1. Trang chủ
  2. » Công Nghệ Thông Tin

Computer security principles and practice 3rd by williams stallings and brown ch14

36 171 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 36
Dung lượng 5,52 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

g organizatio nal IT security requiremen ts Identifying and analyzing security threats to IT assets within the organization Identifying and analyzing security threats to IT assets withi

Trang 2

Chapter 14

IT Security Management and Risk Assessment

Trang 3

• Provides the information necessary to decide what

management, operational, and technical controls are

needed to reduce the risks identified

How are those

assets threatened

What can be done to counter those threats

What can be done to counter those threats

Formal process of answering the

questions:

Trang 4

Table 14.1

ISO/IEC 27000 Series of Standards on IT Security

Techniques

Trang 5

g organizatio nal IT security requiremen ts

Identifying and analyzing security threats to IT assets within

the organization

Identifying and analyzing security threats to IT assets within

the organization

Identifyin

g and analyzing risks

Identifyin

g and analyzing risks

Specifying appropriate safeguards

Specifying appropriate safeguards

Monitoring the implementati

on and operation of safeguards that are necessary in order to cost effectively protect the information and services within the organization

Monitoring the implementati

on and operation of safeguards that are necessary in order to cost effectively protect the information and services within the organization

Developing and implementi

ng a security awareness program

Developing and implementi

ng a security awareness program

Detecting and reacting

to incidents

Detecting and reacting

to incidents

Trang 6

IT Security Policy OrganizationalAspects

Risk Analysis Options

Security Compliance Maintenance

Change Management

Incident Handling

Baseline Informal Formal Combined

Security Risk Analysis

Trang 7

Managed Security

Figure 14.2 The Plan - Do - Check - Act Process Model

Trang 8

Organizational Context and

Security Policy

• Maintained and updated

regularly

Trang 9

• Risk management approach

• Security awareness and training

• General personnel issues and any legal sanctions

• Integration of security into systems development

• Information classification scheme

• Contingency and business continuity planning

• Incident detection and handling processes

• How and when policy reviewed, and change control to it

Trang 10

Management Support

• IT security policy must be supported by senior management

• Need IT security officer

o To provide consistent overall supervision

o Liaison with senior management

o Maintenance of IT security objectives, strategies, policies

o Handle incidents

o Management of IT security awareness and training programs

o Interaction with IT project security officers

• Large organizations need separate IT project

security officers associated with major projects and systems

o Manage security policies within their area

Trang 11

Security Risk Assessment

Critical component of

process

Critical component of

process

Not feasible in practice

Ideally examine every

Trang 12

Baseline Approach

• Goal is to implement agreed controls to provide protection against the most common threats

• Forms a good base for further security measures

• Use “industry best practice”

o Easy, cheap, can be replicated

o Gives no special consideration to variations in risk exposure

o May give too much or too little security

• Generally recommended only for small

organizations without the resources to implement more structured approaches

Trang 13

Exploits knowledge and expertise of

risks that baseline

approach would not

address

Judgments can be

made about

vulnerabilities and

risks that baseline

approach would not

time

Skewed by analyst’s views, varies over

time

Suitable for small to medium sized organizations where

IT systems are not necessarily essential

Suitable for small to medium sized organizations where

IT systems are not necessarily essential

Trang 14

Detailed Risk Analysis

•Identify likelihood of risk

occurring and consequences

Assess using formal

structured process

• Number of stages

•Identify threats and

vulnerabilities to assets

•Identify likelihood of risk

occurring and consequences

Significant cost

in time, resources, expertise

Significant cost

in time, resources, expertise

May be a legal requirement to

use

May be a legal requirement to

use

Suitable for large organizations with IT systems critical to their business objectives

Suitable for large organizations with IT systems critical to their business objectives

Trang 15

IT resources and where major risks are likely to occur

Ensures that a basic level of security

protection is implemented early

For most organizations this approach is the most cost effective

Use is highly recommended

Trang 16

Detailed Security Risk

Analysis

Provides the most accurate evaluation of

an organization's IT system’s security risks

Provides the most accurate evaluation of

an organization's IT system’s security risks

Trang 17

Figure 14.3 Risk Assessment Process

Step 2: Conduct Risk Analysis

Identify Threat Sources and Events

Identify Vulnerabilities and Predisposing Conditions Determine Likelihood of Occurance Determine Magnitude of Impact

Trang 18

Establishing the Context

• Initial step

o Determine the basic parameters of the risk assessment

o Identify the assets to be examined

• Explores political and social environment in which the organization operates

o Legal and regulatory constraints

o Provide baseline for organization’s risk exposure

• Risk appetite

o The level of risk the organization views as acceptable

Trang 19

Figure 14.4 Generic Organizational Risk Context

Banking & Finance

Government Transportation

Health Care Utilities

M a n u f a c t u r i n g Communications

Retail Media

E d u c a t i o n Agriculture

Construction

Less Vulnerable More Vulnerable

Trang 20

Asset Identification

• Last component is to identify assets to examine

• Draw on expertise of people in relevant areas of organization to identify key assets

o Identify and interview such personnel

Asset

• “anything which needs to be protected”

has value to organization to meet its

objectives tangible or intangible whose

compromise or loss would seriously impact

the operation of the organization

Trang 21

Terminology

Trang 22

Threat Identification

• A threat is:

Anything that might hinder or prevent an asset from providing appropriate levels of the key security

Confidentiality

Trang 24

Vulnerability Identification

• Identify exploitable flaws or weaknesses in

organization’s IT systems or processes

• Need combination of threat and vulnerability to create a risk to an asset

• Outcome should be a list of threats and

vulnerabilities with brief descriptions of how and why they might occur

Trang 25

Analyze Risks

• Specify likelihood of occurrence of each identified threat to asset given existing controls

• Specify consequence should threat occur

• Derive overall risk rating for each threat

o Risk = probability threat occurs x cost to

Trang 26

• Technical processes and procedures

• Use checklists of existing controls and interview key organizational staff to solicit information

Trang 27

Table 14.2

Risk Likelihood

Trang 29

Table 14.4 Risk Level Determination and Meaning

Trang 30

Table 14.5 Risk Register

Trang 31

so accept

J udgement Needed

Figure 14.5 J udgment About Risk Treatment

Trang 32

Risk Treatment

Alternatives

Risk acceptance level greater than normal Choosing to accept a risk

for business reasons

Risk avoidance the activity or system Not proceeding with

that creates this risk

Risk transfer for the risk with a third Sharing responsibility

Trang 33

Case Study: Silver Star

Mines

• Fictional operation of global mining

company

• Large IT infrastructure

o Both common and specific software

o Some directly relates to health and safety

o Formerly isolated systems now networked

• Decided on combined approach

• Mining industry less risky end of spectrum

• Subject to legal/regulatory requirements

• Management accepts moderate or low risk

Trang 34

Reliability and integrity of SCADA

nodes and net

Reliability and integrity of SCADA

nodes and net

Integrity of stored file and database

maintenance/production system

Availability, integrity and

confidentiality of mail servicesAvailability, integrity and

confidentiality of mail services

Trang 35

Table 14.6 Silver Star Mines Risk Register

Trang 36

• Detailed security risk analysis

o Context and system characterization

o Identification of threats/risks/vulnerabili ties

Ngày đăng: 18/12/2017, 15:16