1 / 21

CIST 1601 Information Security Fundamentals

CIST 1601 Information Security Fundamentals. Chapter 1 Measuring and Weighing Risk. Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Technology Albany Technical College. Identifying Assets .

yon
Download Presentation

CIST 1601 Information Security Fundamentals

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIST 1601 Information Security Fundamentals Chapter 1 Measuring and Weighing Risk Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft IT Academy Administrator Computer Information Systems Technology Albany Technical College

  2. Identifying Assets Asset identification is the process of identifying the types and values of assets in an organization. In some cases, the process may be as simple as counting systems and software licenses. The more difficult part of an asset-identification process is attempting to assign values to information. In some cases, you may only be able to determine what would happen if the information were to become unavailable or lost. If absence of this information would effectively shut down the business, the information is priceless.

  3. Risk Assessment There are several ways to perform a risk assessment or risk analysis. They range from highly scientific formula-based methods to a conversation with the owner. The cost of an event and the probability that an event will occur are two of the most important factors to consider when you’re formulating a risk assessment. In general, you should attempt to identify the costs of replacing stolen data or systems, the costs of downtime, and virtually any risk factor you can imagine. You can move to risk assessment only after completing the asset identification. After you’ve determined the costs, you can then evaluate the likelihood that certain types of events will occur and the most likely outcome if they do occur.

  4. Risk Avoidance (3:10) Risk Assessment Risk assessment helps align security objectives with business objectives. Risk analysis is part of the disaster recovery plan. Risk analysis is the process of identifying assets and their associated threats, vulnerabilities, and potential risks, and justifying the cost of countermeasures deployed to mitigate the loss. It is important to note that risk analysis is focused on a cost-benefit analysis of countermeasures, and not on the selection of countermeasures. Risk analysis also measures the amount of loss that an organization can potentially incur if an asset is exposed to loss. During the process of risk assessment, it is necessary to review many areas, such as the following: Methods of access Authentication schemes Audit policies Hiring and release procedures Isolated services that may provide a single point of failure or avenue of compromise Data or services requiring special backup or automatic failover support. The following are the four major objectives of a risk analysis, in order of execution: 1. To identify all existing assets and estimate their monetary value. 2. To identify vulnerabilities and threats to information assets. Vulnerability is a weakness in the system, software, hardware, or procedure. A threat agent, leading to a risk of loss potential, can exploit this weakness. A virus is an example of a threat agent, and the possibility of a virus infecting a system is an example of a threat. 3. To quantify the possibility of threats and measure their impact on business operations. 4. To provide a balance between the cost of impact of a threat and the cost of implementing the safeguard measures to mitigate the impact of threats.

  5. Acting on Your Risk Assessment Risk Avoidance Some risks can be eliminated through a change in the technology, policy, or mechanism of employment. For example, the risk of “war-dialing” attacks can be eliminated by removing legacy dial-up telephony modem devices. Risk TransferenceA risk may be transferred, such as when the risk of equipment loss is covered by a full-replacement insurance policy. Risk Mitigation Most risks fall into the mitigated response area, where the application of additional effort may reduce the risk to a level documented as acceptable. Risk Deterrence Risk deterrence involves understanding something about the enemy and letting them know the harm that can come their way if they cause harm to you. This can be as simple as posting prosecution policies on your login pages and convincing them that you have steps in place to identify intrusions and act on them. Risk Acceptance Some risks cannot be addressed within a reasonable time or cost constrained and may be accepted, with proper documentation as to the reasons why the risk is acceptable.

  6. Risk Calculations (5:11) Risk Assessment The annualized rate of occurrence (ARO) signifies the probability of an event occurring within a year. This conclusion is usually based on referencing historical data.  This measure can be used in conjunction with a monetary value assigned to data to compute single loss expectancy (SLE) and annual loss expectancy (ALE) values. SLE refers to the quantitative amount of loss incurred by a single event when a threat takes place. SLE equals the asset value (AV) multiplied by the threat exposure factor (EF). The exposure factor or probability is the percentage of loss that a realized threat could have on a certain asset. For example, a virus hits five computer systems out of 100 before it is prevented by the safeguard from further infecting the other 95 computers, resulting in a loss of five percent of the computers. If the asset value of 100 computers is $10,000, then the exposure factor will be $500, which is five percent of the total asset value. The formula for calculating SLE is: AV x EF = SLE. From the previous example: $10,000 x 5% = $500. Annual loss expectancy (ALE) refers to the loss potential of an asset for a single year. ALE equals the single loss expectancy (SLE) times the annualized rate of occurrence (ARO) When you’re computing risk assessment, remember this formula: SLE x ARO = ALE Thus, if you can reasonably expect that every SLE will be equivalent to $1,000 and that there will be seven occurrences a year (ARO), then the ALE is $7,000. Total risk can be calculated by multiplying the threats, the vulnerabilities, and the asset value. Total risk = threats x vulnerabilities x asset value.

  7. Risks Associated with Cloud Computing Cloud computing means using the Internet to host services and data instead of hosting it locally. Some examples would be to run Office-like applications from the Web (such as Google Docs) instead of having the applications installed on each workstation, storing data on server space rented from Amazon, using sites such as Salesforce.com, etc. Three ways to implement cloud computing: Platform as a Service – Also known as cloud platform services. Vendors allow apps to be created and run on their infrastructure. i.e. Amazon Web Services and Google Code. Software as a Service – Applications are remotely run over the Web. No local hardware is required and no software apps need be installed on the machine accessing the site. i.e. Salesforce.com. Costs are usually computed on a subscription basis. Infrastructure as a Service – Utilizes virtualization, and clients pay an outsourcer for resources used. GoGrid is a well known example. Risk related issues of cloud computing include: Regulatory Compliance – Depending on the type and size of your organization, there are any number of regulatory agency’s rules with which you must comply. User Privileges – Be cognizant of the fact that you will not have the same control over user accounts in the cloud as you did locally, and when someone locks their account by giving the wrong password too many times in a row, you /they could be at the mercy of the technical staff of the provider. Data Integration/Segregation – Data hosting companies can put more than one company’s data on a server. You should use encryption to protect your data. Be aware that your data is only as safe as the data it is integrated with.

  8. Risks Associated with Virtualization Security risks associated with virtualization include: Breaking Out of the Virtual Machine – if you can break out of the virtualization layer you could get access to the other virtual machines and access data you shouldn’t have access to. Network and Security Controls Can Intermingle – The tools used to manage the virtual machine may not have the same granularity as those used to manage the network, which could lead to privilege escalation. Most virtualization-specific threats focus on the hypervisor, which is the virtual machine monitor, or the software that allows the virtual machine to exist. If the hypervisor can be compromised, the attacker can gain root-level access to all virtual systems. The solution to most virtualization threats is to always apply the most recent patches and keep the system(s) up to date.

  9. Reducing Risk with Security Policies (12:24) Developing Policies, Standards, and GuidelinesImplementing Policies A policy consists of the rules and requirements which should be adhered to within an organization. Policies usually cover a single area, and contain conditions of expected performance, and the consequences of non-compliance. A good policy contains several key areas besides the policy: Scope statement Outlines what the policy intends to accomplish and what documents, laws, and practices the policy addresses. Policy overview statement Policy overview statements provide the goal of the policy, why it’s important, and how to comply with it. Policy statements Once the policy’s readers understand its importance, they should be informed of what the policy is. If the policy is intended to help people determine how to lock up the building at the end of the business day, it might be helpful to provide a specific checklist of the steps that should be taken. Accountability statement Who is responsible for ensuring that the policy is enforced. Who should be contacted if a problem is discovered. What are the consequences of non-compliance? Exception statement The exception statement provides specific guidance about the procedure or process that must be followed in order to deviate from the policy. This may include an escalation contact, in the event that the person dealing with a situation needs to know whom to contact.

  10. Developing Policies, Standards, and GuidelinesIncorporating Standards A standard deals with specific issues or aspects of the business. Standards are derived from policies. A standard should provide enough detail that an audit can be performed to determine if the standard is being met. The following five points are the key aspects of standards documents: Scope and purpose Should explain or describe the intention. If a standard is developed for a technical implementation, the scope might include software, updates, add-ins, and any other relevant information to carry out the task. Roles and responsibilities This Outlines who is responsible for implementing, monitoring, and maintaining the standard. Reference documents Explains how the standard relates to the organization’s different policies, thereby connecting the standard to the underlying policies that have been put in place. In the event of confusion or uncertainty, it also allows people to go back to the source and figure out what the standard means. Performance criteria Outlines what or how to accomplish the task. It should include relevant baseline and technology standards. Maintenance and administrative requirements These standards outline what is required to manage and administer the systems or networks.

  11. Developing Policies, Standards, and Guidelines Following Guidelines Guidelines tend to be less formal than policies or standards. Guidelines are similar to standards, in that they too detail rules and best practices that govern an organization and how business is conducted. The difference is that guidelines are not mandatory. Guidelines are usually drawn up to streamline the implementation of security policy elements. The following four items are the minimum contents of a good guidelines document: Scope and purpose The scope and purpose provide an overview and statement of the guideline’s intent. Roles and responsibilities Identifies which individuals or departments are responsible for accomplishing specific tasks. This may include implementation, support, and administration of a system or service. Guideline statements Provide the step-by-step instructions on how to accomplish a specific task in a specific manner. Again, these are guidelines—they may not be hard-and-fast rules. Operational considerations Specify and identify what duties are required and at what intervals. This list might include daily, weekly, and monthly tasks. Guidelines for systems backup might provide specific guidance as to what files and directories must be backed up and how frequently.

  12. Business Policies Business policies address organizational and departmental business issues and have an impact on the security of an organization. Separation of duties policies describe rules that reduce the risk of fraud and other losses. These policies should define more than one person for completing business critical tasks. Multiple people conspiring to corrupt a system is less likely than a single person corrupting it. It may involve both the separation of logons, such as day-to-day and admin accounts both assigned to the same network admin, as well as the separation of roles, such as security assignment and compliance audit procedures.

  13. Business Policies Due care is the knowledge and actions that a reasonable and prudent person would possess or act upon. The objectives of due care policies are to protect and safeguard customer and/or client records. Due care is determined based on legislative requirements. The company exercises the practice of due care in the following manner: The company implements physical and logical access controls. The company ensures telecommunication security by using authentication and encryption. Information, application, and hardware backups are performed at regular intervals. Disaster recovery and business continuity plans are in place within the company. Periodic reviews, drills, and tests are performed by the company to test and improve the disaster recovery and business continuity plans. The company’s employees are informed regarding the anticipated behavior and implications of not following the expected standards. The company has security policies, standards, procedures, and guidelines for effective security management. The company performs security awareness training for its employees. The company network runs updated antivirus definitions at all times. The administrator periodically performs penetration tests from outside and inside the network. The company implements either a call-back or a preset dialing feature on remote access applications. The company abides by and updates external service level agreements (SLAs). The company ensures that downstream security responsibilities are being met. The company implements counter measures that ensure that software piracy is not taking place within the company. The company ensures that proper auditing and reviewing of the audit logs is taking place. The company conducts background checks on potential employees. If a company does not exercise due care, the company’s senior management can be held legally accountable for negligence and might have to pay damages under the principle of culpable negligence legislation for the loss suffered because of insufficient security controls.

  14. Business Policies Physical Access Control Policies refer to the authorization of individuals to access facilities or systems that contain information. They limit issues such as unauthorized disclosure of information, unauthorized access to the company facilities, and data theft. Document Disposal and Destruction Policies detail the methods on how information that is no longer needed gets disposed. Data in all forms must be properly disposed of. Some data and data sources must be destroyed or thoroughly erased. Because many sophisticated recovery techniques exist, destroying all data and data sources may be more appropriate. Discarded hard drives might need to be physically destroyed.

  15. Business Policies Privacy policies must clearly define: Which information can be disclosed What information cannot be disclosed What types of information employees are provided The policy must clearly state that employees should have no expectations of privacy. Employers are allowed to search desks, computers, files, and any other items brought into the building. By explicitly stating your policies, you can avoid misunderstandings and potentially prevent employees from embarrassing themselves. Acceptable-use policies (AUP) deal primarily with computers and information provided by the company. An acceptable use policy provides details that specify what users may do with their network access, including email and instant messaging usage for personal purposes, limitations on access times, and the storage space available to each user. It dictates how computers can be used within an organization. It should also outline the consequences of misuse. Employees are commonly asked to sign such a document, which is a binding agreement to adhere to the policy.

  16. Business Policies Security Policies define what controls are required to implement and maintain the security of systems, users, and networks. Should be used as a guide in system implementation and evaluation. Mandatory Vacations This policy requires all users to take time away from work and refresh. An employee who don’t take time off can be a detriment to himself or the company. Mandatory vacations give the company the chance to make sure others can fill the void in skills. They give the company a chance to discover fraud. Job Rotation policies define intervals at which employees must rotate through positions. It helps to ensure that companies don’t become to dependent on one person. They also give the company a chance to discover fraud. Least Privilege should be used when assigning permissions. Give users only the permission they need to do their work and no more. Every OS includes the ability to limit users based on groups and individual permissions. Apply only those permissions users need and block all others.

  17. Understanding Control Types, False Positives, and Change and Incident Management Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories: Management, Operational, and Technical.

  18. Understanding Control Types, False Positives, and Change and Incident Management Risk assessment/analysis involves calculating potential risks and making decisions based on the variables associated with those risks. Once risks are identified, you put controls in place to address those risks. Control types fall into three categories: Management Operational Technical

  19. Control Types

  20. Control Types, False Positives, and Change and Incident Management After implementing controls based on risk you must perform audits which include reviews of user rights and permissions as well as events that occur. False Positives are events that aren’t really incidents. If the rules are not set up properly, normal traffic may set off the analyzer and generate an event. Your audits should address change management, which is the structured approach that is followed to secure the company’s assets, and incident management, which are the steps followed when events occur.

  21. The End

More Related