Uploaded by Veron McLean

Lecture 1 Intro to Computer Security

advertisement
COMPUTER SECURITY CIT4020
UNIT 1: INTRODUCTION TO COMPUTER SECURITY
OBJECTIVES
• Overview of Computer Security in 2020
• What is Computer Security?
• Goals and Types of Computer Security
• Potential Loss due to security breaches
• Recent Data Breaches and attacks
OVERVIEW OF COMPUTER
SECURITY
• Data breaches are on the rise, costing organizations
around the world millions of dollars in revenue.
• Security in 2021 is NO JOKE.
WHAT IS COMPUTER SECURITY?
Computer Security
• Measures and controls that ensure confidentiality, integrity, and availability of information
system assets including hardware, software, firmware, and information being processed,
stored, and communicated.
• Confidentiality, Integrity, and Availability are the three pillars on which Computer Security is
built and is popularly known as the CIA Triad.
GOALS OF COMPUTER SECURITY
• Confidentiality- is a set of rules that limits access to information.
o Cryptography, Encryption, Physical or Virtual Isolation, Background
Checks are some methods to ensure the confidentiality.
• Integrity- is the assurance that the information is trustworthy and
accurate.
o One type of security attack is to intercept some important data and
make changes to it before sending it on to the intended receiver.
o Hashing can be used to ensure data integrity
• Availability - is a guarantee of reliable access to the information by
authorized people.
o Some types of security attack attempt to deny access to the
appropriate user, either for the sake of inconveniencing them, or
because there is some secondary effect.
o Server Clustering, Load Balancing, RAID, Hot Spear, Cloud can
be used to ensure availability
TYPES OF COMPUTER SECURITY
There are several types of Computer Security;
• Access control
• Hardware / Software
• Email
• Database
• Cloud
• IoT /Mobile
• Web
• Wireless
POTENTIAL LOSS DUE TO SECURITY BREACHES
RECENT DATA BREACHES AND ATTACKS
Microsoft
• January 22, 2020: A customer support database holding over 280 million Microsoft customer records was left
unprotected on the web. Microsoft’s exposed database disclosed email addresses, IP addresses, and support
case details. Microsoft says the database did not include any other personal information.
Zoom
• April 14, 2020: The credentials of over 500,000 Zoom teleconferencing accounts were found for sale on the dark
web and hacker forums for as little as $.02. Email addresses, passwords, personal meeting URLs, and host keys
are said to be collected through a credential stuffing attack.
FireEye
• December 8, 2020: One of the world’s largest security firms, FireEye, disclosed an unauthorized third-party actor
accessed their networks and stole the company’s hacking software tools. The highly sophisticated hacker also
attempted to search and gather information related to the company’s government customers.
RISK MANAGEMENT
RISK MANAGEMENT
• Risk Management - The process of identifying risk, as represented by
vulnerabilities, to an organization’s information assets and infrastructure, and
taking steps to reduce this risk to an acceptable level.
• Risk management involves three major undertakings:
o Risk identification is the examination and documentation of the security posture of an
organization’s information technology and the risks it faces.
o Risk assessment is the determination of the extent to which the organization’s information
assets are exposed or at risk.
o Risk control is the application of controls to reduce the risks to an organization’s data and
information systems.
RISK MANAGEMENT PROCESS
The Risk Management Process consists of the following six(6) steps;
1. Identify Assets – ex. Hardware / Software, Information, Inventory, Website, System Services
2. Identify Threats for each asset – Ex. Buffer Overflow Attack, SQL injection on a website, hard drive
failure, theft
3. Analyze Impact – Loss of revenue or business opportunity, loss of money and time due to cost to fix,
loss of production
4. Prioritize (Triage) Threats – Threats must be prioritized based on impact and probability of occurring
so that the more serious threats are dealt with first.
5. Identify Mitigation Techniques - Ex. Firewall, RAID, Server Clustering, Encryption Access Control
6. Evaluate Residual Risks – Re-evaluate the assets and identify any threats that may still be present
TYPES OF RISK ASSESSMENTS
There are two types of Risk Analysis namely;
1. Qualitative
o Involves assigning a value based on a scale to the threat to ascertain its likelihood and consequence
i.e. uses a scale to determine the seriousness of a given threat
o With Qualitative Risk Analysis the risk and mitigation techniques are determined without calculating
the dollar value of the loss.
Risk = Probability (Likelihood)* Loss (Impact)
2. Quantitative
o Involves calculating the dollar figure associated with each risk
o With Quantitative Risk Analysis we need to calculate the dollar amounts for each risk and determine
what the impact of the threat will be to the asset.
QUALITATIVE VS QUANTITATIVE RISK ASSESSMENT
QUALITATIVE ASSESSMENT
Risk Matrix
• A Risk Matrix is a matrix that is used during a risk assessment to define the level of risk by considering
the category of probability or likelihood against the category of consequence severity.
• We begin by identifying the various threats to organization and then create tables for the Probability
and Impact.
• Appropriate scale are chosen to describe the events and values are assigned.
• These two tables will later merge into the matrix for further analysis.
QUALITATIVE RISK ASSESSMENT
• Create a table of the Probability using a predefined scale or a custom scale
•
QUALITATIVE RISK ASSESSMENT
• Create a table of the Impact using a predefined scale or a custom scale
QUALITATIVE RISK ASSESSMENT
QUALITATIVE RISK ASSESSMENT - RISK MATRIX
QUANTITATIVE RISK ASSESSMENT
Calculating Risk
• Exposure Factor (EF) –percentage of the asset’s value that you expect to lose if the threat
occurs.
• Single Loss Expectancy (SLE) –How much money the company will lose each time the threat
occurs.
SLE = Value ($) * Exposure Factor (EF)
• Annual Rate of Occurrence (ARO) –How many time per year the loss will occur
• Annual Loss Expectancy (ALE) –A measure of how much money the company will lose per year
with each threat.
ALE = SLE * ARO
QUANTITATIVE RISK ASSESSMENT
• An ecommerce website has a value of $200,000 and each time the web server has a hard drive failure, you lose 8%
of the asset value. What would be the single loss expectancy? What would be the Annual loss expectancy if this
threat occurs three(3) times a year? What if the hard drive fails once every five(5) years, what would be the annual
loss expectancy?
Solution
• SLE = Value * EF(%)
= $200,000 * 0.08
= $16,000
• ALE = SLE * ARO
= $16000 * 3 = $48,000
• Once every five years;
ALE = $16,000 * 1/5
= $3200
CALCULATING RISK REDUCTION - ROI
Lets say that the hard drive in the webserver hosting the ecommerce site goes down 6 times in a
year and each time it goes down the company loses $60,000 and the cost to replace the hard drive
is $24,000.
What would be the return on the investment (ROI) if the reduction in probability of the risk
occurrence with implemented control is 82%?
Solution:
• Annual Rate of Occurrence (ARO) = 6 times per year
• Expected monetary loss for a single event (SLE) = $60,000
• Cost of control = $24,000
• Reduction in probability of the risk occurrence with implemented control is 82%
CALCULATING RISK REDUCTION -ROI
• Reduction in Risk ($) = Annualized rate of occurrence * Expected monetary loss for a single
event * Reduction in probability of occurrence with implemented control
= 6 * $60,000 * .82 = $295,200
• [Please note: The implemented control would not stop risk from occurring but it would reduce
the amount of money you would lose if it occurred]
• ROI = (Reduction in Risk ($) – Cost of Control) / Cost of Control
= ($295,200 - $24,000) / $24,000 = $271,200 /$24,000
= 11.3
• Savings per year = 11.3 * $24,000 = $271,200
RISK CONTROL STRATEGIES
Download