Is Unit Iii
Is Unit Iii
Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk
RISK MANAGEMENT
Definition:
The formal process of identifying and controlling the risks facing an organization is called risk
management. It is the probability of an undesired event causing damage to anasset. There are three steps
1. Risk Identification.
2. Risk Assessment
3. Risk Control
1. Risk Identification: It is the process of examining and documenting the security posture
of an organization’s information technology and the risk itfaces.
To keep up with the competition, organizations must design and create safe environmentsin which business
process and procedures can function.
These environments must maintain Confidentiality & Privacy and assure the integrity of organizational
data-objectives that are met through the application of the principles of
risk management
Components of Risk Management
Figure 3.1.2.1 Components of Risk Management
“1.If you know the enemy & know yourself, you need not fear the result of a hundred battles.
2. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat.
3. If you know neither the enemy nor yourself, you will succumb in every battle”
Know Yourself
It is the responsibility of each community of interest to manage the risks that organizationencounters.
Information Security
Understand the threats and attacks that introduce risk into the organization.
Take a leadership role in addressing risk.
Management & Users
Management must ensure that sufficient resource are allocated to the information security& Information
technology groups to meet the security needs of the organization.
Users work with the systems and the data and are therefore well positioned to understandthe value of the
information assets.
Information Technology
1. Understand the threats and attacks that introduce risk into the organization.
2. Taking asset inventory.
3. Verify the threats and vulnerabilities that have been identified as dangerous to the assetinventory, as well as
the current controls and mitigation strategies.
4. Review the cost effectiveness of various risk control measures.
RISK IDENTIFICATION
Includes all the elements of an organization’s system, such as people, procedures, dataand information,
software, hardware, and networking elements.
Then, you classify and categorize the assets, adding details.
Procedures fall into two categories: IT and business standard procedures, and IT and business sensitive
procedures. The business sensitive procedures are those that may assist a threat agent in crafting an attack
against the organization or that have some other content or feature that may introduce risk to the
organization.
Data Components have been expanded to account for the management of information in all stages:
Transmission, Processing, and Storage.
Software Components can be assigned to one of three categories: Applications, Operating Systems, or
security components. Software Components that provide security controls may span the range of operating
systems and applications categories, but are differentiated by the fact that they are the part of the
information security control environment and must be protected more thoroughly than other system
components.
Hardware is assigned to one of two categories: the usual systems devices and their peripherals, and the
devices that are part of information security control systems. The latter must be protected more thoroughly
than the former.
Depends on the needs of the organization and its risk management efforts.
Name: Should adopt naming standards that do not convey information to potentialsystem attackers.
IP address: Useful for network devices & Servers. Many organizations use the dynamic host control
protocol (DHCP) within TCP/IP that reassigns IP numbers to devices as needed, making the use of IP
numbers as part of the asset identification process problematic. IP address use in inventory is usually
limited to those devices that use static IP addresses.
Media Access Control (MAC) address: Electronic serial numbers or hardware addresses. All network
interface hardware devices have a unique number. The MAC
address number is used by the network operating system as a means to identify a specific network device. It
is used by the client’s network software to recognize traffic that it mustprocess.
Element Type: Document the function of each Element by listing its type. For hardware, a list of possible
element types, such as servers, desktops, networking devices or test equipment.
Serial Number: For hardware devices, the serial number can uniquely identify a specificdevice.
Manufacturer Name: Record the manufacturer of the device or software component. This can be useful
when responding to incidents that involve these devices or when certain manufacturers announce specific
vulnerabilities.
Manufacturer’s Model No or Part No: Record the model or part number of the element. This record of
exactly what the element is can be very useful in later analysis of vulnerabilities, because some
vulnerability instances only apply to specific models of certain devices and software components.
Software Version, Update revision, or FCO number: Document the specific software or firmware
revision number and, for hardware devices, the current field change order (FCO) number. An FCO is an
authorization issued by an organization for the repair, modification, or update of a piece of equipment.
Documenting the revision number and FCO is particularly important for networking devices that function
mainly through the software running on them. For example, firewall devices often have three versions: an
operating system (OS) version, a software version, and a basic input/output system (BIOS) firmware
version.
Logical Location: Note where this element can be found on the organization’s network. The logical
location is most useful for networking devices and indicates the logical network where the device is
connected.
Automated tools identify the system elements that make up the hardware, software, &network
components.
Many organizations use automated asset inventory systems.
The inventory listing is usually available in a data base.
Once stored, the inventory listing must be kept current, often by means of a tool thatperiodically
refreshes the data.
In addition to the categories, it is advisable to add another dimension to represent the sensitivity & Security
priority of the data and the devices that store, transmit & process the data.
Eg: Kinds of classifications are confidential data, internal data and public data.
Information Asset Valuation
As each asset is assigned to its category, posing a number of questions assists in developing the weighting
criteria to be used for information asset valuation or impact evaluation. Before beginning the inventory
process, the organization should determine which criteria can best be used to establish the value of the
information assets. Among the criteria to be considered are:
1. Confidential
2. Internal
3. External
1. Unclassified data
3. Confidential data
4. Secret data
1. Unclassified data: Information that can generally be distributed to the public without any threat to U.S.
National interests.
2. Sensitive But Unclassified data (SBU) : Any information of which the loss, misuse, or unauthorized
access to, or modification of might adversely affect U.S. national interests, the conduct of Department of
Defense(DoD) programs, or the privacy of DoD personnel.
3. Confidential data: Any information or material the unauthorized disclosure of which reasonably could be
expected to cause damage to the national security.
4. Secret: Any information or material the unauthorized disclosure of which reasonably could be cause
serious damage to the national security.
5. Top Secret Data: Any information or material the unauthorized disclosure of which reasonably could be
expected to cause exceptionally grave damage to the national security.
Organization may have
1. Research data
2. Personnel data
3. Customer data
1. Public data
3. Sensitive data
4. Classified data
Public: Information for general public dissemination, such as an advertisement orpublic release.
For Official Use Only: Information that is not particularly sensitive, but not forpublic release,
such as internal communications.
Sensitive: Information important to the business that could embarrass thecompany or cause
loss of market share if revealed.
Classified: Information of the utmost secrecy to the organization, disclosure ofwhich could
severely impact the well-being of the organization.
Security Clearances
The other side of the data classification scheme is the personnel security clearancestructure.
Each user of data must be assigned a single authorization level that indicates the level ofclassification he
or she is authorized to view.
- Eg: Data entry clerk, development Programmer, Information Security Analyst,or even CIO.
- Most organizations have a set of roles and the accompanying securityclearances associated
with each role.
- Overriding an employee’s security clearance is the fundamental principle of“need-to-
know”.
Management of classified data
-
When Information are no longer valuable, proper care should be taken to destroy them by
means of shredding, burning or transferring to a service offering authorized document
destruction.
Dumpster diving to retrieve information that could embarrass a company or compromise information
security.
Threat Identification
After identifying the information assets, the analysis phase moves on to an examination of the threats
facing the organization.
This examination is known as a threat assessment. You can address each threat with afew basic
questions, as follows:
Which threats present a danger to an organization’s assets in the given environment?
Which threats represent the most danger to the organization’s information?
How much would it cost to recover from a successful attack?
Which of the threats would require the greatest expenditure to prevent?
Threat Mean Standard Weight Weighted
Deviation Rank
Vulnerability Identification:
Deliberate acts of theft This information asset has little intrinsic value, but
other assets protected by this device could be
attacked if it is
compromised.
Compromises to intellectual property This information asset has little intrinsicvalue, but
other assets protected by this
device could be attacked if it is
compromised.
RISK ASSESSMENT
Assign weighted scores for the value to the organization of each Information asset.
Eg: Number of network attacks can be forecast based on how many network address theorganization has
assigned.
Risk Determination
Eg: Information Asset A has a value score of 50 & has one vulnerability: Vulnerability 1 has alikelihood of 1.0 with
no current controls, estimate that assumptions and data are 90% accurate.
Solution:
= 50 – 0 + 5
= 55
Identify Possible Controls ( For Residual Risk)
Residual risk is the risk that remains to the information asset even after the existingcontrol has been
applied.
Three general categories of controls
1. Policies
2. Programs
3. Technologies
1. Policies
2. Programs
Education
Training
Awareness
3. Security Technologies
Access Controls
- Give users and data owners limited control over access to informationresources.
Nondiscretionary Controls
- Managed by a central authority in the organization; can be based on individual’s role (role-
based controls) or a specified set of assigned tasks (task-based controls)
- Variation of MAC - users are assigned matrix of authorizations for particularareas of access.
By the end of the Risk Assessment process, you probably have a collection of long lists of information
assets with data about each of them.
The goal of this process is to identify the information assets that have specific vulnerabilities and list them,
ranked according to those most needing protection. You should also have collected some information about
the controls that are already in place.
The final summarized document is the ranked vulnerability risk worksheet, a sample of which is shown in
the following table.
Table 3.3.5.1 Ranked vulnerability risk worksheet
Customer order via SSL - 100 Lost orders due to 0.025 2.5
(inbound) Web server denial-
of-service attack
Four basic strategies to control each of the risks that result from these vulnerabilities.
1. Apply safeguards that eliminate the remaining uncontrolled risks for the vulnerability[Avoidance]
It is the risk control strategy that attempts to prevent the exploitation of the vulnerability,and is
accomplished by means of
1.
Countering threats
2.
Removing Vulnerabilities in assets
3.
Limiting access to assets
4.
Adding protective safeguards.
Three common methods of risk avoidance are
1. Application of policy
2. Application of Training & Education
3. Application of Technology
Transference
Transference is the control approach that attempts to shift the risk to other assets, other processes, or other
organizations.
It may be accomplished through rethinking how services are offered, revising deployment models,
outsourcing to other organizations, purchasing Insurance, Implementing Service contracts with providers.
Top 10 Information Security mistakes made by individuals.
1. Passwords on Post-it-Notes
7. Plug & Play[Technology that enables hardware devices to be installed andconfigured without the
protection provided by people who perform installations]
It is the control approach that attempts to reduce the impact caused by the exploitation ofvulnerability
through planning & preparation.
Mitigation begins with the early detection that an attack is in progress and the ability of the organization to
respond quickly, efficiently and effectively.
Includes 3 types of plans.
1. What do I do now?
For example, a system’s administrator may notice that someone is copying information from the server
without authorization, signaling violation of policy by a potential hacker or an unauthorized employee.
The IRP also enables the organization to take coordinated action that is either predefinedand specific or ad
hoc and reactive.
Can include strategies to limit losses before and during the disaster.
Include all preparations for the recovery process, strategies to limit losses during the disaster, and detailed
steps to follow when the smoke clears, the dust settles, or the floodwater recede.
DRP focuses more on preparations completed before and actions taken after the incident, whereas the IRP
focuses on intelligence gathering, information analysis, coordinated decision making, and urgent, concrete
actions.
BCP is the most strategic and long term of the three plans.
It encompasses the continuation of business activities if a catastrophic event occurs, such as the loss of an
entire database, building or operations center.
Acceptance
It is the choice to do nothing to protect a vulnerability and do accept the outcome of its exploitation.
This strategy occurs when the organization has:
Level of threat and value of asset play major role in selection of strategy
Rules of thumb on strategy selection can be applied:
- When vulnerability (flaw or weakness) exists: Implement security controls toreduce the
likelihood of a vulnerability being exercised.
- When the attacker’s cost is less than his potential gain: Apply protections to
increase the attacker’s cost.
- When potential loss is substantial: Apply design principles, architectural designs, and
technical and non-technical protections to limit the extent of the attack, thereby reducing the
potential for loss.
Once a control strategy has been implemented, it should be monitored, & measured on anongoing basis to
determine the effectiveness of the security controls and the accuracy of the estimate of the Residual risk
There is no exit from this cycle; it is a process that continues for as long as the organization continues to
function.
– Control function
• Preventive or detective
– Architectural layer
– Strategy layer
• Avoidance, mitigation …
1. Organizational policy.
2. External Networks.
7. Applications.
Strategy Layer
Controls are sometimes classified by the risk control strategy they operate within:
1. Avoidance
2. Mitigation
3. transference
Characteristics of Secure Information
1. Confidentiality
2. Integrity
3. Availability
4. Authentication
5. Authorization
6. Accountability
7. Privacy
Confidentiality: The control assures the confidentiality of data when it is stored, processed, or transmitted. An
example of this type of control is the use of Secure Sockets Layer (SSL) encryption technology to secure Web
content as it moves from Web server to browser.
Integrity: The control assures that the information asset properly, completely, and correctly receives, processes,
stores, and retrieves data in a consistent and correct manner .Ex: Use of parity or cyclical redundancy checks in data
transmission protocols.
Availability: The control assures ongoing access to critical information assets. Ex: Deployment of a network
operations center using a sophisticated network monitoring toolset.
Authorization: The control assures that a user has been specifically and explicitly authorized to access, update, or
delete the contents of an information asset. Ex: Use of access control lists and authorization groups in the Windows
networking environment. Another example is the use of a database authorization scheme to verify the designated
users for each function.
Accountability: The control assures that every activity undertaken can be attributed to a specific named person or
automated process. Ex: Use of audit logs to track when each user logged in and logged out of each computer.
Privacy: The control assures that the procedures to access, update, or remove personally identifiable information
comply with the applicable laws and policies for that kind of information.
Feasibility Studies
Before deciding on the strategy (Avoidance, transference, mitigation, or acceptance), for a specific
vulnerability, all the economic and non-economic consequences of the vulnerability facing the information
asset must be explored.
Cost Avoidance- It is the process of avoiding the financial impact of an incident by implementing a
control.
Includes
2. Organizational feasibility
3. Operational Feasibility
4. Technical Feasibility
5. Political feasibility.
Cost Benefit Analysis (CBA)
Organizations are urged to begin the cost benefit analysis by evaluating the worth of the information assets
to be protected and the loss in value if those information assets were compromised by the exploitation of a
specific vulnerability.
The formal process to document this decision making process is called a Cost Benefit analysis or an
economic feasibility study.
Some of the items that affect the cost of a control or safeguard include:
Benefit is the value that an organization realizes by using controls to prevent lossesassociated with a
specific vulnerability.
Asset Valuation is the process of assigning financial value or worth to each informationasset.
Some of the components of asset valuation include:
6. Value to owners.
8. Value to adversaries.
A Single loss expectancy (SLE) is the calculation of the value associated with the most likely loss from an
attack. It is a calculation based on the value of the asset and the exposure factor (EF), which is the
expected percentage of loss that would occur fro a particular attack, as follows:
CBA is whether or not the control alternative being evaluated is worth the associated cost incurred to
control the specific vulnerability.
The CBA is most easily calculated using the ALE from earlier assessments before the implementation of
the proposed control, which is known as ALE (prior).
Subtract the revised ALE, estimated based on control being in place, known as ALE (post). Complete the
calculation by subtracting the annualized cost of the safeguard (ACS).
Where:
ALE prior is the Annualized Loss Expectancy of the risk before the implementation ofthe control.
ALE post is the ALE examined after the control has been in place for a period of time.
ACS is the Annual Cost of the Safeguard.
Bench Marking
– Metrics-based measures
– Process-based measures
The difference between an organization’s measures and those of others is often referred to as a
performance gap. The other measures commonly used in benchmarking are process-based measures.
Process-based measures are generally less focused on numbers and more strategic than metrics-based-
measures.
When organizations adopt levels of security for a legal defense, they may need to show that they have done
what any prudent organization would do in similar circumstances - this is referred to as a standard of due
care
Due diligence is the demonstration that the organization is diligent in ensuring that the implemented
standards continue to provide the required level of protection
Failure to support a standard of due care or due diligence can open an organization to legal liability
Best Business Practices
Security efforts that provide a superior level of protection of information are referred toas best business
practices
Best security practices (BSPs) are security efforts that are among the best in the industry
When considering best practices for adoption in your organization, consider thefollowing:
1. If a bad guy can persuade you to run his program on your computer, it’s not your
computer anymore
2. If a bad guy can alter the operating system on your computer, it’s not your computer
anymore
3. If a bad guy has unrestricted physical access to your computer, it’s not your computer
anymore
4. If you allow a bad guy to upload programs to your web site, it’s not your web site
anymore
8. An out of date virus scanner is only marginally better than no virus scanner at all
Baselining
Before deciding on the strategy for a specific vulnerability all information about the economic and non-
economic consequences of the vulnerability facing the information asset must be explored.
Fundamentally we are asking “What are the actual and perceived advantages of implementing a control
contrasted with the actual and perceived disadvantages of implementing the control?”
Benefit is the value that the organization recognizes by using controls to prevent losses associated with a
specific vulnerability.
This is usually determined by valuing the information asset or assets exposed by the vulnerability and then
determining how much of that value is at risk.
Asset Valuation is the process of assigning financial value or worth to each information asset.
The valuation of assets involves estimation of real and perceived costs associated with the design,
development, installation, maintenance, protection, recovery, and defense against market loss and
litigation.
These estimates are calculated for each set of information bearing systems or information assets.
There are many components to asset valuation.
CBA: Loss Estimates
Once the worth of various assets is estimated examine the potential loss that could occurfrom the
exploitation of vulnerability or a threat occurrence.
This process results in the estimate of potential loss per risk.
The questions that must be asked here include:
– What damage could occur, and what financial impact would it have?
– What would it cost to recover from the attack, in addition to the costs above?
– What is the single loss expectancy for each risk?
Organizational Feasibility
Organizational Feasibility examines how well the proposed information security alternatives will contribute
to the efficiency, effectiveness, and overall operation of an organization.
Above and beyond the impact on the bottom line, the organization must determine howthe proposed
alternatives contribute to the business objectives of the organization.
Operational feasibility
Addresses user acceptance and support, management acceptance and support, and the
overall requirements of the organization’s stake holders.
Sometimes known as behavioral feasibility, because it measures the behavior of users.
One of the fundamental principles of systems development is obtaining user buy in on a project and one of
the most common methods for obtaining user acceptance and support is through user involvement
obtained through three simple steps:
- Educate
- Involve
Technical Feasibility
The project team must also consider the technical feasibilities associated with the design, implementation,
and management of controls.
Examines whether or not the organization has or can acquire the technology necessary to implement and
support the control alternatives.
Political feasibility
For some organizations, the most significant feasibility evaluated may be political
Within Organizations, political feasibility defines what can and cannot occur based on the consensus and
relationships between the communities of interest.
The limits placed on an organization’s actions or a behavior by the information security controls must fit
within the realm of the possible before they can be effectively implemented, and that realm includes the
availability of staff resources.
Not every organization has the collective will to manage each vulnerability through the application of
controls
– Depending on the willingness to assume risk, each organization must define its risk appetite
– Risk appetite defines the quantity and nature of risk that organizations are willing to accept as they
evaluate the tradeoffs between perfect security and unlimited accessibility
Residual Risk
When we have controlled any given vulnerability as much as we can, there is often risk that has not been
completely removed or has not been completely shifted or planned for this remainder is called residual risk.
Documenting Results
At minimum, each information asset-vulnerability pair should have a documented control strategy that
clearly identifies any residual risk remaining after the proposed strategy has been executed.
Some organizations document the outcome of the control strategy for each information asset-vulnerability
pair as an action plan
assigned to an
This action plan includes concrete tasks, each with accountabilityorganizational unit
or to an individual
We must convince budget authorities to spend up to the value of the asset to protect aparticular asset
from an identified threat
The spectrum of steps described above was performed with real numbers or best guessestimates of real
numbers-this is known as a quantitative assessment.
However, an organization could determine that it couldn’t put specific numbers on thesevalues.
Instead of using specific numbers, ranges or levels of values can be developedsimplifying the process
Delphi Technique
One technique for accurately estimating scales and values is the Delphi Technique.
The Delphi Technique, named for the Oracle at Delphi, is a process whereby a group ofindividuals rate
or rank a set of information
The individual responses are compiled and then returned to the individuals for anotheriteration
This process continues until the group is satisfied with the result.