32
Security Administration

Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Embed Size (px)

Citation preview

Page 1: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Security Administration

Page 2: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Links to Text

Chapter 8Parts of Chapter 5Parts of Chapter 1

Page 3: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Security Involves:

Technical controlsAdministrative controlsPhysical controls

Page 4: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Major Chapter Topics PlanningRisk analysisPolicyPhysical security

Page 5: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Security PlanWritten document that

describes how an organization will address its security needs

Page 6: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

What Should a Security Plan Do?

Identify what (vulnerabilities, threats, and risks)

Specify how they will be handled (controls)

Specify who will handle themSpecify when they will be handled

(timetable)

Page 7: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Issues Listed in TextPolicyCurrent stateRequirementsRecommended controlsAccountabilityTimetableContinuing attention (updates)

Page 8: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

OCTAVEOperationally Critical Threat, Asset,

and Vulnerability EvaluationDeveloped at Carnegie Mellon

CERT Coordination CenterFirst published in 1999

Page 9: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

The OCTAVE Approach Self-directed Focused on risks to information assets Focused on practice-based mitigation

Best practices from CERT/CC, NIST, laws and regulations (e.g., HIPPA), etc.

Participation by both business and IT personnel

Page 10: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Different Scales

OCTAVE – large organizationsOCTAVE-S – small organizations

Page 11: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

OCTAVE Steps 1. Identify enterprise knowledge 2. Identify operational area knowledge 3. Identify staff knowledge 4. Create threat profiles 5. Identify key components 6. Evaluate selected components 7. Conduct a risk analysis 8. Develop a protection strategy

Page 12: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Common Criteria (CC)

Framework for evaluation of IT systems International effort

United States United Kingdom France Germany The Netherlands Canada

Page 13: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Business Continuity Plan

Plan for management of situations which areCatastrophicLong-lasting

A single such incident can put a company out of business (even if handled well)

Identify essential assets and functions

Page 14: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Incident Response Plan

Plan for management of security incidentsMay not be catastrophicMay not be long-lasting

Many incidents will have minor impact on operations

Page 15: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Risk Analysis

Risks closely related to threatsRisk analysis attempts to quantify

and measure problems associated with threats

Many approaches to risk analysis have been developed

Page 16: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Quantifying Risk

Risk probability How likely is the risk?

Risk impact How much do we lose?

Risk control Can the risk be avoided?

Page 17: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Risk Exposure

Probability of Risk X Risk Impact

Risk Impact – $100,000

Risk Probability – 0.5

Risk Exposure – $50,000

Page 18: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Risk Leverage

(Exposure Before – Exposure After)/Risk Control Cost

Original Risk Exposure – $ 50,000Cost of Control – $100Revised Risk Exposure – $20,000Risk Leverage – 300 (note: dimensionless)

Page 19: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Risk Analysis Steps

Identify assetsDetermine vulnerabilitiesEstimate likelihood of exploitationCompute expected annual lossSurvey applicable controls and their costsProject annual savings of control

Page 20: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Difficulties of Risk Analysis

Probabilities hard to estimateHistorical dataExpertsDelphi approach

Some costs hard to quantify

Page 21: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Risk Analysis Approaches

Many risk analysis approachesUsual common features:

Checklists Organizational matrices Specification of procedures

No dominant approach

Page 22: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Security Policy

A written document describing goals for and constraints on a system

Who can access what resources in what manner?

High level management documentShould not change often

Page 23: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Policy Considerations

Stakeholders (beneficiaries)UsersOwnersResources

Page 24: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Security Procedures/Guidelines

Describe how security policy will be implemented

More frequent changes than policy

Page 25: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Physical Security

Protection that does not involve the system as a system

Independent of Hardware Software Data

Page 26: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Possible Problems

Natural disasters Floods Fires

Power lossHuman vandalsInterception of sensitive information

Page 27: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Physical Security Controls

Backups

BackupsBackupsBackups!!!

Page 28: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Natural Disasters

Careful building designSystem placementFire extinguishers

Page 29: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Power Loss

Uninterruptible power supplySurge suppressor

Page 30: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Human Vandals

GuardsLocksAuthenticationReduced portabilityTheft detection

Page 31: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Information Interception

ShreddingOverwriting magnetic dataDegaussing

Destroy magnetic fields

Tempest Prevent or control magnetic emanations

Page 32: Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1

Contingency Plans

BackupOffsite backupNetworked storageCold siteHot site