190 likes | 391 Views
Risk Control Strategies And Physical Security. By William Gillette. Top 10 Security Mistakes. The not-so-subtle Post-it Note. Yes, those sticky yellow things can undo the most elaborate security measures. Leaving unattended computers on Opening Email form strangers “I Love You Virus”
E N D
Risk Control StrategiesAnd Physical Security By William Gillette
Top 10 Security Mistakes • The not-so-subtle Post-it Note. Yes, those sticky yellow things can undo the most elaborate security measures. • Leaving unattended computers on • Opening Email form strangers “I Love You Virus” • Poor password selection. Vice president of IT at General Dynamics Corp. attended a demonstration with about 20 of his top engineers and some anti-hacking experts from NASA. Within 30 minutes, the NASA folks broke 60% of the engineers' passwords. A good example is: "I pledge allegiance to the flag" becomes "ipa2tf."
Top 10 Security Mistakes • Laptops have legs. physical security • Loose lips sink ships. People talk about passwords • Plug and Play (technology that enables hardware devices to be installed and configured without the protection) • Unreported security violations • Behind the times in terms of patches • Not watching for dangers within your own organization.
Types of Risk Control strategies • Avoidance • Transference • Migration • Acceptance
Quick Review Risk avoidance • Defined: • A risk control strategy that attempts to prevent attacks to organizational assets, through there vulnerabilities. • This is the most preferred risk control strategy as it seeks to avoid risk/treats entirely. • Avoidance is accomplish through countering treats, removing vulnerabilities in assets, limiting access to assets, and adding protective safeguards.
Methods of risk avoidance • Avoidance through application of policy. • Avoidance through application of training and education. • Avoidance though application of technology.
Risk Transference • Defined • Is a control approach that attempts to shift the risk to other assets, other processes, or other organization. • This is accomplished through rethinking/reengineering services, revising development models, outsourcing to other organizations or implementing service contracts • Common choice for larger companies
Risk Transference • Advantages outsourcing • Outsource company focuses their energy and resource on their expertise • Allows parent company to concentrate on the business they know. Example Kodak • Disadvantages • Cost tend to be high for these services, and they require very detailed legal contracts to garreteer service and recovery.
Risk Migration • Defined • control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. • Three type of plans. • Disaster recovery plan • Incident response plan • Business continuity plan • Each of these strategies depends on the ability to detect and respond to an attack as quickly as possible. All migration strategies start with early detection.
Disaster Recovery Plan • Define • Preparations for recovery should a disaster occur; Strategies to limit losses before and during disasters; Step by step instructions to regain normalcy.(This is the most common of the migration procedures) • Examples • Procedures to recover loss data (data/media back up) • Procedures for the reestablishment of lost services. • Procedures to protect currently available assets(shut down) • When its Deployed • Immediately after the incident is labeled a disaster • Time frame • Short-term recovery
Incident Response Plan • Define • Actions an organization takes during an attack, IRP’s are predefined, specific or ad hoc, and reactive. • The what do I do now! • Example • information analysis, intelligence gathering, list of steps to be taken during an attack • unauthorized copy example • When it’s deployed • as the attack or disaster unfolds. • Time frame • immediate and real-time reaction
Business Recovery plan • Define • Steps to ensure continuation of the overall business when the scale of the disaster requires relocations. • Examples • Preparations steps for the activation of a secondary data center. • Establishment of a hot site in a remote location. Many companies have this service as a contingency against disastrous events • When its deployed • after it has been determined that a disaster/attack affects the continuos operation of the organization. • Time frame • long term recovery.
Acceptance • Define • In contrast to other control, acceptance is a method of doing nothing to protect vulnerabilities and accept the outcome of its exploitation. • To use this control the following must be taken into account. • Determined the level of risk • Assessed the probability of attack • Estimated the potential damage that could occur from attacks • Performed a thorough cost benefit analysis • Take in account the feasibility of other controls • Decide if particular functions /assets/data do not justify the cost of protection
System/program as designed Is system/program vulnerable Is system/program exploitable? yes yes No No No Risk No Risk Is expected loss > acceptable level Risk Exists Is the attackers gain > cost? Risk is Unacceptable yes yes No No Risk can be accepted Risk can be accepted
Categories of controls • Control function: • Controls and safeguards designed to defend vulnerabilities through prevention or detection. • Uses both technological protection (encryption) and enforcement measures Policies • Architectural layer • Controls applied to more then one layer of a system • Firewalls • Strategic • Controls that are specific to a risk control method
Other Factor on Deciding aRisk Control Method • Feasibility studies • Cost benefit analysis • Asset validation • Organizational feasibility • Technical feasibility
Physical Security • Defined • Describes protection needed out-side a system /program • Typically physical controls include Id cards, guards, locks, and cameras. But can also include items to protect against disasters.
Types of Physical security • Access and control • Used to ward off the sticky figure bandit • Use of biometrics, smart cards, access door locks, mantraps, electronic monitoring, shredding, and guards. • Natural disaster • Flood (both natural and unnatural), Fire, power fluctuation, and so on • Use of raised floors, dedicated cooling, humidifier for tape rooms, emergency lighting, electrical/nonH2O fire extinguisher, surge suppressor, emergency power shut off, and emergency replacement server/off site system.
Bibliography • Information Technology for Management Henry C. Lucas 7th Edition Irwin McGraw-Hill • Principles of Information Security Michael E. Whitman Thomson Course Technology. • www.computerworld.com