Lecture 2 Risk Analysis
Lecture 2 Risk Analysis
Threat Assessment
The first step in a risk management program is a threat assessment. A threat assessment considers the full
spectrum of threats (i.e., natural, criminal, terrorist, accidental, etc.) for a given facility/location.
The assessment should examine supporting information to evaluate the likelihood of occurrence for each threat.
For natural threats, historical data concerning frequency of occurrence for given natural disasters such as
tornadoes, hurricanes, floods, fire, or earthquakes can be used to determine the credibility of the given threat.
Vulnerability Assessment
Once the credible threats are identified, a vulnerability assessment must be performed. The vulnerability
assessment considers the potential impact of loss from a successful attack as well as the vulnerability of the
facility/location to an attack. Impact of loss is the degree to which the mission of the agency is impaired by a
successful attack from the given threat. A sample set of definitions for impact of loss is provided below. These
definitions are for an organization that generates revenue by serving the public.
Devastating: The facility is damaged/contaminated beyond habitable use. Most items/assets are lost, de-
stroyed, or damaged beyond repair/restoration. The number of visitors to other facilities in the organiza-
tion may be reduced by up to 75% for a limited period of time.
Severe: The facility is partially damaged/contaminated. Examples include partial structure breach result-
ing in weather/water, smoke, impact, or fire damage to some areas. Some items/assets in the facility are
damaged beyond repair, but the facility remains mostly intact. The entire facility may be closed for a pe-
riod of up to two weeks and a portion of the facility may be closed for an extended period of time (more
than one month). Some assets may need to be moved to remote locations to protect them from environ-
mental damage. The number of visitors to the facility and others in the organization may be reduced by
up to 50% for a limited period of time.
Noticeable: The facility is temporarily closed or unable to operate, but can continue without an interrup-
tion of more than one day. A limited number of assets may be damaged, but the majority of the facility is
not affected. The number of visitors to the facility and others in the organization may be reduced by up
to 25% for a limited period of time.
Minor: The facility experiences no significant impact on operations (downtime is less than four hours)
and there is no loss of major assets.
Vulnerability is defined to be a combination of the attractiveness of a facility as a target and the level of
deterrence and/or defense provided by the existing countermeasures. Target attractiveness is a measure of the
asset or facility in the eyes of an aggressor and is influenced by the function and/or symbolic importance of the
facility. Sample definitions for vulnerability ratings are as follows:
Very High: This is a high profile facility that provides a very attractive target for potential adversaries,
and the level of deterrence and/or defense provided by the existing countermeasures is inadequate.
High: This is a high profile regional facility or a moderate profile national facility that provides an at-
tractive target and/or the level of deterrence and/or defense provided by the existing countermeasures is
inadequate.
1
Moderate: This is a moderate profile facility (not well known outside the local area or region) that pro-
vides a potential target and/or the level of deterrence and/or defense provided by the existing counter-
measures is marginally adequate.
Low: This is not a high profile facility and provides a possible target and/or the level of deterrence and/
or defense provided by the existing countermeasures is adequate.
RISK MANAGEMENT
Risk Analysis is a process of evaluating the probability of hazardous events
Risk: is a quantified measure of the likelihood of a threat being realised.
The strength of an information infrastructure depends on how well information resources are managed--
what, how, where, and for whom sources of information are established and made available for reuse
To say Risk Analysis is an important issue is an understatement. It is difficult to quantify the losses suffered
each year by businesses arising from the use and misuse of Information Systems (IS)
IS risk analysis is the process of:
identifying potential causes of loss;
designing and implementing controls to prevent them, and, should these fail;
Designing and implementing controls to detect any occurrences and to minimize their effect.
Risk Analysis involves the identification and assessment of the levels of risk, calculated from the
Values of assets
Threats to the assets
Their vulnerabilities and likelihood of exploitation
Risk Management involves the identification, selection and adoption of security measures justified by
◦ The identified risks to assets
◦ The reduction of these risks to acceptable levels
To asses risk:-
use a risk matrix to evaluate threat & counter-measure
2
use a risk management model to manage threat
Responses to Risk
You respond to a risk by either:-
Avoid it completely by withdrawing from an activity
Accept it and do nothing
Reduce it with security measures
Transfer – Involves a third-party liability taking/ insurance.
Security Models
A security policy is a document that expresses clearly and concisely what the protection mechanisms are
to achieve.
A security model is a specification of a security policy:
it describes the entities governed by the policy,
It states the rules that constitute the policy.
There are various types of security models:
Models can capture policies for confidentiality (Bell-LaPadula) or for integrity (Biba, Clark-Wilson).
Some models apply to environments with static policies (Bell-LaPadula), others consider dynamic
changes of access rights (Chinese Wall).
Security models can be informal (Clark-Wilson), semi-formal, or formal (Bell-LaPadula, Harrison-
Ruzzo-Ullman).
Model vs Policy
A security model maps the abstract goals of the policy to information system terms by specifying
explicit data structures and techniques that are necessary to enforce the security policy. A security model
is usually represented in mathematics and analytical ideas, which are then mapped to system
3
specifications, and then developed by programmers through programming code
For Example, if a security policy states that subjects need to be authorized to access objects, the security
model would provide the mathematical relationships and formulas explaining how x can access y only
through the outlined specific methods
A security policy outlines goals without regard to how they will be accomplished. A model is a
framework that gives the policy form and solves security access problems for particular situations.
Note
Security is a system requirement just like performance, capability, cost, etc. Therefore, it may be necessary to
trade off certain security requirements to gain others.
CONTROLS
Security controls are safeguards or countermeasures to avoid, counteract or minimize security risks
relating to personal property, or any company property.
The control environment sets the tone of an organization, influencing the control consciousness of its people. It
is the foundation for all other components of internal control, providing discipline and structure. Control
environment factors include the integrity, ethical values, and competence of the entity’s people; management’s
philosophy and operating style; and the way management assigns authority and organizes and develops its
people
Activity phase controls can be classified as follows:
• Preventative controls exist to prevent the threat from coming in contact with the weakness.
• Detective controls exist to identify that the threat has landed in our systems.
• Corrective controls exist to mitigate or lessen the effects of the threat being manifested.
4
Organizational Controls
Organizational controls are procedures and processes that define how people in the organization should perform
their duties.
Preventative controls in this category include:
Clear roles and responsibilities. These must be clearly defined and documented so that management and
staff clearly understand who is responsible for ensuring that an appropriate level of security is implemented
for the most important IT assets.
Separation of duties and least privileges. When properly implemented, these ensure that people have only
enough access to IT systems to effectively perform their job duties and no more.
Documented security plans and procedures. These are developed to explain how controls have been
implemented and how they are to be maintained.
Security training and ongoing awareness campaigns. This is necessary for all members of the
organization so that users and members of the IT team understand their responsibilities and how to properly
utilize the computing resources while protecting the organization's data.
Systems and processes for provisioning and de-provisioning users. These controls are necessary so that
new members of the organization are able to become productive quickly, while leaving personnel lose access
immediately upon departure. Processes for provisioning should also include employee transfers from groups
within the company where privileges and access change from one level to another.
Established processes for granting access to contractors, vendors, partners, and customers. This is
often a variation on user provisioning, mentioned previously, but in many cases it is very distinct. Sharing
some data with one group of external users while sharing a different collection of data with a different group
can be challenging. Legal and regulatory requirements often impact the choices, for example when health or
financial data is involved.
Detection controls in this category include:
Performing continuing risk management programs to assess and control risks to the organization's key
assets.
Executing recurrent reviews of controls to verify the controls' efficacy.
Periodic undertaking of system audits to ensure that systems have not been compromised or misconfigured.
Performing background investigations of prospective candidates for employment; You should contemplate
implementing additional background investigations for employees when they are being considered for
promotions to positions with a significantly higher level of access to the organization's IT assets.
Establishing a rotation of duties, this is an effective way to uncover notorious activities by members of the
IT team or users with access to sensitive information.
Management controls in this category include:
Incident response planning, which provides an organization with the ability to quickly react to and recover
from security violations while minimizing their impact and preventing the spread of the incident to other
systems.
Business continuity planning, which enables an organization to recover from catastrophic events that impact
a large fraction of the IT infrastructure.
Operational Controls
Operational controls define how people in the organization should handle data, software and hardware. They also
include environmental and physical protections as described below.
Preventative controls in this category include:
Protection of computing facilities by physical means such as guards, electronic badges and locks,
biometric locks, and fences.
Physical protection for end-user systems, including devices such as mobile computer locks and alarms
and encryption of files stored on mobile devices.
Emergency backup power, which can save sensitive electrical systems from harm during power
brownouts and blackouts; they can also ensure that applications and operating systems are shut down
gracefully manner to preserve data and transactions.
Fire protection systems such as automated fire suppression systems and fire extinguishers, which are
essential tools for guarding the organization's key assets.
5
Temperature and humidity control systems that extend the life of sensitive electrical equipment and help
to protect the data stored on them.
Media access control and disposal procedures to ensure that only authorized personnel have access to
sensitive information and that media used for storing such data is rendered unreadable by degaussing or
other methods before disposal.
Backup systems and provisions for offsite backup storage to facilitate the restoration of lost or corrupted
data. In the event of a catastrophic incident, backup media stored offsite makes it possible to store critical
business data on replacement systems.
Detection and recovery controls in this category include:
Physical security, which shields the organization from attackers attempting to gain access to its premises;
examples include sensors, alarms, cameras, and motion detectors.
Environmental security, which safeguards the organization from environmental threats such as floods and
fires; examples include smoke and fire detectors, alarms, sensors, and flood detectors.
Technological Controls
Technological controls vary considerably in complexity. They include system architecture design,
engineering, hardware, software, and firmware. They are all of the technological components used to build an
organization's information systems.
Preventative controls in this category include:
Authentication. The process of validating the credentials of a person, computer, process, or device.
Authentication requires that the person, process, or device making the request provide a credential that
proves it is what or who it says it is. Common forms of credentials are digital signatures, smart cards,
biometric data, and a combination of user names and passwords.
Authorization. The process of granting a person, computer process, or device access to certain
information, services, or functionality. Authorization is derived from the identity of the person, computer
process, or device requesting access, which is verified through authentication.
Non-repudiation. The technique used to ensure that someone performing an action on a computer
cannot falsely deny that he or she performed that action. Non-repudiation provides undeniable proof that
a user took a specific action such as transferring money, authorizing a purchase, or sending a message.
Access control. The mechanism for limiting access to certain information based on a user's identity and
membership in various predefined groups. Access control can be mandatory, discretionary, or role-based.
Protected communications. These controls use encryption to protect the integrity and confidentiality of
information transmitted over networks.
Detection and recovery controls in this category include:
Audit systems. Make it possible to monitor and track system behavior that deviates from expected
norms. They are a fundamental tool for detecting, understanding, and recovering from security breaches.
Antivirus programs. Designed to detect and respond to malicious software, such as viruses and worms.
Responses may include blocking user access to infected files, cleaning infected files or systems, or
informing the user that an infected program was detected.
System integrity tools. Make it possible for IT staff to determine whether unauthorized changes have
been made to a system. For example, some system integrity tools calculate a checksum for all files
present on the system's storage volumes and store the information in a database on a separate computer.
Comparisons between a system's current state and its previously-known good configuration can be
completed in a reliable and automated fashion with such a tool.
Management controls in this category include:
Security administration tools included with many computer operating systems and business applications
as well as security oriented hardware and software products. These tools are needed in order to
effectively maintain, support, and troubleshoot security features in all of these products.
Cryptography, which is the foundation for many other security controls. The secure creation, storage,
and distribution of cryptographic keys make possible such technologies as virtual private networks
(VPNs), secure user authentication, and encryption of data on various types of storage media.
6
Identification, which supplies the ability to identify unique users and processes. With this capability,
systems can include features such as accountability, discretionary access control, role-based access
control, and mandatory access control.
Protections inherent in the system, which are features designed into the system to provide protection of
information processed or stored on that system. Safely reusing objects, supporting no-execute (NX)
memory, and process separation all demonstrate system protection features.
8
cycle, and they usually involve a lot of staff members arguing over the details of how specific fiscal values
were calculated.
For organizations with high value assets, the cost of exposure may be so high that you would spend an
exceedingly large amount of money to mitigate any risks to which you were exposed. This is not realistic,
though; an organization would not spend its entire budget to protect a single asset, or even its top five assets.
9
through it.
10