now

advertisement
1
RISK MANAGEMENT – PART 2
Lecture #3
Learning Objectives
2



Understand how risk is identified
Understand how risk is assessed
Being able to generate a document for risk assessment
Threats
3
Threat: an object, person, or other entity that represents a
constant danger to an asset
 Management must be informed of the different threats facing
the organisation
 By examining each threat category, management effectively
protects information through policy, education, training, and
technology controls

Top Security Threats 2016
4

http://www.itnext.in/article/2016/01/14/cyber-attack-disrupting-critical-infrastructure-2016-likelihood-say-security
Threats
5

Groups that represent the greatest threats:
 Hackers
22%
 Current and former employees 21%
 Foreign countries 11%
 Hacktivists 5%
Threats
6
Threats are divided into twelve categories (see next
slide)
 These twelve categories are organised into five groups:

Inadvertent acts
 Deliberate acts
 Acts of God
 Technical failures
 Management failures

Threats
7
Threat Group 1: Inadvertent Acts
8
Malicious intent is absent and cannot be proven
 Two threat categories:

Acts of human error or failure
 Deviations in quality of service by service providers

8
Acts of Human Error or Failure
9
Includes acts performed without malicious intent
 Employees are among the greatest threats to an
organisation’s data
 Social engineering

 419
fraud
 Phishing
9
Acts of Human Error or Failure
10
Deviations in Quality of Service
11
Includes situations where products or services not
delivered as expected
 This degradation is a form of availability disruption
 Internet service, communications, and power
irregularities dramatically affect availability of information
and systems

11
Internet Service Issues
12
Internet service provider (ISP) failures can considerably
undermine availability of information
 Outsourced Web hosting provider assumes responsibility
for all Internet services as well as hardware and Web
site operating system software
 SLAs are usually arranged

12
Power Irregularities
13
Lead to fluctuations such as power excesses, power
shortages, and power losses
 The voltage levels:

Spike
 Surge
 Sag


 Brownout
 Blackout
Uninterruptible power supply (UPS)
13
Deviation in Quality of Services
14
Threat Group 2: Deliberate Acts
15
Purposeful acts to harm people, organisations or culture
 Six threat categories:

Deliberate acts of espionage or trespass
 Deliberate acts of information extortion
 Deliberate acts of sabotage or vandalism
 Deliberate acts of theft
 Deliberate acts of software attacks
 Compromises to intellectual property

15
Deliberate Acts of Espionage or Trespass
16
Access of protected information by unauthorized
individuals
 Competitive intelligence (legal) vs. industrial espionage
(illegal)
 Shoulder surfing occurs anywhere a person accesses
confidential information

16
Shoulder Surfing
17
17
Deliberate Acts of Espionage or Trespass
18

Escalation of privileges
 Jailbreaking
 Rooting

Authentication and authorisation
18
Hacker vs Script Kiddie
19
19
Deliberate Acts of Information Extortion
20
Attacker steals information from computer system and
demands compensation for its return or nondisclosure
 Commonly done in credit card number theft

20
Deliberate Acts of Sabotage or Vandalism
21
Attacks on the face of an organisation—its Web site
 Threats can range from petty vandalism to organised
sabotage
 Web site defacing can erode consumer confidence,
dropping sales and organisation’s net worth
 Hacktivism

21
Deliberate Acts of Theft
22
Illegal taking of another’s physical, electronic, or
intellectual property
 The property can be physical, electronic or intellectual
 Physical theft is controlled relatively easily
 Electronic theft is more complex problem; evidence of
crime not readily apparent

22
Deliberate Software Attacks
23
Malicious software (malware) designed to damage,
destroy, or deny service to target systems
 Includes viruses, worms, Trojan horses and denial-ofservices attacks

23
Deliberate Software Attacks
24

Polymorphism


A polymorphic threat is one that changes its apparent shape
over time, representing a new threat not detectable by
techniques that are looking for a preconfigured signature
Virus and worm hoaxes

Random emails warning of the latest and most dangerous
viruses that are fictitious
24
Compromises to Intellectual Property
25
Intellectual property (IP): “ownership of ideas and control
over the tangible or virtual representation of those ideas”
 The most common IP breaches involve software piracy
 Enforcement of copyright law has been attempted with
technical security mechanisms

Digital watermark
 Embedded code
 Online registration

25
Threat Group 3: Acts of God
26
Threats that result from forces of nature that cannot be
prevented or controlled
 One threat category:


Forces of nature
26
Forces of Nature
27
Forces of nature are among the most dangerous threats
 Organisations must implement controls to limit damage
and prepare contingency plans for continued operations

27
Forces of Nature
28






Fire
Flood
Earthquake
Lightning
Landslide/mudslide
Tornado or severe windstorm
Hurricane or typhoon
 Tsunami
 Electro-static discharge
 Dust contamination

28
Threat Group 4: Technical Failures
29
Sometimes machines break in unexpected ways
 Two threat category:


Technical hardware failures or errors
Technical
software failures or errors
29
Technical Hardware Failure or Errors
30

Intel Pentium CPU Failure
 Bug
in simple mathematic calculations
 Floating point division (FDIV)
 Loss of over $475 million
Technical Hardware Failure or Errors
31





Mean time between failure (MTBF)
Mean time to diagnose (MTTD)
Mean time to failure (MTTF)
Mean time to repair (MTTR)
MTBF = MTTF + MTTD + MTTR
Hard drive:
 An
average MTBF is 500,000 hours
Technical Software Failures and Errors
32
Threat Group 5: Management Failures
33
Lack of planning and foresight to anticipate the
technology needed for evolving business requirements
 One threat category:


Technological obsolescence
33
Technological Obsolescence
34
Antiquated/outdated infrastructure can lead to unreliable,
untrustworthy systems
 Management’s strategic planning should always include
an analysis of the current technology in the organisation
 Proper managerial planning should prevent technology
obsolescence; IT plays large role

34
Attacks
35
Password crack: attempting to reverse calculate a
password
 Brute force: trying every possible combination of options
of a password
 Dictionary: selects specific accounts to attack and uses
commonly used passwords (i.e., the dictionary) to guide
guesses

35
Attacks
36

Denial-of-service (DoS): attacker sends large number of
connection or information requests to a target
Target system cannot handle successfully along with other,
legitimate service requests
 May result in system crash or inability to perform ordinary
functions


Distributed denial-of-service (DDoS): coordinated
stream of requests is launched against target from many
locations simultaneously
36
Attacks
37
Spoofing: technique used to gain unauthorised access;
intruder assumes a trusted IP address
 Sniffers: program or device that monitors data traveling
over network; can be used both for legitimate purposes
and for stealing information from a network

37
Attacks
38

“People are the weakest link. You can have the best technology;
firewalls, intrusion-detection systems, biometric devices ... and somebody
can call an unsuspecting employee.” — Kevin Mitnick
38
Threat Identification
Realistic threats need investigation; unimportant threats
are set aside
 Threat assessment:

Which threats present danger to assets?
 Which threats represent the most danger to information?
 How much would it cost to recover from attack?
 Which threat requires greatest expenditure to prevent?

39
Vulnerability Identification
Examine how each threat could be perpetrated and list
organisation’s assets and vulnerabilities
 Process works best when people with diverse
backgrounds within organisation work iteratively in a
series of brainstorming sessions
 At end of risk identification process, list of assets and
their vulnerabilities is achieved

40
Vulnerability Identification
41
Risk Assessment
Risk assessment evaluates the relative risk for each
vulnerability
 Assigns a risk rating or score to each information asset

42
Risk Identification Estimate Factors
Risk is
the likelihood of the occurrence of a vulnerability
multiplied by
the value of the information asset
minus
the percentage of risk mitigated by current controls
plus
the uncertainty of current knowledge of the vulnerability
43
Likelihood
The overall rating of the probability that a specific
vulnerability within an organisation will be successfully
attacked
 Assign a numeric value for the likelihood, e.g., 0.1 to 1.0

44
Valuation of Information Assets
Assign weighted scores for value of each asset; actual
number used can vary with needs of organisation
 Done in the asset valuation process

45
Percentage of Risk Mitigated by Current Controls
If a vulnerability is fully managed, it no longer needs to
be considered
 If it is partially controlled, estimate what percentage of
the vulnerability has been controlled

46
Uncertainty

Apply judgment to add a factor into the equation to allow
for an estimation of the uncertainty of the information
47
Risk Determination

For the purpose of relative risk assessment, risk equals:
Likelihood of vulnerability occurrence TIMES value (or
impact)
 MINUS percentage risk already controlled
 PLUS an element of uncertainty

48
Risk Determination (Example)

Information asset A has a value score of 50 and has
one vulnerability: Vulnerability 1 has a likelihood of 1.0
with no current controls; and you estimate that
assumptions and data are 90 percent accurate.
49
Risk Determination (Example)

Information asset B has a value score of 100 and has
two vulnerabilities: Vulnerability 2 has a likelihood of 0.5
with a current control that addresses 50 percent of its
risk; vulnerability 3 has a likelihood of 0.1 with no
current controls. You estimate that assumptions and
data are 80 percent accurate.
50
Documenting the Results of Risk Assessment
Final summary comprised in ranked vulnerability risk
worksheet
 Worksheet details asset, asset impact, vulnerability,
vulnerability likelihood, and risk-rating factor
 Ranked vulnerability risk worksheet is initial working
document for next step in risk management process:
assessing and controlling risk

51
Risk Factor Worksheet
52
Summary
53




Threats
Attacks
Risk assessment
Risk factor report
Download