Lesson5 Risks and Management
Lesson5 Risks and Management
OF
AGRICULTURE & TECHNOLOGY
JKUAT SODeL
Nairobi, Kenya
E-mail: [email protected]
Back Close 0
BIT 2317 Computer Systems Security
LESSON 5
Risks and Management
Learning outcomes
JKUAT SODeL
Back Close 1
BIT 2317 Computer Systems Security
5.1. Security Risk Analysis & Management
Risk Analysis & Management needs to be a part of system de-
velopment, not tackled on afterwards. Organization information
has value and must be available where and when needed for use
JKUAT SODeL
Back Close 2
BIT 2317 Computer Systems Security
JKUAT SODeL
Back Close 3
BIT 2317 Computer Systems Security
• Risk Analysis involves the identification and assessment of
the levels of risk, calculated from the:
– Values of assets
– Threats to the assets
JKUAT SODeL
Back Close 4
BIT 2317 Computer Systems Security
2. Identification of all the threats to the assets
3. Determination of the risk impact on assets and the cost
4. Identification of all vulnerabilities and assessment of the
risk
JKUAT SODeL
Back Close 5
BIT 2317 Computer Systems Security
attacks is unpredictable; the actions of future attackers
are unpredictable
3. Measurement of benefit from security measures:
problems with the difference of two approximate quanti-
JKUAT SODeL
Back Close 6
BIT 2317 Computer Systems Security
• Medium: noticeable impact (“material” in auditing
terms)
• Low: can be absorbed without difficulty: 1 - 10
2. Express money values in levels, e.g. For a large University
JKUAT SODeL
Department a possibility is
• High
• Medium
©2015
• Low
Back Close 7
BIT 2317 Computer Systems Security
2. Identification of assets & business processes. These in-
clude:
• Hardware
• Software: purchased or developed programs
JKUAT SODeL
• Data
• People: who run the system
• Documentation: manuals, administrative procedures,
©2015
etc
• Supplies: paper forms, magnetic media, printer liq-
uid, etc
• Money
• Intangibles:
JJ II – Goodwill
J I – Organization confidence
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 8
BIT 2317 Computer Systems Security
– Organization image
3. Identification of threats and valuation of their impact on
assets (impact valuation) for each group of assets:
• Identify threats, e.g. for stored data
JKUAT SODeL
– Loss of confidentiality
– Loss of integrity
– Loss of completeness
©2015
Back Close 9
BIT 2317 Computer Systems Security
• Every company or organization has some processes
that are critical to its operation
• The criticality of a process may increase the impact
valuation of one or more assets identified therefore:
JKUAT SODeL
Back Close 10
BIT 2317 Computer Systems Security
– Standard good practice, e.g. BS 7799 recommen-
dations of good practice
For each threat:
• Identify vulnerabilities and devise ways to exploit a
JKUAT SODeL
threat successfully;
• Assess levels of likelihood - High, Medium, and Low of
attempt. Expensive attacks are less likely (e.g. brute-
©2015
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 11
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
5. Risk assessment
• If there was accurate probabilities and values, risk would
be:
– Impact valuation x probability of threat x probability
of exploitation
JJ II – Plus a correction factor for risk aversion
J I • Since it is not available, the following matrices are con-
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 12
BIT 2317 Computer Systems Security
structed:
JKUAT SODeL
• Security Measures
JJ II The Possible security measures include:
J I 1. Transfer the risk, e.g. insurance
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 13
BIT 2317 Computer Systems Security
2. Reduce vulnerability
• Reduce likelihood of attempt
– e.g. publicize security measures in order to deter
attackers
JKUAT SODeL
Back Close 14
BIT 2317 Computer Systems Security
identifying threats and vulnerabilities with an aim of reducing
them. Risks are minimized by identifying them and creating a
mitigation plan for those risks. Mitigation is defined as making
something less harmful or less painful, therefore, planning is
JKUAT SODeL
Back Close 15
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
Back Close 16
BIT 2317 Computer Systems Security
• The results are consistent
• The expenditure and its benefits are commensurate
with the risks
4. Iterate
JKUAT SODeL
Back Close 17
BIT 2317 Computer Systems Security
2. Volume of work and volume of output
3. Integrating them into a ”normal” development process
do this:
• Place a value on the information
• Identify as many risk as possible and their associated threats
and vulnerabilities.
• Mitigate the identified risks
JJ II
• Be ware that there are always things that are overlooked
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 18
BIT 2317 Computer Systems Security
There is a limit to ones ability to mitigate risk, and sometimes
the cost or difficulties of reducing the risk is greater than the risk
it self. Every risk plan is different because every organization
has a different set of circumstances, budget, and workforce to use
JKUAT SODeL
Back Close 19
BIT 2317 Computer Systems Security
• In what manner is the information accessed?
• How many people access the information?
• Is the information easily secured?
Regardless of whether the decision is to mitigate the risks or
JKUAT SODeL
Once the risks are identified and assigned a cost (in time and
money) to secure the information, comparison is made between
it and the value of information to determine reasonable security
measures that can be taken. Using the software company as an
example, the following might be identified:
• The value of the software application is Kshs 5 million
JJ II
because the sales of the software are Kshs 5 million
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 20
BIT 2317 Computer Systems Security
• The risk is that competitors might obtain the technology
used
• The threats are that someone from outside will locate and
access the technology or the employee will gain access to
JKUAT SODeL
Back Close 21
BIT 2317 Computer Systems Security
• Things one might have thought of would be limiting access
to the computer laboratories where the application is be-
ing developed, post a list of people authorized access and
authenticating people who want to access the application.
JKUAT SODeL
• Summary
• Information security revolves around ensuring that organi-
©2015
Back Close 22
BIT 2317 Computer Systems Security
• Availability is assuring information and communication
services will be ready for use when expected.
To ensure that information plans maintain confidentiality, in-
tegrity and availability, security is necessary. Possible threats
JKUAT SODeL
Back Close 23
BIT 2317 Computer Systems Security
5.3. Organizational security policy
5.3.1. Security Governance
Security Governance is the organizational processes and rela-
tionships for managing risk. It includes:
JKUAT SODeL
5.3.2. Policies
A policy is an essential foundation of effective information secu-
rity program. The success of an information resources protec-
JJ II tion program depends on the policy generated and on the atti-
J I tude of management toward securing information on automated
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 24
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
Back Close 25
BIT 2317 Computer Systems Security
systems. A Policy maker sets the tone and the emphasis on
how important a role information security will have within the
agency. The policy maker primary responsibility is to set the
information resource security policy for the organization with
JKUAT SODeL
Back Close 26
BIT 2317 Computer Systems Security
the most difficult to implement. The basic rules to follow when
shaping policy is that policies should:
1. Never conflict with law
2. Stand up in court
JKUAT SODeL
Back Close 27
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 28
BIT 2317 Computer Systems Security
• Applications: This are all the applications systems
Policies are important reference documents for internal audits
and for resolution of legal disputes about management’s due
diligence. Policy documents can act as a clear statement of
JKUAT SODeL
management’s intent.
Back Close 29
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
JJ II
Figure 5.5: Policies, standards, and practices
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 30
BIT 2317 Computer Systems Security
tions, etc.
3. Guidelines: Guidelines are recommended methods for
performing a task; recommended, but not required e.g.
guidelines on Malware cleanup, spyware removal, data con-
JKUAT SODeL
Back Close 31
BIT 2317 Computer Systems Security
2. Read
3. Understood
4. Agreed-to
JKUAT SODeL
Back Close 32
BIT 2317 Computer Systems Security
– Another Approach to Policy Development
– SP 800-18 Guide for Developing
To ensure effective enterprise information security, the fol-
lowing processes are followed:
JKUAT SODeL
tion security
3. Guides development, implementation, & management
requirements of information security program
EISP documents should provide:
1. An overview of corporate philosophy on security
JJ II 2. Information about information security organization
J I & information security roles:
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 33
BIT 2317 Computer Systems Security
– Responsibilities for security shared by all organi-
zation members
– Responsibilities for security unique to each orga-
nizational role
JKUAT SODeL
Back Close 34
BIT 2317 Computer Systems Security
5. References Information Technology standards & guidelines
A sample EISP
• Protection of Information: Information must be pro-
tected in a manner commensurate with its sensitivity, value,
JKUAT SODeL
Back Close 35
BIT 2317 Computer Systems Security
dled by computers & communications systems.
• Legal Conflicts: Company X information security poli-
cies were drafted to meet or exceed the protections found
in existing laws & regulations, & any Company X informa-
JKUAT SODeL
Back Close 36
BIT 2317 Computer Systems Security
icy Non-Enforcement: Management’s non-enforcement of
any policy requirement does not constitute its consent
• Violation Of Law: Company X management must seri-
ously consider prosecution for all known violations of the
JKUAT SODeL
law.
• Revocation Of Access Privileges: Company X re-
serves the right to revoke a user’s information technology
©2015
Back Close 37
BIT 2317 Computer Systems Security
cluding, but not limited to, policies, standards, & pro-
cedures, must be classified as “Internal Use Only,” unless
expressly created for external business processes or part-
ners
JKUAT SODeL
Back Close 38
BIT 2317 Computer Systems Security
fies Processes & authorities that provide this control and serves
to indemnify organization against liability for inappropriate or
illegal system use. Therefore ISSP:
1. Address specific technology-based systems
JKUAT SODeL
Back Close 39
BIT 2317 Computer Systems Security
Components of the ISSP
These include:
1. Statement of Purpose: Scope & Applicability, definition of
technology, Addressed and responsibilities
JKUAT SODeL
Back Close 40
BIT 2317 Computer Systems Security
5. Violations of Policy: Procedures for reporting violations
and penalties for violations
6. Policy Review & Modification: Scheduled review of policy
and procedures for modification
JKUAT SODeL
Back Close 41
BIT 2317 Computer Systems Security
confidentiality, integrity or availability of information and
informs technologists of management intent.
2. Technical specifications SysSPs: It is the System ad-
ministrators’ responsibility to issue directions on imple-
JKUAT SODeL
Back Close 42
BIT 2317 Computer Systems Security
(b) Capability Table: A similar method that specifies
which subjects & objects users or groups can access.
Specifications are frequently complex matrices, rather
than simple lists or tables. The level of detail & speci-
JKUAT SODeL
Back Close 43
BIT 2317 Computer Systems Security
files, communications, & applications
ACL Administrators set user privileges: read, write,
create, modify, delete, compare and copy
(c) Configuration rules: Configuration rules are spe-
JKUAT SODeL
tem operation than ACLs & may or may not deal with
users directly. Many security systems require specific
configuration scripts telling systems what actions to
perform on each set of information processed.
3. Combined in a single policy document
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 44
BIT 2317 Computer Systems Security
5.3.4. Guidelines for Policy Development
It is often useful to view policy development as a two-part project:
1. Design & develop policy (or redesign & rewrite outdated
policy)
JKUAT SODeL
Back Close 45
BIT 2317 Computer Systems Security
• Investigation Phase
The policy development team should: Obtain support from se-
nior management, & active involvement of IT management, specif-
ically Chief information Officer (CIO). Clearly articulate goals of
JKUAT SODeL
JJ II • Analysis Phase
J I This includes the following activities:
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 46
BIT 2317 Computer Systems Security
1. New or recent risk assessment or IT audit documenting
the current information security needs of the organization
2. Key reference materials, including any existing policies
• Design phase
JKUAT SODeL
JJ II • Implementation Phase
J I This phase involves:
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 47
BIT 2317 Computer Systems Security
1. Writing the policies
2. Ensuring that the policies are enforceable as written
Policy distribution is not always as straightforward. Effective
policy:
JKUAT SODeL
minology
• Maintenance Phase
Maintain & modify policy as needed to ensure that it remains
effective as a tool to meet changing threats. Policy should have
a built-in mechanism via which users can report problems with
JJ II the policy, preferably anonymously. Periodic review should be
J I built into the process.
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 48
BIT 2317 Computer Systems Security
A Final Note on Policy
• Lest you believe that the only reason to have policies is to
avoid litigation, it is important to emphasize the preven-
tative nature of policy
JKUAT SODeL
Back Close 49
BIT 2317 Computer Systems Security
• BoD, CEO, BoD Committee
• CFO, CIO, CSO, CISO
• Director, Manager
• IT/IS Security
JKUAT SODeL
• Audit
Audit should be separate from implementation and opera-
©2015
Back Close 50
BIT 2317 Computer Systems Security
JKUAT SODeL
©2015
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 51
BIT 2317 Computer Systems Security
5.3.6. Roles and Responsibilities
The best practice to ensure that employees play their roles and
responsibilities effectively include:
• Least Privilege
JKUAT SODeL
• Mandatory Vacations
• Job Rotation
©2015
• Separation of Duties
This encompasses the roles and responsibilities of the:
1. Owners: Determine security requirements
2. Custodians: Manage security based on requirements
3. Users: Access as allowed by security requirements
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 52
BIT 2317 Computer Systems Security
5.3.7. Information classification
Information can be classified based on the following:
1. Not all information has the same value
2. Need to evaluate value based on CIA
JKUAT SODeL
JJ II 3. Confidential
J I 4. Sensitive but Unclassified
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 53
BIT 2317 Computer Systems Security
5. Unclassified
Private Sector classifications:
1. Confidential
2. Private
JKUAT SODeL
3. Sensitive
4. Public
©2015
Back Close 54
BIT 2317 Computer Systems Security
Revision Questions
Policy (ISSP)
Solution: Issue-Specific Security Policy provides detailed, tar-
©2015
Back Close 55
BIT 2317 Computer Systems Security
Exercise 2. Explain the procedure of protecting the com-
puter against data loss.
JKUAT SODeL
©2015
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 56
BIT 2317 Computer Systems Security
Solutions to Exercises
Exercise 1.
Access control lists: ACLs enable administrations to restrict
access according to user, computer, time, duration, or even a
JKUAT SODeL
nications devices.
Configuration rules: Configuration rules are specific con-
figuration codes entered into security systems to guide execution
of system when information is passing through it. Rule poli-
cies are more specific to system operation than ACLs & may
JJ II or may not deal with users directly. Many security systems re-
J I quire specific configuration scripts telling systems what actions
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 57
BIT 2317 Computer Systems Security
to perform on each set of information processed. Exercise 1
JKUAT SODeL
©2015
JJ II
J I
J DocDoc I
JKUAT: Setting trends in higher Education, Research and Innovation
Back Close 58
BIT 2317 Computer Systems Security
Exercise 2.
Data loss is one of a computer user’s worst nightmares, and can
be prevented, or at least made tolerable by taking a few steps. To
avoid losing valuable data: i) Keep the computer clean and cool
JKUAT SODeL
Back Close 59