Nformation Ecurity: Hreats To
Nformation Ecurity: Hreats To
Nformation Ecurity: Hreats To
Whitman
T
The result of this neglect is that organizational
hese prophetic words, spoken systems are far less secure than they might oth-
over 2,500 years ago by erwise be and that security breaches are far
renowned Chinese general Sun more frequent and damaging than is necessary”
Tzu, ring true for the battlefield [4]. In order to strengthen the level of protec-
warrior and information security tion of information in the organization, those
administrator alike. Knowing the enemy faced responsible for that information must begin
by information security is a vital component to with an understanding of the threats facing the
shaping an information security defense pos- information, and then must examine the vul-
ture. The press routinely publishes dramatic nerabilities inherent in the systems that store,
reports of billions of dollars lost to computer process, and transmit the information possibly
theft, fraud, and abuse. The 2002 Computer subjected to those threats. The first part of this
Security Institute/Federal Bureau of Investiga- strategy is the identification of the dominant
tion (CSI/FBI) survey on Computer Crime and threats facing organizational information secu-
Security Survey found that 90% of respondents rity, and the ranking of those threats in order
(primarily large corporations and government to allow organizations to direct priorities
agencies) detected computer security breaches accordingly.
within the last 12 months. The report docu- Sadly, IT executives have frequently identi-
mented that 80% of respondents acknowledged fied the security of information as an important
financial losses due to computer breaches, a but not critical issue [4]. IT executives report-
total of approximately $455,848,000 in finan- edly dropped information security as an impor-
cial losses, up from $377,828,700 reported in tant issue altogether in 1995, suggesting either
2001. Respondents citing their Internet connec- they felt they had sufficiently addressed the
tions as a frequent point of attack rose from problem, or they no longer felt it was as signif-
70% in 2001 to 74% in 2002 [3]. icant as other issues [1].
the frequency of attacks identi- 2. Compromises to Intellectual Property 1.0% 2.1% 3.1% 25.0% 61.5% 7.3%
fied by respondents. Unfortu- 3. Deliberate Acts of Espionage or Trespass 4.2% 3.1% 3.1% 20.8% 68.8%
nately, for every attack detected 4. Deliberate Acts of Information Extortion 1.0% 8.3% 90.6%
many more go undetected. Table 5. Deliberate Acts of Sabotage or Vandalism 1.0% 3.1% 31.3% 64.6%
2 presents the responses to the 6. Deliberate Acts of Theft 7.3% 38.5% 54.2%
inquiries on the number of 7. Deliberate Software Attacks 11.5% 9.4% 14.6% 47.9% 16.7%
attacks per month. Of particular 8. Forces of Nature 1.0% 2.1% 34.4% 62.5%
interest is the emergence of
9. Quality of Service Deviations from
Deliberate Acts of Information Service Providers 1.0% 8.3% 43.8% 46.9%
Extortion, the intentional illegal 10. Technical Hardware Failures or Errors 3.1% 11.5% 51.0% 34.4%
acquisition of information from 11. Technical Software Failures or Errors 5.2% 18.8% 45.8% 30.2%
an organization, with the intent 1.0%
12. Technological Obsolescence 1.0% 15.6% 21.9% 60.4%
to blackmail the organization
4.0% 3.4% 8.6% 34.2% 51.2% 6.9%
with the threat of publication, Average Responses:
dissemination, or use. While not
Table 2. Numbers
a largely indicated threat, the of attacks per month
criteria used to rank the threats are part of the cus-
mere presence designates an as reported by tomization of the process to the organization’s needs.
increase in the malicious nature respondents. Identify and prioritize the information assets.
of intruders. In general, almost Administrators should detail all assets that collect,
all of the respondents indicated process, store, or use information in the organization.
some form of attack, whether internal or external. These will most likely not be all IT assets, and should
As is evident from the findings, the threat is real, include various “people” areas as well. How the orga-
the stakes are high, and the systems protecting the tar- nization prioritizes these assets could be based on the
get information are difficult to protect. Just as Loch, number or severity of known vulnerabilities, exposure
Carr, and Warkentin found in a similar study over 10 to threats, cost or difficulty of replacement of the asset,
years ago, “results suggest that management needs to content of critical information, or a host of other cri-
(1) become more informed of the potential for secu- teria. Should more than one criterion be used in eval-
rity breaches … (2) increase their awareness in key uating the asset, a weighted means could be developed
areas, … and (3) recognize that their overall level of to quantify the ranking.
concern for security may underestimate the potential Create a matrix listing the threats, in priority, along
risk inherent in the highly connected environment in one axis, and the assets, in priority along the other.
which they operate” [2]. The resulting grid provides a convenient method of
examining the “exposure” of assets, allowing a sim-
How to Put this Information to Use plistic vulnerability assessment. Table 3 presents a
Now that an organization knows what the threats are, sample of the resulting framework.
how can its security administrators and technology Fill in each intersection with the current controls.
managers put this information to use? One of the The intersection of the threat to asset pair represents
most direct uses of this information is in the identifi- an area that should be addressed by more than one
cation and application of controls. The methodology control. Controls in this situation are defined as those
Threat 2