Forensecure19 CyberRisk-TAVERAS
Forensecure19 CyberRisk-TAVERAS
net/publication/332411201
CITATIONS READS
3 9,411
1 author:
Pedro Taveras
Pontificia Universidad Católica Madre y Maestra
30 PUBLICATIONS 101 CITATIONS
SEE PROFILE
All content following this page was uploaded by Pedro Taveras on 15 April 2019.
ABSTRACT
Organizations and their information systems face increasingly risks and uncertainties from a wide variety of sources, including
computer-based fraud, espionage, sabotage or cyberattacks. The present paper intends to provide a series of actions, procedures,
and considerations that any organization must contemplate when dealing with a cyber-attack. Certain sources of damage such
as intrusion attacks or denial of services are becoming more common, ambitious and sophisticated over the time. Absolute
security does not exist. That is why organizations must adopt methods and strategies that allow them to prioritize those risks
that, due to their probability of occurrence and level of impact, represent a greater potential harm to the business. When
preparing to deal with probable cyber-attacks, the key is understanding the logical flow of actions that could be performed
during the attack, incorporate best practices assess the levels of risk faced by the organization and proactively design a
handbook to react during these scenarios.
Keywords
Cyberattack, incident response, cybersecurity, cyber risk analysis
INTRODUCTION
There are two disturbing facts that every major organization needs to accept. First, that it is almost certainly possesses
commercially sensitive information which, if it fell into the wrong hands, could prove deeply damaging to the future of the
enterprise. And secondly, that a sophisticated cyber-attack targeting that data is almost certain to succeed. There are no magic
bullets available, an organization’s best option for detecting and deterring data exfiltration by advanced attackers is a
comprehensive defense-in-depth strategy determined by a thorough cyber risk assessment. Hence the need of identification of
computer assets, their vulnerabilities and threats to those who are exposed as well as their probability of occurrence and the
impact thereof, in order to determine the appropriate controls to accept, decrease, transfer or avoid the occurrence of risk (Cobb,
n.d). Hence, the pertinence of a formal method to develop a risk and vulnerabilities analysis.
ENVIRONMENT
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 1
Taveras Cyber Attack Risk Management
The system environment is a client/server environment consisting of a Microsoft SQL database (2008, 2008R2 & 2012) built
with Visual Studio .NET (C#, C++) programming code. Main platform contains source code, executable program files,
production and development data files, prototype and released application code. The production data files, consisting of source
code, compiled libraries, stored procedures and tables, are stored on a BlackArmor storage area network (SAN) connected to a
Dell Poweredge server running on Windows 2012 operating systems and running MS SQL 2008 R2 database engine. The
application code is distributed among various Dell servers running on Windows 2012. Local servers are housed in the main
building located in the East coast of the US. Executables/production systems reside on a set of virtualized servers running
Windows 2012 and hosted on a remote Data Center in Florida. Users are physically located in one location in the Caribbean.
Their desktop/laptop computers are physically connected to a wide area network (WAN). Programmers connect to the
development environment using the VPN tunnel. A business unit operates in the East coast of the US. This unit requires access
to administrative documents, sales presentations and email services. The enterprise network runs over multiple trusted domains
that are managed with Windows Sever 2012. Rolled Based Access Control is in place.
Cyber risk analysis protects an organization that adopts IT, as part of their vision and mission, from a wide range of threats to
ensure business continuity, minimize damage and maximize return on investment and opportunities. Every process that support
information systems and networks are important assets of the organization (Marcus & John, 2000). The identification of threats
should help the management to generate controls to minimize the likelihood and impact of risks associated with vulnerabilities
and existing information security threats. Marcus & John (2000) asserts that and effective anticipation in the identification of
threats requires:
According to Wang & Chao (2013), existing risk assessment schemes use a converse thinking approach to develop theoretical
solutions for minimizing the threats of security breaches at a minimal cost. The same authors assert that risk assessment enables
defenders to identify appropriate countermeasures in accordance with three different defensive strategies associated with the
organization's security policy, as presented in Table 1.
Cost of defense
Countermeasure Max Min
Reduce residual risk ✓
Defend against maximum number of attacks ✓
Cover the maximum number of attack paths ✓
Table 1. Defensive strategies associated with organization security
Threats are linked to potential causes with possible negative impact on the information, to the extent that the assets that could
be affected possess weaknesses or failures in the controls that protect them. The latter concept is summarized in the term
vulnerability, which when exploited by the threat exposes the organization to risk (Bard, n.d). This risk will emerge from the
analysis of their probability of occurrence and impact on the assets protected. In other words, no system can be vulnerable if
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 2
Taveras Cyber Attack Risk Management
not threatened, and there is no threat condition for an item, subject or system, if it is not exposed and vulnerable to the potential
action that represents such a threat. That is, there is no threat or independent vulnerability, as they are mutually conditioning
situations defined conceptually independently for methodological purposes and for a better understanding of risk (Marcus &
John, 2000).
In general, the concept of threat refers to a latent danger or external risk factor of a system; expressed mathematically as the
probability of exceeding a level of occurrence with a certain intensity, under certain conditions and for a given exposure to
time. This scheme is constantly changing due to the incorporation of new assets, the appearance of threats and vulnerability
discovery requires constant attention from professional dedicated to information security and poses a constant challenge to
achieve effective protection of the information (Demidecka, 2015; Forester Research, 2015; Hughes & Qu, 2012).
RISK ASSESSMENT
Performing the risk assessment implicates judging the level of risk identified during the analysis process with previously
established risk criteria. A practical qualitative methodology was used for risk. The first step of the analysis is to identify or
evaluate the assets to protect.
Impact Definition
When an asset is the victim of a threat, it is not affected in all its dimensions with the same impact. Once determined that a
threat will harm an asset, the probable impact in the event of an active threat needs to be estimated. According to Valero
(2002), impact is defined as the changes that might happen in the results of one or more objectives if the risk materializes. For
this work, risk impact is measured in a cardinal scale between 0 and 9. The following levels were used to determine the
magnitude of the impact as recommended by Caralli (2007).
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 3
Taveras Cyber Attack Risk Management
Impact Scale
In order to conduct qualitative risk analysis, different areas are defined where potential threats generate some level of impact
with respect to the operations of the company. It also quantifies the impact and likelihood of each, generating a baseline that
will create an action plan to address these risks when they occur.
Operational
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 4
Taveras Cyber Attack Risk Management
Financial
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 5
Taveras Cyber Attack Risk Management
RISK MATRIX
A risk matrix was developed to construct the quantitative assessment on the risk level associated with possible threats and
vulnerabilities. Followed by a total risk rating matrix, that stablished the weight of the threats in accordance with the companies
threats and likelihood of occurrences, as shown in Table 4 and Table 5.
Strong 9 18 27 36 45
Moderate 3 6 9 12 15
Impact
Weak 1 2 3 4 5
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 6
Taveras Cyber Attack Risk Management
VULNERABILITY MATRIX
To identify vulnerabilities on the technology platform, tools such as checklists and specialized software that determine
vulnerabilities at the operating system and network level are used. The resulting matrix was computed following the guidelines
from Goel & Chen (2005). This methodology correlates the assets, vulnerabilities, threats, and controls of the organization and
determines the importance of different controls corresponding to the assets of the organization. As defined in the following
formula, let assume that there are q controls that can help mitigate p threats and is the impact of control Z on the threat T.
𝑙=𝑝
𝑍0 = ∑ 𝑒𝑜𝑙 ∗ 𝑇𝑙
𝑙=1
Vulnerability Matrix
9 = Strong
3 = Moderate
Information Integrity
Lost Sales / Revenue
Service Availability
Reputation (Trust)
Hardware System
1 = Weak
Software System
Priority / Impact
Communication
0 = Not Related
Impact/ Priority Ranking
5 = Key Driver Total Score
4 = Important
Rank
3 = Important, not Key Driver
1 = Not Important
Vulnerabilities 7 6 5 4 3 2 1
Firewalls 5 9 9 9 9 9 9 9 315 10
Data Transmission 5 9 9 9 9 9 9 9 315 9
Databases 5 9 3 9 9 9 9 3 255 8
Application Architecture 5 9 9 9 3 3 9 3 225 7
Internet Servers 4 9 9 3 9 3 3 9 180 6
Password Strength 3 9 3 3 3 3 3 3 81 5
Client Nodes 3 3 3 3 3 3 3 9 81 4
Internet Based Services (DSL, VPN) 4 2 1 1 7 9 0 0 80 3
Table 11. Vulnerability matrix
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 7
Taveras Cyber Attack Risk Management
highest threats on the top. The relative impact of different controls on the threats was established applying subjective/empirical
assessment.
Threat Matrix
9 = Strong
Application Architecture
3 = Moderate
Wireless Networks
Data Transmission
Password Strength
0 = Not Related
Internet Server
Power Outage
Client Nodes
Ranking
Total Score
Databases
5 = Key Driver
Firewalls
Priority
4 = Important
Rank
3 = Important, not Key Driver
1 = Not Important
Threats 10 9 8 7 6 5 4 3 2 1
Intrusion (Hacking, PSW attacks) 5 9 9 9 3 9 9 9 9 9 9 420 11
Server Failures 5 9 3 9 3 9 3 3 3 9 9 300 10
Physical Damage to hardware 5 3 3 9 3 9 3 3 3 3 9 240 9
Extortion 3 3 3 9 3 3 3 9 3 3 3 126 4
Insider Attacks (Malicious) 5 3 3 3 9 3 9 3 3 3 3 165 5
Spoofing & masquerading 3 9 3 3 3 3 3 3 3 3 1 102 2
Denial of Service 5 3 3 3 3 9 3 3 3 9 9 240 8
Human error (Accidents) 5 3 3 3 1 9 3 9 3 3 9 230 7
Theft of computers (laptops/servers) 5 3 3 3 3 9 3 9 1 3 1 190 6
Malicious Code (Viruses, Worms, etc.) 3 3 3 3 9 3 3 3 3 9 1 120 3
Buffer Overflow attacks 5 3 3 3 3 1 1 1 1 1 1 90 1
Table 12. Threat matrix
Control Matrix
1 = Weak
0 = Not Related
Intrusion \ Hacking
Theft of computers
Denial of Service
(laptops/servers)
Priority Threats
Ranking
Insider Attacks
Server Failures
Total Score
5 = Key Driver
Extortion
4 = Important Rank
etc.)
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 8
Taveras Cyber Attack Risk Management
CONCLUSION
This paper attempted to presents a methodological proposal for a quantitative risk analysis, using as a model and observation
scenario a medium-sized technology company ( < 50 employees) dedicated to software development. A matrix-based approach
methodology suggested for information security risk analysis was implemented. This methodology correlates the assets,
vulnerabilities, threats, and controls of the organization and determines the importance of different controls corresponding to
the assets of the organization.When preparing to deal with probable cyber-attacks, the key is understanding the logical flow of
actions that could be performed during the attack, incorporate best practices assess the levels of risk faced by the organization
and proactively design a handbook to react during these scenarios.
Figure 1. Process diagram for security risk analysis and matrix development
The main purpose is project is to provide a guide that can be emulated by small companies, providing the foundation to support
the process required to develop a cyber security risk assessment. Also stablishing a quantitively method as an objective tool
that support the estimation of the risk analysis process. As a next step, we would observe the company for a period of 6 months,
to collect data related to cyber security incidents. The risk matrixes will be recalibrated every 60 days and the various steps of
the risk analysis proces will be compared, in order to determine the effectivenes of the model, and stablish metrics that can
demonstrate if any improvement can be achieved related to cyber security events within the company under observation.
REFERENCES
1. Bard, S. (n.d.). Risk assessment steps five and six: Identify threats and determine vulnerabilities. Retrieved from
http://searchsecurity.techtarget.com/tip/Week-23-Risk-assessment-steps-five-and-six-Identify-threats-and-
determine-vulnerabilities
2. Caralli, R. (2007). The OCTAVE Allegro Guidebook, v1.0. Carnegie Mellon University.
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 9
Taveras Cyber Attack Risk Management
3. Creasey, J., & Glover, I. (2013). Cyber security incident response guide. Retrieved from http://www.crest-
approved.org/wp-content/uploads/CSIR-Procurement-Guide.pdf
4. Demidecka, K. (2015). Communicating a Cyber Attack - A Retrospective Look at the TalkTalk Incident. Retrieved
from http://www.contextis.com/resources/blog/communicating-cyber-attack-retrospective-look-talktalk-incident/
5. Estevez, J. (n.d.). Towards the unification of critical success factors for ERP implementations. In: 10 th annual BIT
conference. Manchester UK
6. Forester Research. (2015). Protect Your Intellectual Property And Customer Data From Theft And Abuse. Retrieved
from https://www.forrester.com/reports/
7. Goel, S., Che, V. (2005). Information security risk analysis a matrix based approach. Retrieved from
http://www.albany.edu/~GOEL/publications/goelchen2005.pdf
8. Hughes, K., & Qu, Y. (2012, 11-14 June 2012). A generic cyber attack response resource risk assessment model.
Paper presented at the Intelligence and Security Informatics (ISI), 2012 IEEE International Conference on.
9. Marcus, R., & John, B. (2000). Access Control Systems and Methodology Information Security Management
Handbook, Four Volume Set: Auerbach Publications.
10. NIST. (2012). Computer security incident handling guide. Retrieved from
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
11. Rossi, B. (2015). Critical steps for responding to cyber attacks . Retrieved from http://www.information-
age.com/technology/security/123459644/6-critical-steps-responding-cyber-attack
12. Societe Generale. (n.d.). Incident response methodology. Retrieved from
https://cert.societegenerale.com/resources/files/IRM-6-Website-Defacement.pdf
13. Sood, A., & Enbody, R. (2014). Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware:
Syngress Publishing.
14. Sumner, M. (2009). Information Security Threats: A Comparative Analysis of Impact, Probability, and
Preparedness. Information Systems Management, 26(1), 2-12. doi: 10.1080/10580530802384639
15. Valero, I. (2002). Risk management as a critical factor for success. Retrieved from
http://www.willydev.net/descargas/WillyDev_GerenciadeRiesgosFactorCriticodeExito.pdf
16. Wang, P., Chao, K. M., & Lo, C. C. (2013, 11-13 Sept. 2013). A Novel Threat and Risk Assessment Mechanism for
Security Controls in Service Management. Paper presented at the e-Business Engineering (ICEBE), 2013 IEEE 10th
International Conference on.
Proceedings of the ForenSecure: Cybersecurity and Forensics Conference, Chicago, Illinois April 12th, 2019 10