220 likes | 373 Views
Security Attribute Evaluation Method: A Cost Benefit Analysis. Shawn A. Butler Computer Science Department Carnegie Mellon University 27 November 2001. M. S. We always seem to need more security! Don’t we have enough?.
E N D
Security Attribute Evaluation Method: A Cost Benefit Analysis Shawn A. Butler Computer Science Department Carnegie Mellon University 27 November 2001
M S We always seem to need more security! Don’t we have enough? Hey Boss, we need more security. I think we should get the new Acme 2000 Hacker Abolisher
M S What are my alternatives? Trust me, we will be more secure! What is it going to cost? What is the added value?
Alternatives? Value? S
Problem • Security managers lack structured cost-benefit methods to evaluate and compare alternative security solutions.
System Design Available Countermeasures Threats Security Components Prioritized Risks Select Countermeasures Risk Assessment Requirements Policies Outcomes Security Architecture Development Process Develop Security Architecture Security Architecture
Threats Prioritized Risks Risk Assessment Outcomes The Multi Attribute Risk Assessment • Determine threats and outcomes • Assess outcome attribute values • Assess weights • Compute threat indices • Sensitivity Analysis
Threats Scanning Procedural Violation Browsing Distributed Denial of Service Password Nabbing Personal Abuse Signal Interception : : 29 Threats Outcome Attributes Lost Productivity Lost Revenue Regulatory Penalties Reputation Lives Lost Lawsuits : : Determine Threats and Outcomes
Scanning in More Detail .01 = plow (j=attributesWj Vj(xj low)) .07 = pexpected (j=attributesWj Vj(xj expected)) .00 = phigh (j=attributesWj Vj(xj high)) 10,220 (.01 +.07 +.00) 886.57
Sensitivity Analysis is Key!! • How sensitive are the answers to estimation errors? • Does it matter if the estimates are not accurate? • How accurate do they have to be before the decision changes? • When is it important to gather additional information?
System Design Available Countermeasures Security Components Select Countermeasures Policies Requirements Security Attribute Evaluation Method (SAEM) • Evaluation Method • Assess security technology benefits • Evaluate security technology benefits • Analyze Costs • Assess coverage • Sensitivity Analysis Prioritized Risks
Effectiveness Percentages Security Tech Auth Policy Serv Virtual Priv Net Hardened OS Net Monitors Prxy Firewall Vuln Assess PF Firewall Host IDS Net IDS Auditing Threat Assess Security Technology Benefits
Analyze Costs 589 Host IDS Net IDS Auditing Threat Index Auth Policy Server Smart Cards Single Sign-on PKI Cert 0 $20,000 $0 Purchase Cost
Preliminary Results • Risk Assessment threat indices reflect security manager’s concerns • based on interviews and feedback • Security managers are able to estimate technology benefits • based on experience, organizational skill levels, and threat expectations • Sensitivity Analysis is key to method • based on uncertainty of assumptions