29
Information Security Rabie A. Ramadan GUC, Cairo [email protected] Room C7 -310 Lecture 2

Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Information Security

Rabie A. Ramadan

GUC, Cairo

[email protected]

Room C7 -310

Lecture 2

Page 2: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

DAD Triad

Complement of CIA Triad

• Disclosure

• Alteration, and

• Denial

2

Page 3: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

DAD Triad

Disclosure

• Unauthorized individuals gain access to confidential

information

Alteration

• Data is modified through some unauthorized

mechanism

Denial

• Authorized users cannot gain access to a system for

legitimate purposes

DAD activities may be malicious or accidental

Page 4: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Network Security

Security considerations include:

• Physical security

• Operating System security

• Windows, Linux, UNIX

• Communication security

• Encryption

• Firewalls

• Intrusion detection systems

Page 5: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats , vulnerability, Risk , and

Attacks

5

Crossing the water to the right is a Threat

to the man.

• Ex. The existence of a particular virus

for example

Crossing the water through the wall crack

is a Vulnerability.

• Ex. (Computer) Open ports

Page 6: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats , vulnerability, Risk , and

Attacks

Risk

• Occurs when a threat and a

corresponding vulnerability both

exist

Somebody or another system destroyed

the wall is an Attack

• Ex. (Computer) sending an

overwhelming set of messages to

another system to block it.

6

Page 7: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats , vulnerability, Risk ,

and Attacks

Threats

7

Page 8: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats to Security

Hacker

• Anyone who attempts to penetrate the security of an

information system, regardless of intent

• Early definition included anyone very proficient in computer

use

Malicious insider

• Someone from within the organization that attempts to go

beyond the rights and permissions that they legitimately hold

• Security professionals and system administrators are

particularly dangerous

Page 9: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats to Security

Malicious code object

• Virus, a program that attaches itself to a program or file so it can

spread from one computer to another, leaving infections as it travels.

• Worm, a program that takes advantage of file or information transport

features on your system, which allows it to travel unaided. The biggest

danger with a worm is its capability to replicate itself on your system.

e.g. sending itself to all of the e-mail list in your computer.

• Trojan horse, a program that at first glance will appear to be useful

software but will actually do damage once installed or run on your

computer. It usually appears that is coming from a trusted source

A computer program that carries out malicious actions

when run on a system

Page 10: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threat + Vulnerability = Risk

Risk analysis, assessment , and managing are

required

10

Page 11: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Risk Analysis

Actions involved in risk analysis:

• Determine which assets are most valuable

• Identify risks to assets

• Determine the likelihood of each risk occurring

• Take action to manage the risk

Security professionals formalize the risk

analysis process

Page 12: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Asset Valuation

Step 1 in risk analysis process: Asset valuation

• Identify the information assets in the organization

• Hardware, software, and data

• Assign value to those assets using a valuation method

Page 13: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Asset Valuation

Common Valuation Methods

• Replacement cost valuation

• Replacement cost (also called current cost accounting or

CCA) values assets based on what it would cost to replace

them if they were acquired today.

• For example, if Utility Company were placing this same

plant today, the materials would cost $530,000 and the

installation would cost $56,000. The replacement cost value

is $586,000.

Page 14: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Asset Valuation

• Original cost valuation

• Original cost (also called historic cost accounting or

HCA) values assets based on what the company actually

spent for the assets when they were acquired.

• Example: In 1990, Utility Company spent $500,000 to

purchase the materials for its fixed lines and $50,000 to

install them. The original cost value of these assets is

$550,000 before depreciation.

14

Page 15: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Asset Valuation

• Depreciated valuation

• Uses the original cost less an allowance for value

deterioration (original value – how much drop in its

price since purchased)

• Qualitative valuation

• Assigns priorities to assets without using dollar values

15

Page 16: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Risk Assessment

Step 2 in risk analysis process: Risk assessment

Risk assessment techniques:

• Qualitative

• Quantitative

Page 17: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Risk Assessment

Qualitative Risk Assessment:

• Focuses on analyzing intangible properties of an asset

rather than financial value

• Prioritizes risks to aid in the assignment of security

resources

• Relatively easy to conduct

Page 18: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Risk Assessment

Quantitative Risk Assessment

• Assigns dollar values to each risk based on measures such as:

• asset value (AV),

• exposure factor (EF), expected portion (%) that can be destroyed by a

given risk

• annualized rate of occurrence(ARO), number of times you expect the risk

to occur

• single loss expectancy (SLE), amount of damage each time the risk occur

(AV* EF)

• annualized loss expectancy (ALE) amount of damage each year from a

given risk (ARO * SLE)

Uses potential loss amount to decide if it is worth

implementing a security measure

Page 19: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Managing Risks

Risk Avoidance• Used when a risk overwhelms the benefits gained from

having a particular mechanism available

• Avoid any possibility of risk by disabling the mechanism that is vulnerable

• Disabling e-mail is an example of risk avoidance

Risk Mitigation• Used when a threat poses a great risk to a system

• Takes preventative measures to reduce the risk

• A firewall is an example of risk mitigation

Page 20: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Managing Risk

Risk Acceptance• Do nothing to prevent or avoid the risk

• Useful when risk or potential damage is small

Risk Transference• Ensure that someone else is liable if damage occurs

• Buy insurance for example

Combinations of the above techniques are often used

Page 21: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Security Tradeoffs

Security can be seen as a tradeoff between risks and benefits

• Cost of implementing the security mechanism and the amount of damage it may prevent

Tradeoff considerations:

• user convenience

• business goals

• expenses

Page 22: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Threats , vulnerability, Risk , and

Attacks

Attacks

22

Page 23: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Attacks

23

Passive Attacks

• Attempts to learn or make use of information from the system

but does not affect system resources.

• Eavesdropping or monitoring of transmissions

Active Attacks

• Attempts to alter system resources or affect their operation.

Page 24: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Passive Attacks

24

Release of message contents / snooping

Page 25: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Passive Attacks (Cont.)

25

Traffic Analysis/ spoofing

Passive Attacks are hard to be detected

Page 26: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Active Attacks

26

Masquerade

• One entity pretends to be a different entity

Page 27: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Active Attacks (Cont.)

27

Replay Attack

• Passive capture of a data unit and its subsequent retransmission

to produce an unauthorized effect.

Page 28: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Active Attacks (Cont.)

28

Modification Attack

• Some portion of a legitimate message is altered, or that messages

are reordered, to produce an unauthorized effect

Page 29: Deployment of Sensing Devices on Critical Infrastructurerabieramadan.org/courses/infosec/Lecture 2/Lec2.pdf · HCA) values assets based on what the company actually spent for the

Active Attacks (Cont.)

29

Denial of Service

• Prevents or inhibits the normal use or management of

communications facilities