Title: Assessing and Managing Security Risk in IT Systems
1Assessing and Managing Security Risk in IT Systems
John McCumber AUD-10 November 16, 2005
2Assessing and Managing Security Risk in IT Systems
John McCumber
3IT Risk Assessment
Find out the cause of this effect, Or rather say,
the cause of this defect, For this effect
defective comes by cause. - William
Shakespeare, Hamlet
4Why is Risk Management Necessary?
"When you can measure what you are speaking
about, and express it in numbers, you know
something about it But when you cannot measure
it, when you cannot express it in numbers, your
knowledge is of a meager and unsatisfactory kind
It may be the beginning of knowledge, but you
have scarcely in your thoughts advanced to the
stage of science."
William Thomson Lord Kelvin 1824 - 1907
5IT Risk Management
- The process of designing, developing, sustaining,
and modifying operational processes and systems
in consideration of applicable risks to asset
confidentiality, integrity, and availability. - Applicable risks are those reasonably expected
to be realized and to cause an unacceptable
impact.
6IT Risk Management
- Incorporates an analytical, systems approach into
the entire operational and support cycle. - Provides systems and operational leaders a
reliable decision support process. - Encourages protection of only that which requires
protection. - Manages cost while achieving significant
performance benefits.
7Key Information Security Challenges
- Blurring lines securing IT assets vs.
managing them who ultimately has the
responsibility? - Too much information deluge of security news
(i.e. viruses, new patches) must be custom
formatted for my environment takes time! - Shortage of trained and experienced personnel
- Need to wrap protection around evolving
architectures and business models (i.e. wireless
LANs, remote access) - Investment in new security tools necessitates a
new console to manage, alerts to correlate - Undesired ranks are expanding blended threats,
P2P, spam, spyware, insider threats together
require more than traditional server and desktop
solutions
8World-Wide Attack Trends
Blended Threats (CodeRed, Nimda, Slammer)
Denial of Service (Yahoo!, eBay)
Infection Attempts
Malicious Code Infection Attempts
Network Intrusion Attempts
Mass Mailer Viruses (Love Letter/Melissa)
Zombies
Network Intrusion Attempts
Polymorphic Viruses (Tequila)
0
0
Analysis by Symantec Security Response using
data from Symantec, IDC ICSA 2003 estimated
Source CERT
9Vulnerability TrendsVolume 2001 - 2005
- Between July 1 - December 31, 2005, the total
number of vulnerabilities grew by 1 over the
previous reporting period and 34 over the same
period last year. The total number of
vulnerabilities reported this period is the
highest ever recorded.
10Vulnerability Management
- Vulnerabilities are specific technical weaknesses
which can be exploited to impact an asset - System and network hardware
- System and network operating systems
- System and network applications
- Network protocol
- Connectivity
- Current safeguards
- Physical environment
- Necessary to identify and rank vulnerabilities
11Empirical Objective
Cost
Performance
Risk
Applying Safeguards
12Uses and Types of Models
13McCumber Cube Model
14Information States versus Technology
- Transmission
- -Data in motion
- Storage
- Data at rest
- Processing
- Determinant characteristic
- Pre-computer only available via human interaction
- No other states
- Common misconceptions
15PC Information States
Transmission
Processing
Storage
16Component State Mapping
17Modeling Information Systems
18Information State Mapping Example
19Security Attributes
- Confidentiality
- Preserving authorized restrictions on information
access and disclosure, including means for
protecting personal privacy and proprietary
information. - Integrity
- Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity. - Availability
- Ensuring timely and reliable access to and use of
information.
20Safeguards and Countermeasures
- Technology
- Policy and Procedures
- Human Factors
21Hierarchical Dependency of Safeguards
22Hierarchical Dependency Example
23Vulnerability-Safeguard Pairing
24Expanded Vulnerability-Safeguard Pairing
25Layered Security Analysis
Security functionality
Security assessment
Internet
Policy enforcement
26Layered Security Analysis
Britain
Japan
United States
Security assessment
Policy enforcement
Security functionality
27Essential Elements of Risk
- Threats
- Assets
- Vulnerabilities
- Safeguards
- Products
- Procedures
- People
28The Risk Equations
29Measuring Security Risk
Residual Risk after Countermeasures Applied
Baseline Risk
30Risk Assessment Process
Threat Assessment
Asset Valuation
Risk Determination
Safeguard Assessment
Decision Support Analysis
Vulnerability Assessment
31McCumber Cube Model
32Conclusion
- If you can measure, you can
- justify
- target
- control
- predict
- If you can measure, you can manage, and move
information assurance from art to science.
33Thank You!
John McCumberAssessing and Managing
SecurityRisk in IT Systems a Structured
MethodologyAuerbach, New York, NY 2004