SlideShare a Scribd company logo
Information Security 365/765, Fall Semester, 2014 
Course Instructor, Nicholas Davis 
Lecture 2, Course Introduction
09/10/14 UNIVERSITY OF WISCONSIN 2
LLeeccttuurree TTooppiiccss 
Security management responsibilities 
Difference between Administrative, 
Technical and Physical Controls 
The three main security principles 
Risk management 
How to perform a risk analysis 
09/10/14 UNIVERSITY OF WISCONSIN 3
DDeeffiinniinngg SSeeccuurriittyy 
MMaannaaggeemmeenntt 
Risk management method (see next slide) 
Information Security Policies 
Procedures 
Standards 
Guidelines 
Baselines 
Information Classification 
Security Organization 
Security Education 
09/10/14 UNIVERSITY OF WISCONSIN 4
PPrroocceessss ooff SSeeccuurriittyy 
MMaannaaggeemmeenntt 
Determination of needs 
Assessment of risks 
Monitoring and evaluation of existing 
systems and practices 
Promote awareness of existing issues 
Implementation of policies and controls 
to address needs 
Use a “Top Down” approach, not a 
“Bottom Up” approach 
09/10/14 UNIVERSITY OF WISCONSIN 5
TThhrreeee TTyyppeess ooff SSeeccuurriittyy 
CCoonnttrroollss 
Administrative 
Technical 
Physical 
09/10/14 UNIVERSITY OF WISCONSIN 6
AAddmmiinniissttrraattiivvee 
CCoonnttrroollss 
These include the developing and 
publishing of policies, standards, 
procedures and guidelines for risk 
management, the screening of 
personnel, conducting security 
awareness training, and implementing 
change control procedures 
09/10/14 UNIVERSITY OF WISCONSIN 7
TTeecchhnniiccaall CCoonnttrroollss 
((AAllssoo CCaalllleedd LLooggiiccaall CCoonnttrroollss)) 
These consist of implementing and 
maintaining access control mechanisms, 
password and resource management, 
identification and authentication 
methods, security devices and the 
configuration of the infrastructure 
Opinion note from the lecturer 
09/10/14 UNIVERSITY OF WISCONSIN 8
PPhhyyssiiccaall CCoonnttrroollss 
These entail controlling individual 
access into the facilities, locking 
systems, removing un-necessary access 
points to systems such as CD drives and 
USB ports, protecting the perimeter of 
the facility, monitoring for intrusion, 
and environmental controls 
09/10/14 UNIVERSITY OF WISCONSIN 9
AAllll TThhrreeee CCoonnttrroollss 
MMuusstt WWoorrkk TTooggeetthheerr 
09/10/14 UNIVERSITY OF WISCONSIN 10
TThhrreeee CCoorree GGooaallss 
ooff IInnffoorrmmaattiioonn SSeeccuurriittyy 
Confidentiality 
Integrity 
Availability 
09/10/14 UNIVERSITY OF WISCONSIN 11
AAvvaaiillaabbiilliittyy 
The systems and networks should 
provide adequate capacity to perform in 
a predictable manner, with an 
acceptable level of performance 
They should be able to quickly recover 
from disruption 
Single points of failure should be 
avoided 
Backup measures should be taken 
09/10/14 UNIVERSITY OF WISCONSIN 12
IInntteeggrriittyy 
Is defined as maintaining the accuracy 
and reliability of information systems, 
preventing any unauthorized 
modification 
Attacks or mistakes by users do not 
compromise the integrity of the data 
Viruses, Logic Bombs, or back doors can 
all compromise the integrity of an 
information system 
09/10/14 UNIVERSITY OF WISCONSIN 13
CCoonnffiiddeennttiiaalliittyy 
Ensures that the necessary level of 
secrecy is enforced at each junction of 
data processing and prevents 
unauthorized disclosure. 
This level of confidentiality should 
prevail while data resides on systems 
within the network, as it is transmitted 
and once it reaches its destination. 
09/10/14 UNIVERSITY OF WISCONSIN 14
MMoorree TTeerrmmiinnoollooggyy 
Vulnerability 
Threat 
Risk 
Exposure 
09/10/14 UNIVERSITY OF WISCONSIN 15
VVuullnneerraabbiilliittyy 
Software, hardware, physical or 
procedural weakness which may provide 
an attacker an open door into your 
information systems environment 
09/10/14 UNIVERSITY OF WISCONSIN 16
TThhrreeaatt 
A potential danger to an information 
system. The treat is that someone or 
something will identify and take 
advantage of a vulnerability. 
The entity which takes advantage of a 
vulnerability is called a threat entity 
09/10/14 UNIVERSITY OF WISCONSIN 17
RRiisskk 
A risk is the likelihood of a of a threat 
agent taking advantage of a vulnerability 
09/10/14 UNIVERSITY OF WISCONSIN 18
EExxppoossuurree 
Exposure is a single instance of the 
damages caused by a vulnerability being 
exploited by threat agent 
Way too many terms here for a normal 
human to remember!!!  
09/10/14 UNIVERSITY OF WISCONSIN 19
CCoouunntteerrmmeeaassuurree 
A safeguard put into place to mitigate a 
potential risk 
09/10/14 UNIVERSITY OF WISCONSIN 20
SSeeccuurriittyy TThhrroouugghh OObbssccuurriittyy 
Trying to keep things safe by keeping 
them hidden 
Bad idea – not a true security control 
09/10/14 UNIVERSITY OF WISCONSIN 21
SSeeccuurriittyy PPllaannnniinngg 
AArreeaass 
Strategic 
Tactical 
Operational 
09/10/14 UNIVERSITY OF WISCONSIN 22
SSttrraatteeggiicc 
LLoonngg aanndd BBrrooaadd HHoorriizzoonn 
Make sure that risks are properly 
understood 
Ensure compliance with laws and 
regulations 
Integrate security responsibilities 
throughout the organization 
Create a maturity model to allow for 
continual improvement 
Use security as a business achievement 
to attract more customers 
09/10/14 UNIVERSITY OF WISCONSIN 23
TTaaccttiiccaall 
IInniittiiaattiivveess SSuuppppoorrttiinngg SSttrraatteeggyy 
Initiatives and planning put in place to 
support the larger strategic plan 
Putting together teams to address 
specific issues 
Hiring new employees to be responsible 
for specific areas such as HIPAA or PCI 
compliance 
09/10/14 UNIVERSITY OF WISCONSIN 24
OOppeerraattiioonnaall 
Perform security risk assessment 
Do not allow security changes to 
decrease productivity 
Maintain and implement controls 
Continually scan for vulnerabilities and 
roll out patches 
Track compliance with policies 
09/10/14 UNIVERSITY OF WISCONSIN 25
JJuuddggee AAggaaiinnsstt SSttaannddaarrddss 
IISSOO 1177779999 
If you know this, you will be golden in 
the job interview! 
ISO is a British organization, recognized 
around the world for standards 
High level recommendations of 
enterprise IT security 
09/10/14 UNIVERSITY OF WISCONSIN 26
IInnffoorrmmaattiioonn SSeeccuurriittyy 
PPoolliiccyy FFoorr tthhee OOrrggaanniizzaattiioonn 
Map of objectives to security 
management’s support, security goals 
and responsibilities 
09/10/14 UNIVERSITY OF WISCONSIN 27
CCrreeaattiioonn ooff aann IInnffoorrmmaattiioonn 
SSeeccuurriittyy IInnffrraassttrruuccttuurree 
Create and maintain an organizational 
security structure through the use of a 
security forum, a security officer, 
defining responsibilities, a method for 
authorizing projects, outsourcing and 
independent audits and reviews 
09/10/14 UNIVERSITY OF WISCONSIN 28
AAsssseett CCllaassssiiffiiccaattiioonn 
aanndd CCoonnttrrooll 
Develop a security infrastructure to 
protect organizational assets through 
accountability through inventory, 
classification, and handling procedures 
09/10/14 UNIVERSITY OF WISCONSIN 29
PPeerrssoonnnneell SSeeccuurriittyy 
Reduce the risks which are inherent in 
human action by screening employees, 
defining roles and responsibilities, 
training employees properly and 
documenting the ramifications of not 
meeting expectations 
09/10/14 UNIVERSITY OF WISCONSIN 30
PPhhyyssiiccaall aanndd EEnnvviirroonnmmeennttaall 
SSeeccuurriittyy 
Protect the organization’s assets by 
properly choosing a facility location, 
erecting and maintaining a security 
perimeter, physical access control, and 
protecting equipment 
09/10/14 UNIVERSITY OF WISCONSIN 31
CCoommmmuunniiccaattiioonnss aanndd 
OOppeerraattiioonnss MMaannaaggeemmeenntt 
Carry out operations through 
documented procedures, proper change 
control, incident handling, separation of 
duties, capacity planning, network 
management and media handling 
09/10/14 UNIVERSITY OF WISCONSIN 32
AAcccceessss CCoonnttrrooll 
Control electronic access based upon 
business requirements, user 
management, authentication methods 
and monitoring 
09/10/14 UNIVERSITY OF WISCONSIN 33
SSyysstteemm DDeevveellooppmmeenntt 
aanndd MMaaiinntteennaannccee 
Make security an integral part of all life 
phases of system development and 
management 
09/10/14 UNIVERSITY OF WISCONSIN 34
BBuussiinneessss CCoonnttiinnuuiittyy 
MMaannaaggeemmeenntt 
Counter disruptions of normal 
operations by using continuity planning 
and testing 
09/10/14 UNIVERSITY OF WISCONSIN 35
CCoommpplliiaannccee 
Comply with regulatory, contractual and 
statutory requirements by using 
technical controls, systems audits and 
continuous legal and regulatory 
awareness 
Cost effective, relevant, timely, and 
responsive 
09/10/14 UNIVERSITY OF WISCONSIN 36
RRiisskk AAnnaallyyssiiss 
A method for identifying risks and 
threats 
09/10/14 UNIVERSITY OF WISCONSIN 37
RRiisskk AAnnaallyyssiiss 
HHaass FFoouurr MMaaiinn GGooaallss 
Identify assets and their values 
Identify vulnerabilities and threats 
Quantify the probability and business 
impact of these potential threats 
Provide an economic balance between 
the impact of the threat and the cost of 
the countermeasure 
09/10/14 UNIVERSITY OF WISCONSIN 38
RRiisskk AAnnaallyyssiiss -- SStteepp OOnnee 
AAssssiiggnn aa VVaalluuee ttoo tthhee AAsssseett 
What is the value of this asset to the 
company? 
How much does it cost to maintain? 
How much does it make in profits for 
the company? 
How much would it be worth to the 
competition? 
How much would it cost to re-create or 
recover? 
09/10/14 UNIVERSITY OF WISCONSIN 39
RRiisskk AAnnaallyyssiiss -- SStteepp OOnnee 
AAssssiiggnn aa VVaalluuee ttoo tthhee AAsssseett 
How much did it cost to acquire or 
develop this asset? 
How much liability do you face if the 
asset is compromised? 
09/10/14 UNIVERSITY OF WISCONSIN 40
RRiisskk AAnnaallyyssiiss –– SStteepp 22 
EEssttiimmaattee PPootteennttiiaall LLoossss PPeerr TThhrreeaatt 
What physical damage could the threat cause 
and how much would that cost? 
How much loss of productivity could the threat 
cause and how much would that cost? 
What is the value lost if the confidential 
information is disclosed? 
What is the cost of recovering from this threat? 
What is the value of the loss if critical devices 
were to fail? 
What is the Single Loss Expectancy (SLE) for 
each asset and each threat? 
09/10/14 UNIVERSITY OF WISCONSIN 41
RRiisskk AAnnaallyyssiiss –– SStteepp TThhrreeee 
PPeerrffoorrmm aa TThhrreeaatt AAnnaallyyssiiss 
Gather information about the likelihood 
of each threat taking place, from people 
in each department. Examine past 
records which provide this type of data 
Calculate the Annualized Rate of 
Occurrence (ARO), which is the number 
of times the threat can take place in a 
twelve month period 
09/10/14 UNIVERSITY OF WISCONSIN 42
RRiisskk AAnnaallyyssiiss –– SStteepp FFoouurr 
DDeerriivvee tthhee OOvveerraallll AAnnnnuuaall LLoossss 
PPeerr TThhrreeaatt 
Combine potential loss and probability 
Calculate the Annualized Loss 
Expectancy (ALE) per threat, by using 
the information calculated in the first 
three steps 
Choose remedial measures to counteract 
each threat 
Carry out cost-benefit analysis on the 
identified countermeasures 
09/10/14 UNIVERSITY OF WISCONSIN 43
RRiisskk AAnnaallyyssiiss –– SStteepp 55 
RReedduuccee,, TTrraannssffeerr,, AAvvooiidd oorr AAcccceepptt 
tthhee RRiisskk 
Install security controls 
Improve procedures 
Alter the environment 
Provide early detection methods to catch 
the threat as it is happening and reduce 
possible damage it can cause 
Produce a contingency plan of how a 
business can continue if a specific threat 
takes place, reducing further damages 
09/10/14 UNIVERSITY OF WISCONSIN 44
RRiisskk AAnnaallyyssiiss –– SStteepp 55 
RReedduuccee,, TTrraannssffeerr,, AAvvooiidd oorr AAcccceepptt 
tthhee RRiisskk 
Put up barriers to the threat 
Carry out security awareness training 
Perform risk transfer (buy insurance 
and make it someone else’s problem) 
Risk acceptance (live with the risks and 
spend no more money for protection) 
Risk avoidance (discontinue the activity 
that is causing the risk) 
09/10/14 UNIVERSITY OF WISCONSIN 45
RReessuullttss ooff tthhee RRiisskk AAnnaallyyssiiss 
1. Monetary values are assigned to assets 
2. You have a comprehensive list of all 
possible and significant threats 
3. You have a probability of the occurrence 
rate of each threat 
4. You have the loss potential which the 
company can endure per threat, 
annually. 
5. A list of recommended safeguards, 
countermeasures and actions 
09/10/14 UNIVERSITY OF WISCONSIN 46
CCoouunntteerrmmeeaassuurree SSeelleeccttiioonn 
Product costs 
Design and planning costs 
Implementation costs 
Environment modifications 
Compatibility with other 
countermeasures 
Maintenance requirements 
Testing requirements 
09/10/14 UNIVERSITY OF WISCONSIN 47
CCoouunntteerrmmeeaassuurree SSeelleeccttiioonn 
Repair, replacement or update costs 
Operating and support costs 
Effects on productivity 
Subscription costs 
Extra person hours 
Tolerance for headaches caused by new 
countermeasure 
09/10/14 UNIVERSITY OF WISCONSIN 48
NNeexxtt TTiimmee 
Security policies 
Information classification 
Security awareness training 
09/10/14 UNIVERSITY OF WISCONSIN 49
09/10/14 UNIVERSITY OF WISCONSIN 50

More Related Content

Viewers also liked

Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Managementansula
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virusYogesh Singh Rawat
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Dr. Loganathan R
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
abhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
Anand Subramaniam
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
Brett Leonard
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (18)

Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Antivirus
AntivirusAntivirus
Antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Types of-risk
Types of-riskTypes of-risk
Types of-risk
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
The Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk ManagementThe Purpose And Goals Of Risk Management
The Purpose And Goals Of Risk Management
 
Risk types
Risk  typesRisk  types
Risk types
 
Information security management
Information security managementInformation security management
Information security management
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 
Software Risk Analysis
Software Risk AnalysisSoftware Risk Analysis
Software Risk Analysis
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Information systems 365 lecture three - Performing an IT Security Risk Analysis

Information systems 365 lecture four - Security Policy Development, Data Clas...
Information systems 365 lecture four - Security Policy Development, Data Clas...Information systems 365 lecture four - Security Policy Development, Data Clas...
Information systems 365 lecture four - Security Policy Development, Data Clas...
Nicholas Davis
 
Information Systems Security 365/765 UW-Madison
Information Systems Security 365/765 UW-MadisonInformation Systems Security 365/765 UW-Madison
Information Systems Security 365/765 UW-Madison
Nicholas Davis
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
Community Protection Forum
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
Nicholas Davis
 
LEGAL ISSUES ON SAFETY REGULATION by Cinzia Ingratoci
LEGAL ISSUES ON SAFETY REGULATION by Cinzia IngratociLEGAL ISSUES ON SAFETY REGULATION by Cinzia Ingratoci
LEGAL ISSUES ON SAFETY REGULATION by Cinzia IngratociALIAS Network
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
Kabul Education University
 
Unit ia book part 2
Unit ia book part 2Unit ia book part 2
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineering
mkpq pasha
 
3 Lessons from High Reliability Organizations
3 Lessons from High Reliability Organizations3 Lessons from High Reliability Organizations
3 Lessons from High Reliability Organizations
Wilson Perumal and Company
 
SAFETY SMS.pptx
SAFETY SMS.pptxSAFETY SMS.pptx
SAFETY SMS.pptx
Maclenny
 
Vince_Galotti.ppt
Vince_Galotti.pptVince_Galotti.ppt
Vince_Galotti.ppt
MohammadFarazAkhter2
 
SMS 1.ppt
SMS 1.pptSMS 1.ppt
SECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADSECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABAD
Ali Faizan Wattoo
 
Port & maritime security 2013 agenda
Port & maritime security 2013   agendaPort & maritime security 2013   agenda
Port & maritime security 2013 agendaTina_Karas
 
WIISEL Final Report - 1- Publishable Report Final
WIISEL Final Report - 1- Publishable Report FinalWIISEL Final Report - 1- Publishable Report Final
WIISEL Final Report - 1- Publishable Report FinalElisenda Reixach
 
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptxSAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
SUJAN GHIMIRE
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
Kate Carruthers
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
Jisc
 
14 june
14 june14 june

Similar to Information systems 365 lecture three - Performing an IT Security Risk Analysis (20)

Information systems 365 lecture four - Security Policy Development, Data Clas...
Information systems 365 lecture four - Security Policy Development, Data Clas...Information systems 365 lecture four - Security Policy Development, Data Clas...
Information systems 365 lecture four - Security Policy Development, Data Clas...
 
Information Systems Security 365/765 UW-Madison
Information Systems Security 365/765 UW-MadisonInformation Systems Security 365/765 UW-Madison
Information Systems Security 365/765 UW-Madison
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...Information Security 365 -- Policies, Data Classification, Employee Training ...
Information Security 365 -- Policies, Data Classification, Employee Training ...
 
LEGAL ISSUES ON SAFETY REGULATION by Cinzia Ingratoci
LEGAL ISSUES ON SAFETY REGULATION by Cinzia IngratociLEGAL ISSUES ON SAFETY REGULATION by Cinzia Ingratoci
LEGAL ISSUES ON SAFETY REGULATION by Cinzia Ingratoci
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
Unit ia book part 2
Unit ia book part 2Unit ia book part 2
Unit ia book part 2
 
Strategic safety managment in construction and engineering
Strategic safety managment in construction and engineeringStrategic safety managment in construction and engineering
Strategic safety managment in construction and engineering
 
3 Lessons from High Reliability Organizations
3 Lessons from High Reliability Organizations3 Lessons from High Reliability Organizations
3 Lessons from High Reliability Organizations
 
SAFETY SMS.pptx
SAFETY SMS.pptxSAFETY SMS.pptx
SAFETY SMS.pptx
 
Vince_Galotti.ppt
Vince_Galotti.pptVince_Galotti.ppt
Vince_Galotti.ppt
 
SMS 1.ppt
SMS 1.pptSMS 1.ppt
SMS 1.ppt
 
SECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADSECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABAD
 
Port & maritime security 2013 agenda
Port & maritime security 2013   agendaPort & maritime security 2013   agenda
Port & maritime security 2013 agenda
 
Gustavo Barba, Deputy President COPAC
Gustavo Barba, Deputy President COPACGustavo Barba, Deputy President COPAC
Gustavo Barba, Deputy President COPAC
 
WIISEL Final Report - 1- Publishable Report Final
WIISEL Final Report - 1- Publishable Report FinalWIISEL Final Report - 1- Publishable Report Final
WIISEL Final Report - 1- Publishable Report Final
 
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptxSAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
SAFETY MANAGEMENT ISSUES, BENEFITS AND CHALLENGES.pptx
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 
Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...Information security at University of East London: the benefits (and pitfalls...
Information security at University of East London: the benefits (and pitfalls...
 
14 june
14 june14 june
14 june
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Nicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
Nicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
Nicholas Davis
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
Nicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
Nicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
Nicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
Nicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
Nicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
Nicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
Nicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
Nicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
Nicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
Nicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Information systems 365 lecture three - Performing an IT Security Risk Analysis

  • 1. Information Security 365/765, Fall Semester, 2014 Course Instructor, Nicholas Davis Lecture 2, Course Introduction
  • 3. LLeeccttuurree TTooppiiccss Security management responsibilities Difference between Administrative, Technical and Physical Controls The three main security principles Risk management How to perform a risk analysis 09/10/14 UNIVERSITY OF WISCONSIN 3
  • 4. DDeeffiinniinngg SSeeccuurriittyy MMaannaaggeemmeenntt Risk management method (see next slide) Information Security Policies Procedures Standards Guidelines Baselines Information Classification Security Organization Security Education 09/10/14 UNIVERSITY OF WISCONSIN 4
  • 5. PPrroocceessss ooff SSeeccuurriittyy MMaannaaggeemmeenntt Determination of needs Assessment of risks Monitoring and evaluation of existing systems and practices Promote awareness of existing issues Implementation of policies and controls to address needs Use a “Top Down” approach, not a “Bottom Up” approach 09/10/14 UNIVERSITY OF WISCONSIN 5
  • 6. TThhrreeee TTyyppeess ooff SSeeccuurriittyy CCoonnttrroollss Administrative Technical Physical 09/10/14 UNIVERSITY OF WISCONSIN 6
  • 7. AAddmmiinniissttrraattiivvee CCoonnttrroollss These include the developing and publishing of policies, standards, procedures and guidelines for risk management, the screening of personnel, conducting security awareness training, and implementing change control procedures 09/10/14 UNIVERSITY OF WISCONSIN 7
  • 8. TTeecchhnniiccaall CCoonnttrroollss ((AAllssoo CCaalllleedd LLooggiiccaall CCoonnttrroollss)) These consist of implementing and maintaining access control mechanisms, password and resource management, identification and authentication methods, security devices and the configuration of the infrastructure Opinion note from the lecturer 09/10/14 UNIVERSITY OF WISCONSIN 8
  • 9. PPhhyyssiiccaall CCoonnttrroollss These entail controlling individual access into the facilities, locking systems, removing un-necessary access points to systems such as CD drives and USB ports, protecting the perimeter of the facility, monitoring for intrusion, and environmental controls 09/10/14 UNIVERSITY OF WISCONSIN 9
  • 10. AAllll TThhrreeee CCoonnttrroollss MMuusstt WWoorrkk TTooggeetthheerr 09/10/14 UNIVERSITY OF WISCONSIN 10
  • 11. TThhrreeee CCoorree GGooaallss ooff IInnffoorrmmaattiioonn SSeeccuurriittyy Confidentiality Integrity Availability 09/10/14 UNIVERSITY OF WISCONSIN 11
  • 12. AAvvaaiillaabbiilliittyy The systems and networks should provide adequate capacity to perform in a predictable manner, with an acceptable level of performance They should be able to quickly recover from disruption Single points of failure should be avoided Backup measures should be taken 09/10/14 UNIVERSITY OF WISCONSIN 12
  • 13. IInntteeggrriittyy Is defined as maintaining the accuracy and reliability of information systems, preventing any unauthorized modification Attacks or mistakes by users do not compromise the integrity of the data Viruses, Logic Bombs, or back doors can all compromise the integrity of an information system 09/10/14 UNIVERSITY OF WISCONSIN 13
  • 14. CCoonnffiiddeennttiiaalliittyy Ensures that the necessary level of secrecy is enforced at each junction of data processing and prevents unauthorized disclosure. This level of confidentiality should prevail while data resides on systems within the network, as it is transmitted and once it reaches its destination. 09/10/14 UNIVERSITY OF WISCONSIN 14
  • 15. MMoorree TTeerrmmiinnoollooggyy Vulnerability Threat Risk Exposure 09/10/14 UNIVERSITY OF WISCONSIN 15
  • 16. VVuullnneerraabbiilliittyy Software, hardware, physical or procedural weakness which may provide an attacker an open door into your information systems environment 09/10/14 UNIVERSITY OF WISCONSIN 16
  • 17. TThhrreeaatt A potential danger to an information system. The treat is that someone or something will identify and take advantage of a vulnerability. The entity which takes advantage of a vulnerability is called a threat entity 09/10/14 UNIVERSITY OF WISCONSIN 17
  • 18. RRiisskk A risk is the likelihood of a of a threat agent taking advantage of a vulnerability 09/10/14 UNIVERSITY OF WISCONSIN 18
  • 19. EExxppoossuurree Exposure is a single instance of the damages caused by a vulnerability being exploited by threat agent Way too many terms here for a normal human to remember!!!  09/10/14 UNIVERSITY OF WISCONSIN 19
  • 20. CCoouunntteerrmmeeaassuurree A safeguard put into place to mitigate a potential risk 09/10/14 UNIVERSITY OF WISCONSIN 20
  • 21. SSeeccuurriittyy TThhrroouugghh OObbssccuurriittyy Trying to keep things safe by keeping them hidden Bad idea – not a true security control 09/10/14 UNIVERSITY OF WISCONSIN 21
  • 22. SSeeccuurriittyy PPllaannnniinngg AArreeaass Strategic Tactical Operational 09/10/14 UNIVERSITY OF WISCONSIN 22
  • 23. SSttrraatteeggiicc LLoonngg aanndd BBrrooaadd HHoorriizzoonn Make sure that risks are properly understood Ensure compliance with laws and regulations Integrate security responsibilities throughout the organization Create a maturity model to allow for continual improvement Use security as a business achievement to attract more customers 09/10/14 UNIVERSITY OF WISCONSIN 23
  • 24. TTaaccttiiccaall IInniittiiaattiivveess SSuuppppoorrttiinngg SSttrraatteeggyy Initiatives and planning put in place to support the larger strategic plan Putting together teams to address specific issues Hiring new employees to be responsible for specific areas such as HIPAA or PCI compliance 09/10/14 UNIVERSITY OF WISCONSIN 24
  • 25. OOppeerraattiioonnaall Perform security risk assessment Do not allow security changes to decrease productivity Maintain and implement controls Continually scan for vulnerabilities and roll out patches Track compliance with policies 09/10/14 UNIVERSITY OF WISCONSIN 25
  • 26. JJuuddggee AAggaaiinnsstt SSttaannddaarrddss IISSOO 1177779999 If you know this, you will be golden in the job interview! ISO is a British organization, recognized around the world for standards High level recommendations of enterprise IT security 09/10/14 UNIVERSITY OF WISCONSIN 26
  • 27. IInnffoorrmmaattiioonn SSeeccuurriittyy PPoolliiccyy FFoorr tthhee OOrrggaanniizzaattiioonn Map of objectives to security management’s support, security goals and responsibilities 09/10/14 UNIVERSITY OF WISCONSIN 27
  • 28. CCrreeaattiioonn ooff aann IInnffoorrmmaattiioonn SSeeccuurriittyy IInnffrraassttrruuccttuurree Create and maintain an organizational security structure through the use of a security forum, a security officer, defining responsibilities, a method for authorizing projects, outsourcing and independent audits and reviews 09/10/14 UNIVERSITY OF WISCONSIN 28
  • 29. AAsssseett CCllaassssiiffiiccaattiioonn aanndd CCoonnttrrooll Develop a security infrastructure to protect organizational assets through accountability through inventory, classification, and handling procedures 09/10/14 UNIVERSITY OF WISCONSIN 29
  • 30. PPeerrssoonnnneell SSeeccuurriittyy Reduce the risks which are inherent in human action by screening employees, defining roles and responsibilities, training employees properly and documenting the ramifications of not meeting expectations 09/10/14 UNIVERSITY OF WISCONSIN 30
  • 31. PPhhyyssiiccaall aanndd EEnnvviirroonnmmeennttaall SSeeccuurriittyy Protect the organization’s assets by properly choosing a facility location, erecting and maintaining a security perimeter, physical access control, and protecting equipment 09/10/14 UNIVERSITY OF WISCONSIN 31
  • 32. CCoommmmuunniiccaattiioonnss aanndd OOppeerraattiioonnss MMaannaaggeemmeenntt Carry out operations through documented procedures, proper change control, incident handling, separation of duties, capacity planning, network management and media handling 09/10/14 UNIVERSITY OF WISCONSIN 32
  • 33. AAcccceessss CCoonnttrrooll Control electronic access based upon business requirements, user management, authentication methods and monitoring 09/10/14 UNIVERSITY OF WISCONSIN 33
  • 34. SSyysstteemm DDeevveellooppmmeenntt aanndd MMaaiinntteennaannccee Make security an integral part of all life phases of system development and management 09/10/14 UNIVERSITY OF WISCONSIN 34
  • 35. BBuussiinneessss CCoonnttiinnuuiittyy MMaannaaggeemmeenntt Counter disruptions of normal operations by using continuity planning and testing 09/10/14 UNIVERSITY OF WISCONSIN 35
  • 36. CCoommpplliiaannccee Comply with regulatory, contractual and statutory requirements by using technical controls, systems audits and continuous legal and regulatory awareness Cost effective, relevant, timely, and responsive 09/10/14 UNIVERSITY OF WISCONSIN 36
  • 37. RRiisskk AAnnaallyyssiiss A method for identifying risks and threats 09/10/14 UNIVERSITY OF WISCONSIN 37
  • 38. RRiisskk AAnnaallyyssiiss HHaass FFoouurr MMaaiinn GGooaallss Identify assets and their values Identify vulnerabilities and threats Quantify the probability and business impact of these potential threats Provide an economic balance between the impact of the threat and the cost of the countermeasure 09/10/14 UNIVERSITY OF WISCONSIN 38
  • 39. RRiisskk AAnnaallyyssiiss -- SStteepp OOnnee AAssssiiggnn aa VVaalluuee ttoo tthhee AAsssseett What is the value of this asset to the company? How much does it cost to maintain? How much does it make in profits for the company? How much would it be worth to the competition? How much would it cost to re-create or recover? 09/10/14 UNIVERSITY OF WISCONSIN 39
  • 40. RRiisskk AAnnaallyyssiiss -- SStteepp OOnnee AAssssiiggnn aa VVaalluuee ttoo tthhee AAsssseett How much did it cost to acquire or develop this asset? How much liability do you face if the asset is compromised? 09/10/14 UNIVERSITY OF WISCONSIN 40
  • 41. RRiisskk AAnnaallyyssiiss –– SStteepp 22 EEssttiimmaattee PPootteennttiiaall LLoossss PPeerr TThhrreeaatt What physical damage could the threat cause and how much would that cost? How much loss of productivity could the threat cause and how much would that cost? What is the value lost if the confidential information is disclosed? What is the cost of recovering from this threat? What is the value of the loss if critical devices were to fail? What is the Single Loss Expectancy (SLE) for each asset and each threat? 09/10/14 UNIVERSITY OF WISCONSIN 41
  • 42. RRiisskk AAnnaallyyssiiss –– SStteepp TThhrreeee PPeerrffoorrmm aa TThhrreeaatt AAnnaallyyssiiss Gather information about the likelihood of each threat taking place, from people in each department. Examine past records which provide this type of data Calculate the Annualized Rate of Occurrence (ARO), which is the number of times the threat can take place in a twelve month period 09/10/14 UNIVERSITY OF WISCONSIN 42
  • 43. RRiisskk AAnnaallyyssiiss –– SStteepp FFoouurr DDeerriivvee tthhee OOvveerraallll AAnnnnuuaall LLoossss PPeerr TThhrreeaatt Combine potential loss and probability Calculate the Annualized Loss Expectancy (ALE) per threat, by using the information calculated in the first three steps Choose remedial measures to counteract each threat Carry out cost-benefit analysis on the identified countermeasures 09/10/14 UNIVERSITY OF WISCONSIN 43
  • 44. RRiisskk AAnnaallyyssiiss –– SStteepp 55 RReedduuccee,, TTrraannssffeerr,, AAvvooiidd oorr AAcccceepptt tthhee RRiisskk Install security controls Improve procedures Alter the environment Provide early detection methods to catch the threat as it is happening and reduce possible damage it can cause Produce a contingency plan of how a business can continue if a specific threat takes place, reducing further damages 09/10/14 UNIVERSITY OF WISCONSIN 44
  • 45. RRiisskk AAnnaallyyssiiss –– SStteepp 55 RReedduuccee,, TTrraannssffeerr,, AAvvooiidd oorr AAcccceepptt tthhee RRiisskk Put up barriers to the threat Carry out security awareness training Perform risk transfer (buy insurance and make it someone else’s problem) Risk acceptance (live with the risks and spend no more money for protection) Risk avoidance (discontinue the activity that is causing the risk) 09/10/14 UNIVERSITY OF WISCONSIN 45
  • 46. RReessuullttss ooff tthhee RRiisskk AAnnaallyyssiiss 1. Monetary values are assigned to assets 2. You have a comprehensive list of all possible and significant threats 3. You have a probability of the occurrence rate of each threat 4. You have the loss potential which the company can endure per threat, annually. 5. A list of recommended safeguards, countermeasures and actions 09/10/14 UNIVERSITY OF WISCONSIN 46
  • 47. CCoouunntteerrmmeeaassuurree SSeelleeccttiioonn Product costs Design and planning costs Implementation costs Environment modifications Compatibility with other countermeasures Maintenance requirements Testing requirements 09/10/14 UNIVERSITY OF WISCONSIN 47
  • 48. CCoouunntteerrmmeeaassuurree SSeelleeccttiioonn Repair, replacement or update costs Operating and support costs Effects on productivity Subscription costs Extra person hours Tolerance for headaches caused by new countermeasure 09/10/14 UNIVERSITY OF WISCONSIN 48
  • 49. NNeexxtt TTiimmee Security policies Information classification Security awareness training 09/10/14 UNIVERSITY OF WISCONSIN 49
  • 50. 09/10/14 UNIVERSITY OF WISCONSIN 50