0% found this document useful (0 votes)
16 views

Computer and Network Security - 2

The document discusses IT security management and risk assessment. It covers topics like IT security management overview, organizational security policy, security risk assessment approaches including baseline, informal, and detailed risk analysis. It also discusses ISO security standards and the plan-do-check-act process for security management.

Uploaded by

dvik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Computer and Network Security - 2

The document discusses IT security management and risk assessment. It covers topics like IT security management overview, organizational security policy, security risk assessment approaches including baseline, informal, and detailed risk analysis. It also discusses ISO security standards and the plan-do-check-act process for security management.

Uploaded by

dvik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

BLM5102

Computer Systems and


Network Security

Prof. Dr. Hasan Hüseyin BALIK

(2nd Week)
Outline
• 2. Management issues
—2.1. IT Security Management and Risk Assessment
—2.2. IT Security Controls, Plans and Procedures
—2.3. Physical and Infrastructure Security
—2.4. Human Resources Security
—2.5. Security Auditing
—2.6. Legal and Ethical Aspects
2.1. IT Security Management and Risk
Assessment
2.1. Outline
• IT Security Management
• Organizational Context and Security Policy
• Security Risk Assessment
• Detailed Security Risk Analysis
• Case Study: Silver Star Mines
IT Security Management
Overview
Is the formal process of answering the questions:

What assets How are those What can be


need to be assets done to counter
protected threatened those threats

• Ensures that critical assets are sufficiently protected in a cost-effective


manner
• Security risk assessment is needed for each asset in the organization
that requires protection
• Provides the information necessary to decide what management,
operational, and technical controls are needed to reduce the risks
identified
ISO/IEC 27000 Series of Standards on IT Security Techniques

27000:2016 “Information security management systems - Overview and vocabulary”


provides an overview of information security management systems, and
defines the vocabulary and definitions used in the 27000 family of standards.
27001:2013 “Information security management systems – Requirements” specifies the
requirements for establishing, implementing, operating, monitoring,
reviewing, maintaining and improving a documented Information Security
Management System.
27002:2013 “Code of practice for information security management” provides guidelines
for information security management in an organization and contains a list of
best-practice security controls. It was formerly known as ISO17799.
27003:2010 “Information security management system implementation guidance” details
the process from inception to the production of implementation plans of an
Information Security Management System specification and design.
27004:2009 “Information security management – Measurement” provides guidance to
help organizations measure and report on the effectiveness of their
information security management system processes and controls.
27005:2011 “Information security risk management” provides guidelines on the
information security risk management process. It supersedes ISO13335-3/4.
27006:2015 “Requirements for bodies providing audit and certification of information
security management systems” specifies requirements and provides guidance
for these bodies.
IT Security Management
IT SECURITY MANAGEMENT: A process used to achieve and
maintain appropriate levels of confidentiality, integrity, availability,
accountability, authenticity, and reliability. IT security management
functions include:

Monitoring the
implementation
Determining Identifying and and operation of Developing
safeguards that
organizational Determining analyzing Identifying and Detecting
Specifying are necessary in
IT security organizational security threats and implementing and
appropriate order to cost
objectives, IT security to IT assets analyzing a security reacting to
safeguards effectively
strategies, and requirements within the risks protect the
awareness incidents
policies organization information and program
services within
the organization
Organizational
IT Security Policy
Aspects

Risk Analysis Options

Security Risk Analysis

Baseline Informal Formal Combined

Selection of Controls

Development of Security Plan


and Procedures

Implementation

Implement Security Awareness


Controls & Training

Follow-Up

Security
Maintenance
Compliance

Change Incident
Management Handling

Figure 14.1 Overview of IT Security Management


Interested Interested
Parties Parties
Act

Plan Check

Information
Security Do Managed
Needs Security

Figure 14.2 The Plan - Do - Check - Act Process Model


Organizational Context and
Security Policy
• Maintained and First examine
updated regularly organization’s IT
• Using periodic security security:
reviews
Objectives - wanted
• Reflect changing IT security outcomes
technical/risk
environments
Strategies - how to
• Examine role and meet objectives

importance of IT
Policies - identify
systems in organization what needs to be done
Security Policy
Needs to address:
• Scope and purpose including relation of objectives to business, legal,
regulatory requirements
• IT security requirements
• Assignment of responsibilities
• Risk management approach
• Security awareness and training
• General personnel issues and any legal sanctions
• Integration of security into systems development
• Information classification scheme
• Contingency and business continuity planning
• Incident detection and handling processes
• How and when policy reviewed, and change control to it
Management Support
• IT security policy must be supported by senior
management
• Need IT security officer
• To provide consistent overall supervision
• Liaison with senior management
• Maintenance of IT security objectives, strategies, policies
• Handle incidents
• Management of IT security awareness and training programs
• Interaction with IT project security officers
• Large organizations need separate IT project
security officers associated with major projects and
systems
• Manage security policies within their area
Security Risk Assessment
Critical component of process

Ideally examine every organizational asset

• Not feasible in practice

Approaches to identifying and mitigating risks


to an organization’s IT infrastructure:

• Baseline
• Informal
• Detailed risk
• Combined
Baseline Approach
• Goal is to implement agreed controls to provide
protection against the most common threats
• Forms a good base for further security measures
• Use “industry best practice”
• Easy, cheap, can be replicated
• Gives no special consideration to variations in risk exposure
• May give too much or too little security
• Generally recommended only for small
organizations without the resources to
implement more structured approaches
Involves conducting an
informal, pragmatic risk
Exploits knowledge and
analysis on Fairly quick and cheap
expertise of analyst
organization’s IT
systems

Judgments can be
made about
Some risks may be Skewed by analyst’s
vulnerabilities and risks
incorrectly assessed views, varies over time
that baseline approach
would not address

Suitable for small to


medium sized
organizations where IT
systems are not
necessarily essential
Detailed Risk Analysis
Most May be a
comprehensive legal
approach requirement
Significant to use
cost in time,
resources,
expertise

Assess using Suitable for large


formal structured organizations
process with IT systems
•Number of stages critical to their
•Identify threats and
vulnerabilities to assets business
•Identify likelihood of risk objectives
occurring and consequences
Combined Approach
• Combines elements of the baseline, informal, and detailed risk analysis
approaches
• Aim is to provide reasonable levels of protection as quickly as possible then to
examine and adjust the protection controls deployed on key systems over time
• Approach starts with the implementation of suitable baseline security
recommendations on all systems
• Next, systems either exposed to high risk levels or critical to the organization's
business objectives are identified in the high-level risk assessment

• A decision can then be made to possibly conduct an immediate informal risk


assessment on key systems, with the aim of relatively quickly tailoring controls to
more accurately reflect their requirements

• Lastly, an ordered process of performing detailed risk analyses of these systems


can be instituted

• Over time, this can result in the most appropriate and cost-effective security
controls being selected and implemented on these systems
Detailed Security Risk
Analysis
Provides the most accurate evaluation of an
organization's IT system’s security risks

Highest cost

Initially focused on addressing defense


security concerns

Often mandated by government


organizations and associated businesses
Step 1: Prepare for Assessment
Derived from Organizational Aspects

Step 2: Conduct Risk Analysis

Step 4: Maintain Assessment


Identify Threat Sources and Events
Step 3:Communicate Results

Identify Vulnerabilities and


Predisposing Conditions

Determine Likelihood of Occurance

Determine Magnitude of Impact

Determine Risk

Figure 14.3 Risk Assessment Process


Establishing the Context
• Initial step
• Determine the basic parameters of the risk assessment
• Identify the assets to be examined

• Explores political and social environment in which the


organization operates
• Legal and regulatory constraints
• Provide baseline for organization’s risk exposure

• Risk appetite
• The level of risk the organization views as acceptable
Media Utilities Banking &
Finance

Construction Retail Health Care

Less Vulnerable More Vulnerable

Agriculture Communications Transportation

Education Manufacturing Government

Figure 14.4 Generic Organizational Risk Context


Asset Identification
• Last component is to identify assets to examine
• Draw on expertise of people in relevant areas of
organization to identify key assets
• Identify and interview such personnel

Asset

•“anything that needs to be protected” because


it has value to the organization and contributes
to the successful attainment of the
organization’s objectives
Terminology
• Asset: A system resource or capability of
value to its owner that requires
protection
• Threat: A potential for a threat source to
exploit a vulnerability in some asset,
which if it occurs may compromise the
security of the asset and cause harm to
the asset’s owner
• Vulnerability: A flaw or weakness in an asset’s design,
implementation, or operation and
management that could be exploited
by some threat
• Risk: The potential for loss computed as the
combination of the likelihood that a given
threat exploits some vulnerability to an
asset, and the magnitude of harmful
consequence that results to the asset’s
owner
Threat Identification
• A threat is:

Anything that
might hinder or
prevent an asset
from providing
appropriate levels
of the key security
services
Threat Sources
• Threats may be
• Natural “acts of God”
• Man-made
• Accidental or deliberate

Evaluation of human threat sources should consider:

• Motivation
• Capability
• Resources
• Probability of attack
• Deterrence

• Any previous experience of attacks seen by the


organization also needs to be considered
Vulnerability
Identification
• Identify exploitable flaws or weaknesses in
organization’s IT systems or processes
• Determines applicability and significance of threat to
organization
• Need combination of threat and vulnerability to
create a risk to an asset
• Outcome should be a list of threats and
vulnerabilities with brief descriptions
of how and why they might occur
Analyze Risks
• Specify likelihood of occurrence of each
identified threat to asset given existing controls
• Specify consequence should threat occur
• Derive overall risk rating for each threat
• Risk = probability threat occurs x cost to
organization
• Hard to determine accurate
probabilities and realistic cost
consequences
• Use qualitative, not quantitative,
ratings
Analyze Existing Controls
• Existing controls used to attempt to minimize
threats need to be identified
• Security controls include:
• Management
• Operational
• Technical processes and procedures

• Use checklists of existing controls and interview


key organizational staff to solicit information
Extreme Implement
Treatment

Risk Level Judgement


Needed

Uneconomic
so accept
Low
$ Cost of Treatment $$$$$

Figure 14.5 Judgment About Risk Treatment


Risk Treatment Alternatives
Choosing to accept a
Risk risk level greater
than normal for
acceptance business reasons

Not proceeding
Risk with the activity
or system that
avoidance creates this risk

Sharing
Risk responsibility for
the risk with a
transfer third party

Modifying the structure or use of


Reduce the assets at risk to reduce the
impact on the organization should
consequence the risk occur

Reduce Implement suitable controls to


lower the chance of the
likelihood vulnerability being exploited
Case Study: Silver Star
Mines
• Fictional operation of global mining company
• Large IT infrastructure
• Both common and specific software
• Some directly relates to health and safety
• Formerly isolated systems now networked
• Decided on combined approach
• Mining industry less risky end of spectrum
• Subject to legal/regulatory requirements
• Management accepts moderate or low risk
Assets
Reliability and integrity
of SCADA nodes and
net

Availability, integrity Integrity of stored file


and confidentiality of and database
mail services information

Availability, integrity of
Availability, integrity
maintenance/production
of financial system
system

Availability, integrity of
procurement system

You might also like