Final Flashcards
(363 cards)
Risk
likelihood that a chosen action or activity
(including the choice of inaction) will lead to a
loss (un undesired outcome)
Risk Management
identification, assessment,
and prioritization of risks followed by coordinated
use of resources to monitor, control or minimize
the impact of risk-related events or to maximize
the gains.
examples: finances, industrial processes, public health
and safety, insurance, etc.
one of the key responsibilities of every manager within
an organization
Risks in Info. Security
risks which arise from an
organization’s use of info. technology (IT)
related concepts: asset, vulnerability, threat
Asset
anything that needs to be protected because it
has value and/or contributes to the successful
achievement of the organization’s objectives
Threat
any circumstance or event with the potential
to cause harm to an asset and/or result in harm
to organization
Vulnerability
a weakness in an asset that can be
exploited by threat and cause harm the
asset and/or the organization
Risk
probability of a threat acting upon a vulnerability
causing harm to an asset
Security Risk Management
process of identifying vulnerabilities in an organization’s info. system and taking steps to protect the CIA of all of its components. two major sub-processes: Risk Identification & Assessment 12 Security Risk Management Risk Control (Mitigation)
Risk Identification
Identify the Risk Areas Assess the Risks
Identify & Prioritize Assets Identify & Prioritize Threats Identify Vulnerabilities between Assets and Threats (Vulnerability Analysis)
Risk Assessment
Calculate Relative Risk ($$$)
of Each Vulnerability
Risk Control (Mitigation)
Re-evaluate the Risks Implement Risk Management Actions Develop Risk Management Plan
Identifying Hardware, Software (& Networking Assets)
Can be done automatically (using specialized software)
or manually.
Needs certain planning – e.g. which attributes of each
asset should be tracked, such as:
name – tip: naming should not convey critical info to potential attackers
asset tag – unique number assigned during acquisition process
IP address
MAC address
software version
serial number
manufacturer name
manufacturer model or part number
Identifying People, Procedures and Data Assets
Not as readily identifiable as other assets – require that experience and judgment be used. Possible attributes: people – avoid personal names, as they may change, use: ∗ position name ∗ position number/ID ∗ computer/network access privileges procedures ∗ description ∗ intended purpose ∗ software/hardware/networking elements to which it is tied ∗ location of reference-document, … data ∗ owner ∗ creator ∗ manager ∗ location,
Asset Ranking
Assets should be ranked so that most valuable assets
get highest priority when managing risks.
Questions to consider when determining asset value/rank:
1) Which info. asset is most critical for the overall operation
and success of organization?
Example: Amazon’s ranking assets
Amazon’s network consists of regular desktops and web servers.
Web servers that advertise company’s products and receive orders
24/7 - critical.
Desktops used by customer service department – not so critical.
Assets should be ranked so that most valuable assets
get highest priority when managing risks
Threat Identification
Now that assets are known, we should see if there are any known potential threats/dangers for our company that exist out there … Once we identify potential threats, next step will be to see whether they really apply to our assets …
Any organization faces a wide variety of threats.
• To keep risk management ‘manageable’ …
realistic threats must be identified and further investigated,
while unimportant threats should be set aside
Example: government surveys of types of threats/attacks
Threat Modeling/Assessment
practice of building
an abstract model of how an attack may proceed and
cause damage [attacker-, system-, or asset- centric]
Attacker-centric
starts from attackers, evaluates their
motivations and goals, and how they might achieve them
through attack tree
System-centric
starts from model of system, and
attempts to follow model dynamics and logic, looking
for types of attacks against each element of the model.
Asset-centric
starts from assets entrusted to a system,
such as a collection of sensitive personal information, and
attempts to identify how CIA security breaches can happen.
Questions used to prioritize threats:
Which threats present a realistic danger to organization’s
assets in its current environment? ( ‘pre-step’ )
Goal: reduce the risk management’s scope and cost.
Examine each category from CSI/FBI list, or as identified
through threat assessment process, and eliminate any that
do not apply to your organization.
Which threats represent the most severe danger … ?
Goal: provide a rough assessment of each threat’s potential
impact given current level of organization’s preparedness.
‘Danger’ might be a measured of:
1) probability that the threat attacks organization
2) severity, i.e. overall damage that the threat could create
Other questions used to assess/prioritize threats:
How much would it cost to recover from a successful
attack?
Which threats would require greatest expenditure
to prevent?
• Once threats are prioritized, each asset should be reviewed
against each threat to create a specific list of vulnerabilities.
Vulnerability
flaw or weakness in an info. asset, its design, implementation or security procedure that can be exploited accidentally or deliberately by a threat a known threat is a real ‘threat’ to an organization only if there is an actual vulnerability it can exploit sheer existence of a vulnerability does not mean harm WILL be caused – threat agent is required vulnerability that is easy to exploit is often a high-danger vulnerability
TVA Worksheet
at the end of risk identification procedure, organization should derive threats-vulnerabilities-assets (TVA) worksheet this worksheet is a starting point for risk assessment phase TVA worksheet combines prioritized lists of assets and threats prioritized list of assets is placed on x-axis, with most important assets on the left prioritized list of threats is placed on y-axis, with most dangerous threats at the top resulting grid enables a simplified prioritybased vulnerability assessment
Watermarking
Common Applications
verify the owner of a digital object - copyright protection
placing a (unique) watermark = placing a (unique) signature
identify illegal ‘theatrical release’ copies of a movie:
watermark prior to release to prevent movie piracy
copy control in DVD and Blu-ray player
>forensics and piracy deterrence
content filtering
Digital Fingerprinting
process of embedding unique information for each user-
-copy of a digital object in order to be able to identify
entities involved in illegal distribution of the digital object
if object with Alice’s ID is found on Bob’s computer =>
copy is illegal AND likely provided by Alice
Spheres of Information Use
information can accessed directly (people accessing hard-copies) and/or indirectly by means of computer systems (if data in digital form) Introduction multiple layers on ‘technology’ side of access sphere imply that one or more access stages may be required example: to access info stored on a system (database), the user must access / log-into the database-server example: to access info via Internet, the user must ‘go through’ local network (e.g., pass a firewall) and then access the system that hosts the info