1 Security and Risk Management - 2021
1 Security and Risk Management - 2021
Unknown Unmeasurable
People
Threats Risks
Unauthorized
Disclosure Destruction
Alterations
Security and Risk Management 4
THE CYBER THREAT LANDSCAPE
Hacktivist
Botnets VPN
Data at Rest BYOD Spoofing
Cloud Phishing
Urban Information
DLP Snake Oil
Legends Assurance
Authenticity Nonrepudiation
Access Physical
Encryption
Controls Security
Load
BCP / DR Backups
Balancing
Physical
Redundancy Hardening
Security
Security and Risk Management 13
THINGS THAT PROVIDE INTEGRITY
Change Access
Hashing
Control Controls
Digital Configuration
Signatures Management
Security and Risk Management 14
WHEN IN DOUBT….
• Historically, the main focus of Cybersecurity
has been Confidentiality.
– Cryptography
– Secrecy
– Privacy
• Risk Management
Administrative • Training and Documentation
• Guards, Locks
Physical • Fences and lighting
Security and Risk Management 17
APPLICABLE TYPES OF CONTROLS
Deterrent • Discourage an attacker
Confidentiality
(fill in the blank)
provides
Integrity Availability C, I, or A?
Confidentiality
What do you lose
when you provide
Integrity Availability C, I, or A?
CONFIDENTIALITY
As
Confidentiality
increases
AVAILABILITY Availability
decreases
Risk
Risk
Resources Objectives Avoidance
Management
(Adverse)
Security and Risk Management 25
ORGANIZATION PROCESSES
Security
Business
Management
NIST
CMMI ITIL
(SP-800)
ISO 27000 /
CoBIT COSO
31000
Industry
Contractual Legal
Standards
Regulatory Privacy
Requirements Requirements
Security and Risk Management 30
IS IT CONTRACTUAL? LEGAL? STANDARD?
• Some compliance requirements can span multiple
categories
– Payment Card Industry Data Security Standard (PCI
DSS) is both a contractual obligation and a de-facto
industry standard
– Legal privacy requirements may span jurisdictions –
GDPR applies to the data of EU citizens and
companies that do business within the EU, regardless
of where those companies are located
Security and Risk Management 31
PRIVACY
• Several approaches to addressing privacy
– Generic approach: rules that stretch across all industry
boundaries
– Regulation by industry: defines requirements for specific
industry verticals, such as financial sector
• Both systems seek to protect citizens’ personally
identifiable information (PII)
• Both seek to balance the needs of organizations to
collect and use PII while considering security issues
Security and Risk Management 32
WHAT IS PII?
• Depending on the jurisdiction, specific elements my vary but for many (including
GDPR)
• Name, Address, ID numbers (driver license, SS#, passport #, etc.)
• Web data (location, IP, cookies)
• Health, Biometric
• Racial or ethnic data
• Political affiliations
• Sexual orientation or gender identity
• Birthplace
• Genetic information
Under
Unknown
Reported
Security and Risk Management
SOCIAL ENGINEERING ATTACKS
• Phishing
• Spear-Phishing
• Pharming
• Whaling
• Identity Theft
• Shoulder Surfing
• Tailgating or Piggybacking
Security and Risk Management 36
PASSWORD ATTACKS
• Sniffing • Password Cracking
–Capturing network traffic –Brute Force
• Replay –Rainbow Tables
–Retransmitting captured –Dictionary
network traffic –Social Engineering
• Accessing Password File
Security and Risk Management 37
HACKTIVISM
• Hacking to promote
political or ideological
cause or purpose
External
Trademarks Patents
Trade
Copyrights
Secrets
Security and Risk Management 48
TRADE SECRET LAW
• Trade secret is something that is proprietary to a company
and is important for it’s survival and profitability.
– Formula for Coca Cola
– Source code of a program
– Method for making something
– Trade secret has no expiration
• Employees often required to sign Non-Disclosure
Agreements (NDA) to protect trade secrets
https://www.reddit.com/r/MapPorn/comments/1u71ne/a_map_of_the_legal_systems_in_the_world_1400x736/ 56
LAWS, DIRECTIVES, AND REGULATIONS
• If you’re not a lawyer, you’re not a lawyer
• But increasingly it is important for information
security professionals to understand their legal
environment
Trade
IP Law Patents
Secrets
Copyright
Trademarks
Law
Industry
Regulatory
Standards
Wrongs
Wrongs
Intentional against Negligence
against person
property
Dignitary Economic
Nuisance Strict liability
wrongs wrongs
•Maximum tolerable
Identify downtime (MTD)
threats •Define operational disruption
and map •Financial considerations
•Regulatory responsibilities
them to •Reputation impacts
Security and Risk Management 87
BIA STEPS Know
Order
1.Select individuals to interview for data gathering
2.Create data-gathering techniques (surveys, questionnaires,
qualitative and quantitative approaches)
3.Identify critical business functions
4.Identify resource dependencies
5.Calculate how long these functions can survive without resources
6.Identify vulnerabilities and threats to these functions
7.Calculate the risk for each
8.Document findings and report to management
Security and Risk Management 88
RISK ASSESSMENT AS PART OF BIA
• Determine organizations tolerance for continuity risk
• Make use of data gathered in BIA
• Identify, evaluate and record
– Vulnerabilities
– Threats and hazards
– Mitigating or compensating controls
– Single points of failure
– Critical skill concentrations or shortages
– Continuity risk
• accepted or handled elsewhere
Reconstitution Appendixes
• Restore facility, test, move • Calling tree, OEP, DR, etc., system
operations back home requirements, schematics
Vendor, consultant,
& contractor Compliance policy Privacy policy
agreements and requirements requirements
controls
Security and Risk Management 106
1.10 UNDERSTAND AND APPLY
RISK MANAGEMENT CONCEPTS
?
What is the value of the asset or information?
Uncertainty
Disruptive changes
Risk can
never be
IGNORED ignored!
DISCUSSION QUESTION: RISK
1. Give examples of each risk strategy:
Transferred Avoided
Reduced Accepted
Impact Probability
Organizational Inputs
Step 6 Step 1
MONITOR CATEGORIZE
Information
Step 4 Step 3
ASSESS IMPLEMENT
Systems
Security Controls
Tangible Intangible
Quantifiable Unquantifiable
Computers Data
Facilities Intellectual Property
Networking Reputation
Brainstorming
Storyboarding
127
SECURITY CONTROL ASSESSMENT (SCA)