– 1,000,000 users out of service for 24 hours is disaster
Disaster Recovery: Levels of Backup
•
Hot backup
– Backup of complete system at another site
– Data, operating components of hardware and software
•
Cold backup
– Backup of data only
– No transaction can be processed during downtime
•
Warm backup
– Somewhere in the middle
– Smaller system with full backup of data
– Transactions processed, but more slowly
Pros/cons of each …
Source: A.P. Snow
39
Distribute IS Architectures and Distribute
Organizations to become Resilient
x
100%
•
•
•
•
•
1/5
1/5
1/5
1/5
Network
1/5
1/5
Remove single point of failure so risk spread out geographically
Depends on
– redundancy of human capital necessary to run OR
– ability to transition to backup site
False security if personnel lost in outage, or loss of transportation or
communication systems for transfer of operations
Reliability demands for telecommunication services increase dramatically
Redundancy requirements shift to network services
Ref. A. Snow
40
Management Issues:
Attack Challenges and Trends
• Growing number of attacks (and attackers!)
• Attacks
–
–
–
–
–
Fast, propagate over network
Random
Growing power / sophistication
Automated
Malicious
• Human / Social Behavior
– Always connected
– Widespread use of e-mail and instant messaging
– Wireless access
41
Again, why is this happening?
Information systems
– Complex
– Interact with each other
– Bugs
Integrated systems of digital
enterprise very, very difficult to
secure
Humans are imperfect… 
42
Management Issues:
Delivering a Security Service Level
Process Improvement:
Efficiency/effectiveness:
• How many machines are
involved in each virus incident?
• What is our security spending as
a % of revenue?
• How many weeks between
critical patch issued and
implemented?
• What % of downtime is due to
security incidents?
Attack Resistance:
• What % of known attacks
are we vulnerable to?
• When did we last check?
Internal Crunchiness:
• What % of our software,
people and suppliers have
been reviewed for security?
• What % of critical data is
“strongly” protected?
Source: Gartner
43
Management Issues:
Business Value of Security
•
Cost of inadequate security
• legal liability
•
Value of security
• protect own information assets
• protect assets of customers, employees, business
partners
• assure business continuity
44
Takeaway: Management Concerns
What should you be concerned about?
Topic
Specific concerns
Security and
privacy
• Can you ensure secure operations?
• Who has access to my data, and how is it stored and communicated?
• What data do you collect about me, and how is it used?
Compliance
• Can you help me achieve compliance?
• What about laws and regulations that impact operation?
• Is my data subject to any local regulations?
Legal
• Who is responsible (liability) when things go wrong?
• Intellectual property issue: ownership and rights to use
• How is the data used and stored? For how long?
Entire contents © 2009 Forrester Research, Inc. All rights reserved.
45
Takeaway: Information Security Management:
Strategic Alignment and Business Priorities
Information Security Architecture Methodology
Step 2
Step 1
Strategic Objectives
Business
Environment
Tactical
Issues
Business Requirements
Analysis
Step 3
Organization
Technology
Process
Assessment of Current As- is
and To-Be Architecture
Cost
Time
Business Priorities
Information Security
Roadmap Development
46
Takeaway: 10 Essential Components for a
Successful Information Security Program
1. Make sure the CEO “owns” the information security program.
2. Assign senior-level staff with responsibility for information security.
3. Establish a cross-functional information security governance board.
4. Establish metrics to manage the program.
5. Implement an ongoing security improvement plan.
6. Conduct an independent review of the information security program.
7. Layer security at gateway, server, and client.
8. Separate your computing environment into “zones.”
9. Start with basics and then improve the program.
10. Consider information security an essential investment for your
business.
47
Takeaway: Management Responsibilities
• Policies and Procedures
• Education and Training
– Strong authentication (e.g., 8 character password)
– Social Engineering (recognize, handle)
• Techniques
– Access control (need to know) / authentication (multi-factor: know, have, am,
location)
– Filtering (firewall) ; intrusion detection
– Data encryption (code data transmitted over a link or stored)
– Anti-virus software
• Process
– Continuous evaluation / investment
– Business Continuity Planning
• Vulnerability Assessment & Audit
– Third-party consultant
– Standards (ISO 17799 see http://en.wikipedia.org/wiki/ISO_17799 , http://www.iso-17799.com/ and
http://www.sans.org/score/checklists/ISO_17799_checklist.pdf, ISO 27001,CoBIT, PCI, … )
Based on Kimball
48
Conclusion
• Risk management
– Essential aspect of successful business operation
• Security problems
– Real and growing
– Plan for tomorrow’s threat environment
• Security measures
– Multiple protection measures
– Ongoing update and evaluation
– People greatest risk (and greatest asset)
• Hope for Future . . .
– Increased security awareness / priority
– Growing number of security experts
– Laws to facilitate investigations
– International cooperation to fight cyber crime
49
Appendices
50
Other Resources
• CERT Podcasts
• CyberCIEGE Movies
The Executive Guide to Information Security: Threats, Challenges, and Solutions (Symantec
Press).
http://www.amazon.com/gp/product/0321304519/sr=1-1/qid=1239277259/ref=olp_product_details?ie=UTF8&me=&qid=1239277259&sr=1-1&seller
51
Sample Firewall Configuration
Firewall
Firewall
HTTP
request
(cleartext
or SSL)
Web
Client
SQL
Database
DMZ
Web app
Web
Server
Web app
Web app
Web app
HTTP reply
(HTML,
Javascript,
etc)
(Also see http://computer.howstuffworks.com/firewall.htm )
DB
DB
Intrusion Detection Systems
Also see http://en.wikipedia.org/wiki/Intrusion_detection_system
Extranet
Protection
Business
Partner
Internet Protection
Users
Monitors Partner
Traffic Where
“Trust” is Implied
But Not Assured
Data Center
Corporate
Office
Complements FW and
VPN by Monitoring
Traffic for Malicious
Activity
Internet
Intranet/Internal
Protection Protects
Data Centers and
Critical Systems
from Internal Threats
Remote Access
Protection Hardens
Server Farm
Protection Protects
Perimeter Control by
Monitoring Remote
Users
e-Business Servers
from Attack and
Compromise
DMZ
Servers
High-availability facilities feature sturdy construction, air conditioning, backup generators, fire suppression systems, access
control, and intrusion detection systems.
Source: http://www.fastservers.net/products-services/colocation-data-center.html