cist 1601 information security fundamentals chapter 1 measuring and weighing risk collected and...

21
CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Technology Albany Technical College

Upload: lynn-porter

Post on 25-Dec-2015

236 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

CIST 1601 Information Security Fundamentals

Chapter 1 Measuring and Weighing Risk

Collected and CompiledBy JD WillardMCSE, MCSA, Network+, Microsoft IT Academy AdministratorComputer Information Systems TechnologyAlbany Technical College

Page 2: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Identifying Assets

Asset identification is the process of identifying the types and values of assets in an organization.In some cases, the process may be as simple as counting systems and software licenses. The more difficult part of an asset-identification process is attempting to assign values to information. In some cases, you may only be able to determine what would happen if the information were to become unavailable or lost. If absence of this information would effectively shut down the business, the information is priceless.

Page 3: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

There are several ways to perform a risk assessment or risk analysis.

They range from highly scientific formula-based methods to a conversation with the owner.

The cost of an event and the probability that an event will occur are two of the most important factors to consider when you’re formulating a risk assessment.

In general, you should attempt to identify the costs of replacing stolen data or systems, the costs of downtime, and virtually any risk factor you can imagine.

You can move to risk assessment only after completing the asset identification.

After you’ve determined the costs, you can then evaluate the likelihood that certain types of events will occur and the most likely outcome if they do occur.

Risk Assessment

Page 4: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Risk AssessmentRisk assessment helps align security objectives with business objectives. Risk analysis is part of the disaster recovery plan.

Risk analysis is the process of identifying assets and their associated threats, vulnerabilities, and potential risks, and justifying the cost of countermeasures deployed to mitigate the loss. It is important to note that risk analysis is focused on a cost-benefit analysis of countermeasures, and not on the selection of countermeasures.

Risk analysis also measures the amount of loss that an organization can potentially incur if an asset is exposed to loss. During the process of risk assessment, it is necessary to review many areas, such as the following:

Methods of accessAuthentication schemesAudit policiesHiring and release proceduresIsolated services that may provide a single point of failure or avenue of compromiseData or services requiring special backup or automatic failover support.

The following are the four major objectives of a risk analysis, in order of execution:

1. To identify all existing assets and estimate their monetary value.2. To identify vulnerabilities and threats to information assets. Vulnerability is a weakness in the system, software, hardware, or procedure. A threat agent, leading to a risk of loss potential, can exploit this weakness. A virus is an example of a threat agent, and the possibility of a virus infecting a system is an example of a threat.3. To quantify the possibility of threats and measure their impact on business operations.4. To provide a balance between the cost of impact of a threat and the cost of implementing the safeguard measures to mitigate the impact of threats.

Risk Avoidance (3:10)

Page 5: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Risk Avoidance Some risks can be eliminated through a change in the technology, policy, or mechanism of employment. For example, the risk of “war-dialing” attacks can be eliminated by removing legacy dial-up telephony modem devices.

Risk Transference A risk may be transferred, such as when the risk of equipment loss is covered by a full-replacement insurance policy.

Risk Mitigation Most risks fall into the mitigated response area, where the application of additional effort may reduce the risk to a level documented as acceptable.

Risk Deterrence Risk deterrence involves understanding something about the enemy and letting them know the harm that can come their way if they cause harm to you. This can be as simple as posting prosecution policies on your login pages and convincing them that you have steps in place to identify intrusions and act on them.

Risk Acceptance Some risks cannot be addressed within a reasonable time or cost constrained and may be accepted, with proper documentation as to the reasons why the risk is acceptable.

Acting on Your Risk Assessment

Page 6: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

The annualized rate of occurrence (ARO) signifies the probability of an event occurring within a year. This conclusion is usually based on referencing historical data. This measure can be used in conjunction with a monetary value assigned to data to compute single loss expectancy (SLE) and annual loss expectancy (ALE) values.

SLE refers to the quantitative amount of loss incurred by a single event when a threat takes place.SLE equals the asset value (AV) multiplied by the threat exposure factor (EF). The exposure factor or probability is the percentage of loss that a realized threat could have on a certain asset.

For example, a virus hits five computer systems out of 100 before it is prevented by the safeguard from further infecting the other 95 computers, resulting in a loss of five percent of the computers. If the asset value of 100 computers is $10,000, then the exposure factor will be $500, which is five percent of the total asset value.The formula for calculating SLE is: AV x EF = SLE. From the previous example: $10,000 x 5% = $500. Annual loss expectancy (ALE) refers to the loss potential of an asset for a single year. ALE equals the single loss expectancy (SLE) times the annualized rate of occurrence (ARO)When you’re computing risk assessment, remember this formula: SLE x ARO = ALEThus, if you can reasonably expect that every SLE will be equivalent to $1,000 and that there will be seven occurrences a year (ARO), then the ALE is $7,000. Total risk can be calculated by multiplying the threats, the vulnerabilities, and the asset value.Total risk = threats x vulnerabilities x asset value.

Risk AssessmentRisk Calculations (5:11)

Page 7: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Risks Associated with Cloud ComputingCloud computing means using the Internet to host services and data instead of hosting it locally. Some examples would be to run Office-like applications from the Web (such as Google Docs) instead of having the applications installed on each workstation, storing data on server space rented from Amazon, using sites such as Salesforce.com, etc.

Three ways to implement cloud computing:Platform as a Service – Also known as cloud platform services. Vendors allow apps to be created and run on their infrastructure. i.e. Amazon Web Services and Google Code.Software as a Service – Applications are remotely run over the Web. No local hardware is required and no software apps need be installed on the machine accessing the site. i.e. Salesforce.com. Costs are usually computed on a subscription basis.Infrastructure as a Service – Utilizes virtualization, and clients pay an outsourcer for resources used. GoGrid is a well known example.

Risk related issues of cloud computing include:Regulatory Compliance – Depending on the type and size of your organization, there are any number of regulatory agency’s rules with which you must comply.User Privileges – Be cognizant of the fact that you will not have the same control over user accounts in the cloud as you did locally, and when someone locks their account by giving the wrong password too many times in a row, you /they could be at the mercy of the technical staff of the provider.Data Integration/Segregation – Data hosting companies can put more than one company’s data on a server. You should use encryption to protect your data. Be aware that your data is only as safe as the data it is integrated with.

Page 8: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Risks Associated with Virtualization

Security risks associated with virtualization include:Breaking Out of the Virtual Machine – if you can break out of the virtualization layer you could get access to the other virtual machines and access data you shouldn’t have access to.Network and Security Controls Can Intermingle – The tools used to manage the virtual machine may not have the same granularity as those used to manage the network, which could lead to privilege escalation.

Most virtualization-specific threats focus on the hypervisor, which is the virtual machine monitor, or the software that allows the virtual machine to exist. If the hypervisor can be compromised, the attacker can gain root-level access to all virtual systems.

The solution to most virtualization threats is to always apply the most recent patches and keep the system(s) up to date.

Page 9: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Developing Policies, Standards, and GuidelinesImplementing Policies

A policy consists of the rules and requirements which should be adhered to within an organization. Policies usually cover a single area, and contain conditions of expected performance, and the consequences of non-compliance.

A good policy contains several key areas besides the policy:Scope statement

Outlines what the policy intends to accomplish and what documents, laws, and practices the policy addresses.

Policy overview statementPolicy overview statements provide the goal of the policy, why it’s important, and how to comply with it.

Policy statementsOnce the policy’s readers understand its importance, they should be informed of what the policy is. If the policy is intended to help people determine how to lock up the building at the end of the business day, it might be helpful to provide a specific checklist of the steps that should be taken.

Accountability statementWho is responsible for ensuring that the policy is enforced. Who should be contacted if a problem is discovered. What are the consequences of non-compliance?

Exception statementThe exception statement provides specific guidance about the procedure or process that must be followed in order to deviate from the policy. This may include an escalation contact, in the event that the person dealing with a situation needs to know whom to contact.

Reducing Risk with Security Policies (12:24)

Page 10: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

A standard deals with specific issues or aspects of the business. Standards are derived from policies. A standard should provide enough detail that an audit can be performed to determine if the standard is being met.

The following five points are the key aspects of standards documents:Scope and purpose

Should explain or describe the intention. If a standard is developed for a technical implementation, the scope might include software, updates, add-ins, and any other relevant information to carry out the task.

Roles and responsibilitiesThis Outlines who is responsible for implementing, monitoring, and maintaining the standard.

Reference documentsExplains how the standard relates to the organization’s different policies, thereby connecting the standard to the underlying policies that have been put in place. In the event of confusion or uncertainty, it also allows people to go back to the source and figure out what the standard means.

Performance criteriaOutlines what or how to accomplish the task. It should include relevant baseline and technology standards.

Maintenance and administrative requirementsThese standards outline what is required to manage and administer the systems or networks.

Developing Policies, Standards, and GuidelinesIncorporating Standards

Page 11: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Guidelines tend to be less formal than policies or standards.Guidelines are similar to standards, in that they too detail rules and best practices that govern an organization and how business is conducted. The difference is that guidelines are not mandatory. Guidelines are usually drawn up to streamline the implementation of security policy elements.

The following four items are the minimum contents of a good guidelines document:

Scope and purposeThe scope and purpose provide an overview and statement of the guideline’s intent.

Roles and responsibilitiesIdentifies which individuals or departments are responsible for accomplishing specific tasks. This may include implementation, support, and administration of a system or service.

Guideline statementsProvide the step-by-step instructions on how to accomplish a specific task in a specific manner. Again, these are guidelines—they may not be hard-and-fast rules.

Operational considerationsSpecify and identify what duties are required and at what intervals. This list might include daily, weekly, and monthly tasks. Guidelines for systems backup might provide specific guidance as to what files and directories must be backed up and how frequently.

Developing Policies, Standards, and Guidelines Following Guidelines

Page 12: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Business policies address organizational and departmental business issues and have an impact on the security of an organization.

Separation of duties policies describe rules that reduce the risk of fraud and other losses.

These policies should define more than one person for completing business critical tasks. Multiple people conspiring to corrupt a system is less likely than a single person corrupting it. It may involve both the separation of logons, such as day-to-day and admin accounts both assigned to the same network admin, as well as the separation of roles, such as security assignment and compliance audit procedures.

Business Policies

Page 13: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Due care is the knowledge and actions that a reasonable and prudent person would possess or act upon. The objectives of due care policies are to protect and safeguard customer and/or client records.

Due care is determined based on legislative requirements. The company exercises the practice of due care in the following manner:

The company implements physical and logical access controls.The company ensures telecommunication security by using authentication and encryption.Information, application, and hardware backups are performed at regular intervals.Disaster recovery and business continuity plans are in place within the company.Periodic reviews, drills, and tests are performed by the company to test and improve the disaster recovery and business continuity plans.The company’s employees are informed regarding the anticipated behavior and implications of not following the expected standards.The company has security policies, standards, procedures, and guidelines for effective security management.The company performs security awareness training for its employees.The company network runs updated antivirus definitions at all times.The administrator periodically performs penetration tests from outside and inside the network.The company implements either a call-back or a preset dialing feature on remote access applications.The company abides by and updates external service level agreements (SLAs).The company ensures that downstream security responsibilities are being met.The company implements counter measures that ensure that software piracy is not taking place within the company.The company ensures that proper auditing and reviewing of the audit logs is taking place.The company conducts background checks on potential employees.

If a company does not exercise due care, the company’s senior management can be held legally accountable for negligence and might have to pay damages under the principle of culpable negligence legislation for the loss suffered because of insufficient security controls.

Business Policies

Page 14: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Physical Access Control Policies refer to the authorization of individuals to access facilities or systems that contain information.

They limit issues such as unauthorized disclosure of information, unauthorized access to the company facilities, and data theft. Document Disposal and Destruction Policies detail the methods on how information that is no longer needed gets disposed. Data in all forms must be properly disposed of. Some data and data sources must be destroyed or thoroughly erased. Because many sophisticated recovery techniques exist, destroying all data and data sources may be more appropriate. Discarded hard drives might need to be physically destroyed.

Business Policies

Page 15: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Business PoliciesPrivacy policies must clearly define:

Which information can be disclosedWhat information cannot be disclosedWhat types of information employees are provided

The policy must clearly state that employees should have no expectations of privacy. Employers are allowed to search desks, computers, files, and any other items brought into the building.

By explicitly stating your policies, you can avoid misunderstandings and potentially prevent employees from embarrassing themselves.

Acceptable-use policies (AUP) deal primarily with computers and information provided by the company.

An acceptable use policy provides details that specify what users may do with their network access, including email and instant messaging usage for personal purposes, limitations on access times, and the storage space available to each user.

It dictates how computers can be used within an organization. It should also outline the consequences of misuse.

Employees are commonly asked to sign such a document, which is a binding agreement to adhere to the policy.

Page 16: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Business PoliciesSecurity Policies define what controls are required to implement and maintain

the security of systems, users, and networks. Should be used as a guide in system implementation and evaluation.

Mandatory Vacations This policy requires all users to take time away from work and refresh. An employee who don’t take time off can be a detriment to himself or the company. Mandatory vacations give the company the chance to make sure others can fill the void in skills. They give the company a chance to discover fraud.

Job Rotation policies define intervals at which employees must rotate through positions. It helps to ensure that companies don’t become to dependent on one person. They also give the company a chance to discover fraud.

Least Privilege should be used when assigning permissions. Give users only the permission they need to do their work and no more. Every OS includes the ability to limit users based on groups and individual permissions. Apply only those permissions users need and block all others.

Page 17: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Understanding Control Types, False Positives, and Change and Incident Management

Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories: Management, Operational, and Technical.

Page 18: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Understanding Control Types, False Positives, and Change and Incident Management

Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories:

ManagementOperationalTechnical

Page 19: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Control TypesControl Type Controls

Management Risk Assessment

Management Planning

Management System and Services Acquisition

Management Certification, Accreditation, and Security Assessment

Operational Personnel Security

Operational Physical and Environmental Protection

Operational Contingency Planning

Operational Configuration Management

Operational Maintenance

Operational System and Information Integrity

Operational Media Protection

Operational Incident Response

Operational Awareness and Training

Technical Identification and Authentication

Technical Access Contol

Page 20: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

Control Types, False Positives, and Change and Incident Management

After implementing controls based on risk you must perform audits which include reviews of user rights and permissions as well as events that occur.False Positives are events that aren’t really incidents. If the rules are not set up properly, normal traffic may set off the analyzer and generate an event.Your audits should address change management, which is the structured approach that is followed to secure the company’s assets, and incident management, which are the steps followed when events occur.

Control Type Controls

Technical Audit and Accountability

Technical System and Communication Protection

Page 21: CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft

The End