ITSRM Lecture 2
ITSRM Lecture 2
ITSRM Lecture 2
Risk Management
Organized By :
Tjahjo Adiprabowo Ir, M. Eng.
Risk Assessment
2.
Risk Mitigation
3.
9 Steps Methodology
reducing risk or
eliminating risk
during the risk mitigation process.
Risk
Risk is a function of :
The likelihood
Of a given threat-sources
Exercising a particular potential vulnerability
Likelihood
To determine the likelihood of a future adverse
event,
Threats to an IT system must be analyzed in
conjunction with :
Impact
1.
1.
2.
2.
1.
2.
1.
2.
3.
Vulnerability Sources
System Security Testing
Development of Security Requirements Checklist
4.
1.
2.
3.
Control Methods
Control Categories
Control Analysis Technique
5.
6.
7.
1.
2.
9.
Threat-Source Identification
Motivation and Threat Actions
3.
8.
System-Related Information
Information-Gathering Techniques
Risk-Level Matrix
Description of Risk Level
Input
Hardware
Software
System Interfaces
Data and Information
People
System mission
Output
System Boundary
System Functions
System and Data Criticality
System and Data Sensitivity
Input
Output
Threat Statement
Input
Output
Input
Current controls
Planned controls
Output
Input
Threat-source motivation
Threat capacity
Nature of vulnerability
Current controls
Output
Likelihood Rating
List of impact :
Input
Loss of Integrity
Loss of Availability
Loss of Confidentiality
Mission impact analysis
Asset criticality assessment
Data criticality
Data sensitivity
Output
Impact Rating
Integrity
Availability
Confidentiality
Input
Output
Input
Output
Recommended Controls
Input
Output
Resources
Information
That constitute the system
System-Related Information
System-Related Information
Classification
Hardware
Software
System interfaces (e.g., internal and external
connectivity)
Data and information
Persons who support and use the IT system
System mission (e.g., the processes performed
by the IT system)
System and data criticality (e.g., the systems
value or importance to an organization)
System and data sensitivity
System interfaces
System input and output flowchart
Rules of behavior
Security planning
Personnel security
Backup
Contingency
Resumption and recovery operations
System maintenance
Off-site storage
User account establishment and deletion procedures
Controls for segregation of user functions :
Facility security
Data center policies
Humidity
Water
Power
Pollution
Temperature
Chemicals
System configuration
System connectivity
Documented and undocumented procedures
Documented and undocumented practices
Information-Gathering Techniques
Any, or a combination, of the following
techniques can be used in gathering
information relevant to the IT system within
its operational boundary :
Questionnaire
On-site Interviews
Document Review
Use of Automated Scanning Tool.
Questionnaire
Should be distributed to
On-site Interviews
Interviews with :
IT system support
Management personnel
Document Review
Good information about the security controls used by and planned for the IT
system :
Policy documents
System documentation
Security-related documentation
Legislative documentation
Directives
Threat :
Vulnerability :
Threat-source :
Threat-sources
Potential vulnerabilities
Existing controls
Threat-Source Identification
Common Threat-Sources
Natural Threats
Floods
Earthquakes
Tornadoes
Landslides
Avalanches
Electrical storms
And other such events
Human Threats
Unintentional acts
Deliberate actions
Environmental Threats
In assessing threat-sources
It is important to consider
For example :
Intentional acts :
Unintentional acts :
Negligence
errors
Additional information
System administrators
Help desk personnel
User community
During information gathering
Human Threat-Source
Hacker, cracker
Computer criminal
Terrorist
Industrial espionage
Companies
Foreign governments
Other government interests
Insiders
Poorly trained
Disgruntled
Malicious
Negligent
Dishonest
Terminated employees
Hacker, Cracker
Motivation :
Challenge
Ego
Rebellion
Threat Actions :
Hacking
Social engineering
System intrusion, break-ins
Unauthorized system access
Computer Criminal
Motivation :
Destruction on information
Illegal information disclosure
Monetary gain
Unauthorized data alteration
Threat Actions :
Computer crime
Fraudulent act
Cyber stalking
Replay
Impersonation
Interception
Information bribery
Spoofing
System intrusion
Terrorist
Motivation :
Blackmail
Destruction
Exploitation
Revenge
Threat Actions :
Bomb/Terrorism
Information warfare
System attack
Distributed denial of service
System penetration
System tampering
Industrial Espionage
Motivation :
Competitive advantage
Economic espionage
Threat Actions :
Economic exploitation
Information theft
Intrusion on personal privacy
Social engineering
System penetration
Unauthorized system access
Insiders
Motivation :
Curiosity
Ego
Intelligence
Monetary gain
Revenge
Unintentional errors and omissions :
Insiders
Threat Actions :
Assault on an employee
Blackmail
Browsing of proprietary information
Computer abuse
Fraud and theft
Information bribery
Input of falsified, corrupted data
Malicious code :
Virus
Logic bomb
Trojan horse
An estimate of the
Motivation
Resources
Capabilities
That may be required to carry out a successful
attack
Should be developed
In order to determine the likelihood of a
threats exercising a system vulnerability.
Additional information
Intelligence agencies
Mass media, particularly web-based resources such as
SecurityFocus.com, SecurityWatch.com, SANS.org
Flaws
Weaknesses
Vulnerability
A flaw or weakness
In :
System security procedures
Design
Implementation
Internal control
That could be exercised
Accidentally triggered
Intentionally exploited
Result in
A Security breach
A violation
Of the systems security policy
Example of Vulnerability/Threat
Pair 1 of 4
Vulnerability :
Threat-source :
Threat Action :
Example of Vulnerability/Threat
Pair 2 of 4
Vulnerability :
Threat-source :
Threat Action :
Example of Vulnerability/Threat
Pair 3 of 4
Vulnerability :
Threat-source :
Threat Action :
Example of Vulnerability/Threat
Pair 4 of 4
Vulnerability :
Threat-source :
Threat Action :
Recommended Methods
Vulnerability sources
The performance of system security testing
The development of a security requirements
checklist
Vulnerability Sources
Vulnerability lists
Security advisories
Vendor advisories
Commercial computer incident/emergency response teams and post
lists
Information Assurance Vulnerability Alerts and bulletins for military
systems
System software security analyses
Allocated funds
Available technology
Persons with the expertise to conduct the test
Test Method
ST & E
Penetration Testing
Development of Security
Requirements Checklist
Security Requirement
Checklist
personnel
hardware
software
information
Management
Operational
Technical
Security Criteria
of Management Security
Assignment of responsibilities
Continuity of support
Incident response capability
Periodic review of security controls
Personnel clearance and background investigations
Risk assessment
Security and technical training
Separation of duties
System authorization and reauthorization
System or application security plan
Security Criteria
of Operational Security
Security Criteria
of Technical Security
Goal :
to minimize
or eliminate
the likelihood (or probability) of a threats
exercising a system vulnerability.
A vulnerability
threat-source interest
or capability
harm.
Control Methods
Technical controls
Non-technical controls
Technical Controls
Computer hardware
Software
Firmware :
Non-Technical Controls
Security policies
Operational procedures
Security of :
Personnel
Physic
Environment
Control Categories
Preventive controls
Detective controls
Preventive Controls
Detective Controls
audit trails,
intrusion detection methods,
checksums.
Security noncompliance
Security compliance
Step 5 : Likelihood
Determination
Likelihood Level
High
Medium
Low
Likelihood Definitions
Likelihood Definitions
Likelihood Definitions
Likelihood rating :
High
Medium
Low
Hardware
Software
Systems
Services
Related technology assets
Responsibility
Security goals
The adverse impact of a security event can be
described in terms of LOSS or
DEGRADATION of any, or a combination of
any, of the following three security goals :
Integrity
Availability
Confidentiality
Loss of Integrity
Loss of Availability
Loss of Confidentiality
Impacts Categories
Magnitude of Impact
Definitions
The disadvantage :
The disadvantage :
Additional Factors
Magnitude of impact :
High
Medium
Low
Risk Determination
Components
Matrix Dimension
Risk Level :
High
Medium
Low
Step 8 : Control
Recommendations
Additional consideration
Step 9 : Results
Documentation
Considerations
Good Luck