Qualitative Risk Analysis Sanjay Goel University at Albany, SUNY Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information.

Download Report

Transcript Qualitative Risk Analysis Sanjay Goel University at Albany, SUNY Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information.

Qualitative
Risk Analysis
Sanjay Goel
University at Albany, SUNY
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
1
Course Outline
> Unit 1: What is a Security Assessment?
– Definitions and Nomenclature
Unit 2: What kinds of threats exist?
– Malicious Threats (Viruses & Worms) and Unintentional Threats
Unit 3: What kinds of threats exist? (cont’d)
– Malicious Threats (Spoofing, Session Hijacking, Miscellaneous)
Unit 4: How to perform security assessment?
– Risk Analysis: Qualitative Risk Analysis
Unit 5: Remediation of risks?
– Risk Analysis: Quantitative Risk Analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
2
Qualitative Risk Analysis
Outline for this unit
Module 1: Qualitative Risk Analysis
Module 2: Matrix Based Approach
Module 3: Determine Assets and Vulnerabilities
Module 4: Determine Threats and Controls
Module 5: Case Study
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
3
Module 1
Risk Analysis:
Qualitative Risk Analysis
Risk Analysis
Outline
•
What are the difficulties with risk analysis?
•
What are the two different approaches?
•
What is the methodology for qualitative risk
analysis?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
5
Risk Analysis
Risk Analysis Definition
• Risk analysis involves the identification and
assessment of the levels of risks calculated from the
known values of assets and the levels of threats to,
and vulnerabilities of, those assets.
• It involves the interaction of the following elements:
–
–
–
–
–
–
Assets
Vulnerabilities
Threats
Impacts
Likelihoods
Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
6
Risk Analysis
Concept Map
• Threats exploit system vulnerabilities which expose system assets.
• Security controls protect against threats by meeting security
requirements established on the basis of asset values.
Source: Australian Standard Handbook of Information Security Risk Management – HB231-2000
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
7
Risk Analysis
Difficulties with Information Security Risk Analysis
•
•
•
•
•
Relatively new field
Lack of formal models
Lack of data
Evolving threats
Constantly changing information systems and
vulnerabilities
• Human factors related to security
• No standard of practice
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
8
Risk Analysis
Approaches
• Two Risk Analysis Approaches
– Qualitative:
Based on literal description of risk factors and risk is
expressed in terms of its potential. Threats and
vulnerabilities are identified and analyzed using subjective
judgment. Uses checklists to determine if recommended
controls are implemented and if different information
systems or organizations are secure.
– Quantitative:
Relating to, concerning, or based on the amount or number
of something, capable of being measured or expressed in
numerical terms.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
9
Risk Analysis: Qualitative
Methodology
• Qualitative risk analysis methodologies involve relative
comparison of risks and prioritization of controls
• Usually associate relationships between interrelated factors
– Things of value for the organization
– Threats: things that can go wrong
– Vulnerabilities: Weaknesses that make a system more prone to attack or
make an attack more likely to succeed
– Controls: These are the countermeasures for vulnerabilities
• More practical since it is based on user inference and follows
current processes better. It capitalizes on user experience and
doesn’t resort to extensive data gathering.
• Probability data is not required and only estimated potential
loss may be used
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
10
Risk Analysis: Qualitative
Questions 1, 2, and 3
1)
What is the difference between quantitative and qualitative risk
analysis?
2)
Why would one be performed instead of another?
3)
What are the benefits to using a matrix based methodology for
qualitative risk analysis?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
11
Module 2
Determine Assets
and Vulnerabilities
Determine Assets and Vulnerabilities
Outline
•
•
•
•
•
What are tangible assets?
What are non-tangible assets?
How to assign value to assets?
What questions should be asked?
Example
– Lemonade Stand
•
•
How to determine vulnerabilities?
What questions should be asked?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
13
Determine Assets
Tangible
• Assets- Something that the agency values and has to protect. Assets include all
information and supporting items that an agency requires to conduct business.
• Hardware
– Processors, boards, monitors, keyboards, terminals, drives, cables, connections,
controllers, communications media, etc.
• Software
– Source programs, object programs, purchased programs, operating systems, systems
programs, diagnostic programs, etc.
• Information/Data
– Data used during execution, stored data on various media, archival records, audit
data, files with payment details, voice records, image files, product information,
continuity plans.
• Services
– Provided by the company. (e.g. computing and communication services, service
providers and utilities)
• Documentation
– On programs, hardware, systems, administrative procedures and the entire system,
contracts, completed forms.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
14
Determine Assets
Non-Tangible
• People and their knowledge (Employees)
– Integral function/skills which the employee provides (e.g. technical,
operational, marketing, legal, financial, contractors/consultants,
outsourced providers)
• Reputation and Image
– Value attributed to an organization as a result of its general estimation in
the public eye. (e.g. political standing in the case of government
agencies)
• Trust
– Value consistent with public opinion on the integrity and character of an
organization.
• Intellectual Property
– Any product of the human intellect that is unique, novel, and unobvious
(and has some value in the marketplace)
Source: http://www.uta.edu/tto/ip-defs.htm
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
15
Determine Assets
Valuation
• Asset values are used to identify the appropriate protection of
assets and to determine the importance of the assets to the
business.
• Values can be expressed in terms of:
– Potential business impacts affecting loss of confidentiality, integrity and
availability.
• Valuation of some assets different for small and large
organizations
• Intangible assets hard to quantify
• Hidden costs of damages to recovery (often underestimated)
• Borrow from litigation
• Iterative to find ways of valuation
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
16
Determine Assets
Valuation, cont’d.
• In this step, ramifications of computer security failure on
organization are determined.
• Often inaccurate
– Costs of human capital required to recover from failure undervalued
e.g. cost of restoring data
– Indirect consequences of an event unknown until the event actually
happens
– Catastrophic events that cause heavy damage are so infrequent that
correct data unavailable
– Non-tangible assets hard to quantify
• The questions on the next slide prompt us to think about
issues of explicit and hidden cost related to security.
– The answers may not produce precise cost figures, but help identify
sources of various types of costs.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
17
Determine Assets
Guiding Questions to Reflect on Intangible Assets
• What are the legal obligations in preserving confidentiality or
integrity of data?
• What business requirements and agreements cover the situation?
• Could release of a data item cause harm to a person or
organization?
• Could unauthorized access to data cause loss of future business
opportunity?
• What is the psychological effect of lack of computer service?
• What is the value of access to data or programs?
• What is the value of having access to data or programs to
someone else?
• What other problems would arise from loss of data?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
18
Determine Assets
General Example #1: Lemonade Stand
Billy sells lemonade outside of his house every
weekend for 3 hours a day. Every week he makes about
$40. The wooden stand has a cardboard sign which
reads, “Lemonade for SALE, 25 cents each”. Supplies
he receives from his mother are paper cups and a glass
pitcher and spoon to stir with. For one pitcher of
lemonade, he needs 4 lemons, 2 cups of sugar, 1 quart
of water, and a secret ingredient and 10 minutes. The
special recipe is located in a small space within the
lemonade stand. He has a general crowd of about 10
neighbors who buy from him because they enjoy the
taste of his lemonade and his personality.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
19
Determine Assets
General Example #1: Lemonade Stand, cont’d.
Listing of Tangible Assets:
• Establishment
– Lemonade stand: $5
Listing of Intangible Assets:
• People
– Billy
– Billy’s Mother
• Advertising
– Sign: $1
• Supplies
–
–
–
–
–
–
–
Pitcher: $7
Paper cups: $2/25 pack
Spoon: $1.50
Lemons: $3/10 pack
Sugar: $1/1 lb.
Water: $1/gallon
Secret ingredient: $1/1 lb.
• Intellectual Property
– Special recipe
• Trust
• Reputation
• Customer base
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
20
Determine Vulnerabilities
Specific to Organizations
• Predict damage that might occur and source of damage
• Information
– is an asset that has a value to an agency and must therefore be
appropriately protected.
• The objective of information security is to preserve the
agency’s information assets and the business processes they
support in the context of:
– Confidentiality
Information is only available to authorized individuals
– Integrity
Information can only be entered, changed or destroyed by
authorized individuals.
– Availability
Information is provided to authorized users when it is
requested or needed.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
21
Determine Vulnerabilities
Impact to Assets
• Vulnerability- A weak characteristic of an information asset or group of
assets which can be exploited by a threat. Consequence of weaknesses in
controls.
• To organize threats & assets use the following matrix:
– Harder to determine impact to non-tangible assets
Asset
Hardware
Confidentiality
X
Integrity
Availability
Overloaded, destroyed,
Tampered with
Failed, Stolen,
Destroyed, Unavailable
Software
Stolen, copied,
pirated
Impaired by Trojan horse,
Modified, tampered with
Deleted, Misplaced,
Usage expired
Data
Disclosed,
Damaged (software error,
accessed by
hardware error,
outsider, inferred user error)
Deleted, Misplaced,
Destroyed
People
X
X
Terminated, Quit, Retired,
Vacation
Documentation
X
X
Lost, Stolen, Destroyed
Supplies
X
X
Lost, Stolen, Damaged
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
22
Determine Vulnerabilities
Guiding Questions
• Each vulnerability may affect more than one asset or cause
more than one type of loss
• While completing the matrix, answer the following questions:
– What are the effects of unintentional errors?
e.g. accidental deletion, use of incorrect data
– What are the effects of willful malicious insiders?
e.g. disgruntled employees, bribery, espionage
– What are the effects of outsiders?
e.g. hackers, dial-in access, people sifting through trash
– What are the effects of natural and physical disasters?
e.g. fire, storms, floods, power outage, component failures
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
23
Determine Assets and Vulnerabilities
Assignment
•
Using your own organization, determine the assets and
vulnerabilities and fill them into the appropriate matrices.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
24
Module 3
Determine Threats and Controls
Determine Threats and Controls
Outline
•
•
How do you identify threats?
What types of controls are there?
–
–
–
–
•
Organizational and Management
Physical and Environmental
Operational
Technical
What are the functions of controls?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
26
Determine Threats and Controls
Identification of Threats
• Threat- Potential cause of an unwanted event that may result in harm to the
agency and its assets. A threat is a manifestation of vulnerability.
• Malicious
– Malicious Software (Viruses, worms, trojan horses, time bomb logic bomb, rabbit,
bacterium)
– Spoofing or Masquerading
– Sequential or Dictionary Scanning
– Snooping (electronic monitoring or “shoulder surfing”)
– Scavenging (“dumpster diving” or automated scanning of data)
– Spamming
– Tunneling
• Unintentional
– Equipment or Software Malfunction
– Human error (back door or user error)
• Physical
– Power loss, vandalism, fire/flood/lightning damage, destruction
Source: http://www.caci.com/business/ia/threats.html
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
27
Determine Threats and Controls
Functions of Controls
• Security Controls- Implementations to reduce overall risk
and vulnerability
• Deter
– Avoid or prevent the occurrence of an undesirable event
• Protect
– Safeguard the information assets from adverse events
• Detect
– Identify the occurrence of an undesirable event
• Respond
– React to or counter an adverse effect
• Recover
– Restore integrity, availability and confidentiality of information
assets
Source: Information Security Guidelines for NSW Government
Agencies Part 3 Information Security Baseline Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
28
Determine Threats and Controls
Controls
• Organizational & Management Controls
– Information security policy, information security infrastructure,
third party access, outsourcing, mobile computing, telecommuting,
asset classification and control, personnel practices, job descriptions,
segregation of duties, recruitment, terms and conditions of
employment, employee monitoring, job terminations and changes,
security awareness and training, compliance with legal and
regulatory requirements, compliancy with security policies and
standards, incident handling, disciplinary process, business
continuity management, system audits
• Physical & Environmental Controls
– Secure areas, equipment security, clear desk and screen policy,
removal of property
Source: Information Security Guidelines for NSW Government
Agencies Part 3 Information Security Baseline Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
29
Determine Threats and Controls
Operational Controls
• Operational Controls
– Documentation, configuration and change management, incident
management, software development and test environment,
outsourced facilities, systems planning, systems and acceptance
testing, protection against malicious code, data backup, logging,
software and information exchange, security of media in transit,
electronic commerce security, electronic data interchange, internet
commerce, email security, electronic services, electronic publishing,
media
Source: Information Security Guidelines for NSW Government
Agencies Part 3 Information Security Baseline Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
30
Determine Threats and Controls
Technical Controls
• Technical Controls
– Identification and authentication, passwords, tokens, biometric
devices, logical access control, review of access rights, unattended
user hardware, network management, operational procedures,
predefined user access paths, dial-in access controls, network
planning, network configuration, segregation of networks, firewalls,
monitoring of network, intrusion detection, internet connection
policies, operating system access control, identification of terminals
and workstations, secure logon practices, system utilities, duress
alarm, time restriction, application access control and restriction,
isolation of sensitive applications, audit trails and logs
Source: Information Security Guidelines for NSW Government
Agencies Part 3 Information Security Baseline Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
31
Determine Assets and Vulnerabilities
Assignment
•
Using your own organization, determine the vulnerabilities and
threats and fill them into the appropriate matrices.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
32
Module 4
Matrix Based Approach
Matrix Based Approach
Outline
•
What are the steps involved?
•
How do you fill in the matrices?
– Asset/Vulnerability Matrix
– Vulnerability/Threat Matrix
– Threat/Control Matrix
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
34
Matrix Based Approach
Methodology
• Consists of three matrices
– Vulnerability Matrix: Links assets to vulnerabilities
– Threat Matrix: Links vulnerabilities to threats
– Control Matrix: Links threats to the controls
• Step 1
– Identify the assets & compute the relative importance of assets
• Step 2
–
–
–
–
–
List assets in the columns of the matrix.
List vulnerabilities in the rows within the matrix.
The value row should contain asset values.
Rank the assets based on the impact to the organization.
Compute the aggregate value of relative importance of different
vulnerabilities
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
35
Matrix Based Approach
Methodology
• Step 3
– Add aggregate values of vulnerabilities from vulnerability matrix to the
column side of the threat matrix
– Identify the threats and add them to the row side of the threat matrix
– Determine the relative influence of threats on the vulnerabilities
– Compute aggregate values of importance of different threats
• Step 4
– Add aggregate values of threats from the threat matrix to the column
side of control matrix
– Identify the controls and add them to the row side of the control
matrix
– Compute aggregate values of importance of different controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
36
Matrix Based Approach
Determining L/M/H
• There needs to be a threshold for determining the correlations
within the matrices. For each matrix, the thresholds can be
different. This can be done in two ways:
• Qualitatively
– determined relative to other correlations
– e.g. asset1/vulnerability1 (L) is much lower than asset3/vulnerability3
(H) correlation. asset2/vulnerability2 correlation is in-between (M)
• Quantitatively
– determined by setting limits
– e.g. if no correlation (0), if lower than 10% correlation (L), if lower
than 35% medium (M), if greater than 35% (H)
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
37
Matrix Based Approach
Extension of L/M/H
• Although the example provided gives 4 different levels (Not
Relevant, Low, Medium, and High), organizations may choose
to have more levels for finer grained evaluation.
• For example:
– Not Relevant (0)
– Very Low (1)
– Low (2)
– Medium-Low (3)
– Medium (4)
– Medium-High (5)
– High (6)
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
38
Matrix Based Approach
Assets and Vulnerabilities
Value
Relative Impact
Services
Software
Hardware
Info/ Integrity
Cleanup Costs
Lost Sales/Revenue
Reputation (Trust)
Client Secrets
Trade Secrets (IP)
Critical Infrastructure
Vulnerabilities
Assets & Costs
Scale
Not Relevant - 0
Low – 1
Medium – 3
High – 9
Web Servers
Compute Servers
Firewalls
Routers
Client Nodes
Databases
• Customize matrix to assets & vulnerabilities applicable to case
– Compute cost of each asset and put them in the value row
– Determine correlation with vulnerability and asset (L/M/H)
– Compute the sum of product of vulnerability & asset values; add to impact column
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
39
Matrix Based Approach
Vulnerabilities and Threats
…
…
…
…
Relative Threat
Importance
Value
Databases
Client Nodes
Routers
Firewalls
Compute Servers
Web Servers
Threats
Vulnerabilities
Scale
Not Relevant - 0
Low– 1
Medium – 3
High – 9
Denial of Service
Spoofing and Masquerading
Malicious Code
Human Errors
Insider Attacks
Intrusion …
• Complete matrix based on the specific case
– Add values from the Impact column of the previous matrix
– Determine association between threat and vulnerability
– Compute aggregate exposure values by multiplying impact and the associations
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
40
Matrix Based Approach
Threats and Controls
Value of Control
…
…
Physical Damage
Spam
Intrusion
Insider Attacks
Human Errors
Malicious Code
Spoofing
Denial of Service
Threats
Scale
Not Relevant - 0
Low – 1
Medium – 3
High – 9
Value
Controls
Firewalls
IDS
Single Sign-On
DMZ
Training
Security Policy
Network Configuration
Hardening of Environment
• Customize matrix based on the specific case
– Add values from the relative exposure column of the previous matrix
– Determine impact of different controls on different threats
– Compute the aggregate value of benefit of each control
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
41
Matrix-Based Approach
Review
• This methodology used for qualitative analysis is a
matrix-based approach.
• The Matrix-based approach:
–
–
–
–
–
–
–
Brings transparency to risk analysis process
Provides a comprehensive methodology
Easy to use
Allows organizations to work with partial data
More data can be added as made available
Risk posture can be compared to other organization's
Determines controls needed to improve security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
42
Matrix Based Approach
Assignment
•
Go through the next modules in the unit to appropriately fill in
the matrices presented in this module.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
43
Module 5
Case Study
Case Study
Outline
•
•
What is the case about?
What would fit into the categories of:
–
–
–
–
•
Assets
Vulnerabilities
Threats
Controls
Filling in the matrices
– Asset/Vulnerability
– Vulnerability/Threat
– Threat/Control
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
45
Case Study
Example
• Use the information that you have learned in the lecture in
the following case study of a government organization.
• Remember these key steps for determining ALE
– Identify and determine the value of assets
– Determine vulnerabilities
– Estimate likelihood of exploitation
– Compute ALE
– Survey applicable controls and their costs
– Perform a cost-benefit analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
46
Case Study
Case
An organization delivers service throughout New York State. As part of the planning process to prepare the annual
budget, the Commissioner has asked the Information Technology Director to perform a risk analysis to determine
the organization’s vulnerability to threats against its information assets, and to determine the appropriate level of
expenditures to protect against these vulnerabilities.
The organization consists of 4,000 employees working in 200 locations, which are organized into 10 regions. The
average rate of pay for the employees is $20/hr. Cost benefit analysis has been done on the IT resource
deployment, and the current structure is the most beneficial to the organization, so all security recommendations
should be based on the current asset deployment.
Each of the 200 locations has approximately 20 employees using an equal number of desktop and laptop
computers for their fieldwork. These computers are used to collect information related to the people served by the
organization, including personally identifying information. Half of each employee’s time is spent collecting
information from the clients using shared laptop computers, and half is spent processing the client information at
the field office using desktop computers. Replacement cost for the laptops is $2,500 and for the desktop is $1,500.
Each of the 10 regions has a network server, which stores all of the work activities of the employees in that region.
Each server will cost $30,000 to replace, plus 80 hours of staff time. Each incident involving a server costs the
organization approximately $1,600 in IT staff resources for recovery. Each incident where financial records or
personal information is compromised costs the organization $15,000 in lawyers time and settlement payouts.
Assume that the total assets of the organization are worth 10 million dollars.
The organization has begun charging fees for the public records it collects. This information is sold from the
organization website at headquarters, via credit card transactions. All of the regional computers are linked to the
headquarters via an internal network, and the headquarters has one connection to the Internet. The headquarters
servers query the regional servers to fulfill the transactions. The fees collected are approximately $10,000 per day
distributed equally from each region, and the transactions are uniformly spread out over a 24-hour period.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
47
Case Study
Example- Assets (Tangible)
• Transaction Revenue- amount of profit from transactions
• Data- client information
• Laptops- shared, used for collecting information
• Desktops- shared, used for processing client information
• Regional Servers- stores all work activities of employees in
region
• HQ Server- query regional servers to fulfill transactions
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
48
Case Study
Example- Asset Valuations (Cost per Day)
Transaction Revenue
$10,000 per day
Data (Liability)
$10 million (total assets of organization)
Laptops
½ x 200 (locations) x 20 (employees) x
$2,500 (laptop cost) = $5,000,000
Desktops
½ x 200 (locations) x 20 (employees) x
$1,500 (desktop cost) = $3,000,000
Regional Servers
$30,000 (server cost)x 10 (regions) +
80 (hours) x $20 (pay rate) x 10 (regions)+
$10,000 (transaction revenue) = $326,000
HQ Server
$10,000 (transaction revenue) +
$100,000 (cost of HQ server) +
80 (hours) x $20 (pay rate) x 10 (regions) = $126,000
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
49
Case Study
Example- Vulnerabilities
• Vulnerabilities are weaknesses that can be exploited
• Vulnerabilities
– Laptop Computers
– Desktop Computers
– Regional Servers
– HQ server
– Network Infrastructure
– Software
• Computers and Servers are vulnerable to network attacks
such as viruses/worms, intrusion & hardware failures
• Laptops are especially vulnerable to theft
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
50
Case Study
Example- Threats
• Threats are malicious & benign events that can exploit
vulnerabilities
• Several Threats exist
–
–
–
–
–
–
–
Hardware Failure
Software Failure
Theft
Denial of Service
Viruses/Worms
Insider Attacks
Intrusion and Theft of Information
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
51
Case Study
Example- Controls
•Intrusion detection and firewall upgrades on HQ Server
– mitigate HQ server failure and recovery
•Anti-Virus Software
– mitigates threat of worms, viruses, DOS attacks, and some intrusions
• Firewall upgrades
– mitigates threats of DOS attacks and some intrusions, worms and viruses
• Redundant HQ Server
– reduces loss of transaction revenue
•Spare laptop computers at each location
– reduces loss of transaction revenue and productivity
• Warranties
– reduces loss of transaction revenue and cost of procuring replacements
• Insurance
– offset cost of liability
• Physical Controls
– reduce probability of theft
• Security Policy
– can be used to reduce most threats.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
52
Case Study
Asset/Vulnerability Matrix
• The coefficients of this matrix are usually based on internal data as well
as financial loss organizations
• For the current example we will assume data for illustration of the
concept
– Transactions are mostly associated with the regional servers which store the
data, the HQ server which takes all requests, and the network infrastructure
with which clients access the data. (.30 each)
– Laptops, desktops and software is only associated with the remaining 10%
(.033 each)
– Data that is located on laptops and desktops make up only 10% of total data
because they are only used for collecting and processing.
– The regional servers contain all other data.
– Other assets are associated at 100% with their respective vulnerabilities. (e.g.
laptops with laptops, desktops with desktops, etc.)
• The threshold for this matrix will be:
–
–
–
–
Not Relevant: 0
Low: 0 < x <= 0.01
Medium: 0.01 < x <= 0.05
High: 0.05 < x < 1
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
53
Case Study
Asset/Vulnerability Matrix, cont’d.
Assets
Transaction
Revenue
Data
(Liability)
Laptops
Desktops
Regional
Servers
HQ Server
Aggregates
(Impact)
10,000
10,000,000
5,000,000
3,000,000
326,000
126,000
S (asset value x
vulnerability)
Laptops
1
1
3
0
0
0
25,010,000
Desktops
1
1
0
3
0
0
19,010,000
Regional Servers
2
3
0
0
3
0
30,998,000
HQ Servers
2
0
0
0
0
3
398,000
Network Infrast.
2
0
0
0
0
0
20,000
Software
1
0
0
0
0
0
10,000
Vulnerabilities
Input Asset Values

• Customize
matrix to assets & vulnerabilities applicable to case
– Compute cost of each asset and put them in the value row
0 – Not Relevant
1 – Low
2 – Medium
3 – High
– Determine correlation with vulnerability and asset (0 for Not Relevant, 1 for Low, 2 for Medium and 3 for High)
– Compute the sum of product of vulnerability & asset values; add to impact column
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
54
Case Study
Vulnerability/Threat Matrix
• The coefficients of this matrix are usually based on data
from the literature, e.g.,
–
–
–
–
if rate of failure of hardware is rf (per unit time)
the number of pieces of hardware is n then
the total number of failed components during a time period is rf*n
the fraction of hardware that fails is rf*n/n= rf
• For the current example we will assume data for illustration
of the concept
– Failure rate of laptops is .001 per day (i.e., one in a thousand laptops
encounters hardware failure during a day)
– Similarly failure rate of a desktop is .0002 (i.e. 2 in ten thousand
desktops would encounter hardware failure in a given day.
– Hardware failure can cause loss of software, however, our
assumption is that all software is replaceable from backups
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
55
Case Study
Vulnerability/Threat Matrix, cont’d.
Vulnerabilities
Laptops
Desktops
Regional
Servers
HQ
Servers
Network
Infrast.
Software
Aggregates
(Threat
Importance)
25,010,000
19,010,000
30,998,000
398,000
20,000
10,000
S (impact value x
threat value)
Hardware Failure
2
1
1
1
3
0
100,486,000
Software Failure
2
2
2
2
0
0
150,832,000
Equipment Theft
3
2
1
1
1
2
144,486,000
Denial of Service
1
1
2
2
0
0
106,812,000
Viruses/Worms
2
2
2
2
0
2
150,852,000
Insider Attacks
2
2
1
1
1
2
119,476,000
Intrusion
2
2
2
2
0
2
150,852,000
Threats
Input Impact
Aggregates
• Complete matrix based on the specific case
0 – Not Relevant
1 – Low
2 – Medium
3 – High
– Add values from the Impact column of the previous matrix
– Determine association between threat and vulnerability
– Compute aggregate exposure values by multiplying impact and the associations and
adding across vulnerabilities
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
56
Case Study
Vulnerability/Threat Matrix, cont’d.
– We assume that the hardware failure will disrupt the network once every one hundred days
– There is 0.3 percent chance that software failure can lead to failure of desktops
– We assume that there is a .01 chance of a laptop being stolen, .001 for a desktop, and .0002
for servers.
– There is a very low chance that network equipment is stolen since it is kept in secure rooms
(.0001)
– When equipment is stolen some software may have been stolen as well
– We assume that denial-of-service is primarily targeted at servers and not individual machines
– We assume that the denial-of-service can disable machines as well as cause destruction of
software
– Insider attacks are primarily meant to exploit data & disable machines
– We assume that the servers have less access thus are less vulnerable to insider attacks
•
The threshold for this matrix will be:
–
–
–
–
Not Relevant: 0
Low: 0 < x <= 0.001
Medium: 0.001 < x <= 0.01
High: 0.01 < x < 1
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
57
Case Study
Threat/Control Matrix
• Some of these controls have threats associated with them. However,
these are secondary considerations and we will be focusing on primary
threats.
• We assume that IDS systems will control 30% of the DOS attacks, 30%
of Viruses and Worms and 90% of intrusions
– In addition, IDS systems do not impact insider attacks
• Anti-Virus Software will prevent 90% of Viruses and Worms.
• That upgrades to a firewall will greatly control (90% each) of DOS
attacks, as well as Viruses and Worms. It will control 30% of intrusions,
but not insider attacks.
• A redundant HQ server will control 10% of hardware failure (when the
original HQ server fails). This is the same percentage for theft and
insider attacks.
• Also, a redundant HQ server will help with 80% in cases of DOS attacks
on the HQ server.
• Spare laptops will assist in cases of hardware failure and theft (30%
because of volume).
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
58
Case Study
Threat/Control Matrix, cont’d.
•
We assume that warranties will help with 70% of both hardware failure and
software failure. While it will assist with the cost of new hardware or software,
will not reduce employee time.
•
It is determined that insurance will be able to control 90% of impacts from the
threats of theft, DOS attacks, Virus/Worm attacks, Insider Attacks, and
Intrusion.
•
Physical controls (locks, key cards, biometrics, etc.) will control 90% of theft.
•
Also, it is assumed that a security policy will assist with 20% of all threats since
every policy can have procedures which can assist in prevention.
Customize matrix based on the specific case
•
– Add values from the threat importance column of the previous matrix
– Determine impact of different controls on different threats
– Compute the sum of the products of the threat importance by the impact of controls
to determine values.
•
The threshold for this matrix will be:
–
–
–
–
Not Relevant: 0
Low: 0 < x <= 0.01
Medium: 0.01 < x <= 0.05
High: 0.05 < x < 1
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
59
Case Study
Threat/Control Matrix, cont’d.
Threats
Hardware
Failure
Software
Failure
Theft
Denial of
Service
Viruses/
Worms
Insider
Attacks
Intrusion
Aggregates
(Value of
Control)
Input Threat
Importance
Values
100,486,000
150,832,000
144,486,000
106,812,000
150,852,000
119,476,000
150,852,000
S (threat importance
x impact of controls)
Intrusion
Detection
0
0
0
0
0
0
0
$967,884,000.00
Anti-Virus
0
0
0
0
0
0
0
$452,556,000.00
Firewall
Upgrades
0
0
0
0
0
0
0
$1,074,696,000.00
Redundant HQ
Server
2
2
2
2
2
2
2
$684,884,000.00
Spare Laptops
2
2
2
2
2
2
2
$489,944,000.00
Warranties
0
0
0
0
0
0
0
$753,954,000.00
Insurance
3
3
3
3
3
3
3
$2,017,434,000.00
Physical
Controls
0
0
0
0
0
0
0
$433,458,000.00
Security Policy
0
0
0
0
0
0
0
$923,796,000.00
Controls
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
0 – Not Relevant
1 – Low
2 – Medium
3 – High
60
Case Study
Assignment
•
Given the matrices and the example case provided, use this
same methodology in application to determine the information
security risk in your own organization.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
61
Appendix
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
62
Qualitative Risk Analysis
Summary
• Qualitative risk analysis involves using relative values of assets, threats,
vulnerabilities to:
– Determine the relative exposure of different assets of the organization
– Determine the relative effectiveness of different controls
• The methodology developed here uses a series of matrices to collect the
data on assets, vulnerabilities, threats and controls
• Data from the matrices is integrated to determine the relative
importance of controls
• This approach is suitable when precise data for different elements is
unavailable
• Most organizations start with a qualitative analysis and gradually migrate
to a quantitative analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
63
Qualitative Risk Analysis
Summary Cont’d.
•Risk Aggregation:
J
K L
I
i 1
i 1
R*     (t j    ij )   jk   kl  al   Ci
j 1k 1l 1
•Optimization
– simple formulation
•Cost Benefit Analysis
I
 ij  (1  qi ij )
k Q
k Q
k 1
j 1
Minimize : R    j such that   j  
*
LEVERAGE = (RISK EXPOSUREbefore reduction – RISK EXPOSUREafter reduction)
________________________________________________
COST OF REDUCTION
•Regression Testing
–Used for comparing risk impact
•Monte Carlo Simulation
– 1)Develop risk model, 2) Define the shape and parameters, 3)Run
simulation, 4)Build histogram, 5)Compute summary statistics,
6)Perform sensitivity analysis, 7)Analyze potential dependency
relationship
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
64
Acknowledgements
Grants & Personnel
• Support for this work has been provided through the
following grants
– NSF 0210379
– FIPSE P116B020477
• Damira Pon, from the Center of Information Forensics and
Assurance contributed extensively by reviewing and editing
the material
• Robert Bangert-Drowns from the School of Education
provided extensive review of the material from a pedagogical
view.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
65