Lecture 4 - Security Risk Analysis & Management
Lecture 4 - Security Risk Analysis & Management
Lecture - 4
Risks
} Analysis
Assess risk
If we had accurate probabilities and values, risk would
be
Impact valuation x probability of threat x probability of exploitation
Plus a correction factor for risk aversion
Since we haven't, we construct matrices such as
Impact valuation
Risk Low Med High
Responses to risk
Avoid it completely by withdrawing from an activity
Accept it and do nothing
Reduce it with security measures
Commercial tools
Mostly rely on check lists
CRAMM (CCTA Risk Assessment and Management Methodology):
UK Government approach
Supported by software
PROTEUS (BSI) software:
Gap analysis to identify necessary actions and existing strengths
Comprehensive practical guidance and the text of BS 7799
Reporting, for easy monitoring and maintenance
Evidence to customers and auditors
Generic processes
Threat trees (see below):
Threat analysis
Based on fault trees
Only addresses the threat identification stage
Attack trees (see below)
Vulnerability analysis
Model of system
Calculate risks from
Impact
Threats to
Vulnerability Electronic Mail
Message
Originator Handling Recipient
O R Disclosure Integrity Denial of
M Service
Other
Subscribers
S
External O R M S E O R M S E O R M S E
Electronic E
Mail System
Tree Structure
Goal is root node
Ways of achieving goals are leaf nodes
Costs can be associated with nodes