




已阅读5页,还剩79页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
InformationSecurityandItsImpactonBusiness Prof Chi ChunLoNationalChiao TungUniversityOct 5 2006 INTRODUCTION WhatifsomeoneasksyourCEO HowSecureisYourCorporation Onefootinicewaterandonefootinboilingwaterdoesnotmeanthatonaverageyouareatroomtemperature Corporationsarenotmonolithic andallpartsofthebusinessdon thave ornecessarilyneed thesamelevelofsecuritySecurityisnotanendstate norcanitbejudgedbymeasuringanysinglevariableatanysinglepointintime SellingSecurityisStillaChallenge Istheglasshalfempty orisithalffull Securityislikethebrakesonyourcar TheirfunctionistoslowyoudownButtheirpurposeistoallowyoutogofast BillMalick Gartner ScopeofSecurity SystemSecurity MostlyTechnicalIssues HardwareOrganization Culture Behavior Policy RiskManagement Standards LegalRightsetc CausesofInformationDamage InformationSecurity Highdependenceoninformationasacontributingfactorofsuccessorfailure createdtheneedforinformationsecurityandcontrolInformationsecuritydefinition preservationofconfidentiality integrityandavailabilityofinformationandinformationsystems Theobjectiveofinformationsecurityistoensurethecontinuityofbusinessmanagementandtoreduceinterruptionsofbusinessbypreventingandminimizingtheconsequencesofsecurityincidents Informationsecurityrelatestoallcontrolsaimedatprotectingtheavailability integrityandconfidentialityofinformation InformationSecurityComponents Reliability Confidentiality Exclusivity Integrity Availability Thedegreetowhichtheorganizationcandependuponaninformationsystemforitsprovisionofinformation BusinessModelforInformationSecurity Vulnerabilities Threats Legislation IdentityMgmt Assurance Controls BusinessImpacts ConfidentialityIntegrityAvailability Assets BusinessRisks exposing Toalossof causing causing whicharemitigatedby whichrequire causing exploit whichprotectagainst reduce SecuritySystemsDevelopmentLifeCycle SSDLC AsystematicwayofprovidinginformationsecurityPhases Phase1 Investigation includingpolicyandprocedureetc Phase2 Analysis includingriskmanagementetc Phase3 LogicalDesign includingstandardsetc Phase4 PhysicalDesign includingtechnologyselectionetc Phase5 Implementation Phase6 MaintenanceandChange POLICYandPROCEDURE PolicyandProcedure Apolicyistypicallyadocumentthatoutlinesspecificrequirementsorrulesthatmustbemet Intheinformation networksecurityrealm policiesareusuallypoint specific coveringasinglearea Forexample an AcceptableUse policywouldcovertherulesandregulationsforappropriateuseofthecomputingfacilities Astandardistypicallyacollectionsorsystem specificorprocedural specificrequirementsthatmustbemeetbyeveryone Forexample youmighthaveastandardthatdescribestohowtohardenaWindowsNTworkstationforplacementonanexternal DMZ network PeoplemustfollowthisstandardexactlyiftheywishtoinstallaWindowsNTworkstationonanexternalnetworksegment Aguidelineistypicallyacollectionofsystemspecificorproceduralspecific suggestions forbestpractice Theyarenotrequirementstobemet butarestronglyrecommended Effectivesecuritypoliciesmakefrequentreferencestostandardsandguidelinesthatexistwithinanorganization ASecurityPolicyFramework Policiesdefineappropriatebehavior Policiessetthestageintermsofwhattoolsandproceduresareneeded Policiescommunicateaconsensus PoliciesprovideafoundationforHRactioninresponsetoinappropriatebehavior Policiesmayhelpprosecutecases ImportanceofSecurityPolicies Securitypoliciesareanabsolutemustforanyorganization Theyprovidethevirtualgluetoholditalltogether Policieslaytheground work Imagineasmallcitythatdidnothaveanyrules Whatwouldlifebelike Thesameappliestoyourorganization WhoandWhattoTrust Trustisamajorprincipleunderlyingthedevelopmentofsecuritypolicies Initialstepistodeterminewhogetsaccess Decidingonleveloftrustisadelicatebalancingact ToomuchtrustmayleadtoeventualsecurityproblemsToolittletrustmaymakeitdifficulttofindandkeepemployeesorgetjobsdoneHowmuchshouldyoutrustpeopleregardingtotheiraccessorusageofcomputerandnetworkresources PossibleTrustModels Trusteveryoneallofthetime easiesttoenforce butimpracticalonebadapplecanruinthewholebarrelTrustnooneatnotime mostrestrictive butalsoimpracticaldifficulttostaffpositionsTrustsomepeoplesomeofthetime exercisecautioninamountoftrustgivenaccessisgivenoutasneededtechnicalcontrolsareneededtoensuretrustisnotviolated WhythePoliticalTurmoil Peopleviewpoliciesas animpedimenttoproductivitymeasurestocontrolbehaviorPeoplehavedifferentviewsabouttheneedforsecuritycontrols Peoplefearpolicieswillbedifficulttofollowandimplement Policiesaffecteveryonewithintheorganization WhoShouldBeConcerned Users policieswillaffectthemthemost Systemsupportpersonnel theywillberequiredtoimplement complywithandsupportthepolicies Managers theyareconcernedaboutprotectionofdataandtheassociatedcostofthepolicy Companylawyersandauditors theyareconcernedaboutcompanyreputation responsibilitytoclients customers ThePolicyDesignProcess Choosethepolicydevelopmentteam Designateapersonoragrouptoserveastheofficialpolicyinterpreter Decideonthescopeandgoalsofthepolicy Scopeshouldbeastatementaboutwhoiscoveredbythepolicy Decideonhowspecifictomakethepolicynotmeanttobeadetailedimplementationplandon tincludefactswhichchangefrequently ThePolicyDesignProcess Asampleofpeopleaffectedbythepolicyshouldbeprovidedanopportunitytoreviewandcomment Asamplingofthesupportstaffeffectedbypolicyshouldhaveanopportunitytoreviewit Incorporatepolicyawarenessasapartofemployeeorientation Providearefresheroverviewcourseonpoliciesonceortwiceayear BasicPolicyRequirements Policiesmust beimplementableandenforceablebeconciseandeasytounderstandbalanceprotectionwithproductivityPoliciesshould statereasonswhypolicyisneededdescribewhatiscoveredbythepoliciesdefinecontactsandresponsibilitiesdiscusshowviolationswillbehandled LevelofControl Securityneedsandcultureplaymajorrole SecuritypoliciesMUSTbalancelevelofcontrolwithlevelofproductivity Ifpoliciesaretoorestrictive peoplewillfindwaystocircumventcontrols Technicalcontrolsarenotalwayspossible Youmusthavemanagementcommitmentonthelevelofcontrol PolicyStructure Dependentoncompanysizeandgoals Onelargedocumentorseveralsmallones smallerdocumentsareeasiertomaintain updateSomepoliciesappropriateforeverysite othersarespecifictocertainenvironments Somekeypolicies acceptableuseremoteaccessinformationprotectionperimetersecuritybaselinehost devicesecurity TheAcceptableUsePolicy Discussesanddefinestheappropriateuseofthecomputingresources Usersshouldberequiredtoreadandsignaccountusagepolicyaspartoftheaccountrequestprocess Akeypolicythatallsitesshouldhave RemoteAccessPolicy Outlinesanddefinesacceptablemethodsofremotelyconnectingtotheinternalnetwork Essentialinlargeorganizationwherenetworksaregeographicallydispersedandevenextendintothehomes Shouldcoverallavailablemethodstoremotelyaccessinternalresources dial in SLIP PPP ISDN framerelaytelnet sshaccessfrominternetcablemodem VPN DSL InformationProtectionPolicy Providesguidelinestousersontheprocessing storageandtransmissionofsensitiveinformation Maingoalistoensureinformationisappropriatelyprotectedfrommodificationordisclosure Maybeappropriatetohavenewemployeessignpolicyaspartoftheirinitialorientation Shoulddefinesensitivitylevelsofinformation ThePerimeterSecurityPolicy Describes ingeneral howperimetersecurityismaintained Describeswhoisresponsibleformaintainingit Describeshowhardwareandsoftwarechangestoperimetersecuritydevicesaremanagedandhowchangesarerequestedandapproved VirusProtectionandPreventionPolicy Providesbaselinerequirementsfortheuseofvirusprotectionsoftware Providesguidelinesforreportingandcontainingvirusinfections Providesguidelinesforseverallevelsofvirusrisk Shoulddiscussrequirementsforscanningemailattachments Shoulddiscusspolicyforthedownloadandinstallationofpublicdomainsoftware VirusProtectionandPreventionPolicy Shoulddiscussfrequencyofvirusdatafileupdates Shoulddiscusstestingproceduresforinstallationofnewsoftware PasswordPolicy Providesguidelinesforhowuserlevelandsystemlevelpasswordsaremanagedandchanged Discussespasswordconstructionrules Providesguidelinesforhowpasswordsareprotectedfromdisclosure Discussesapplicationdevelopmentguidelinesforwhenpasswordsareneeded DiscussestheuseofSNMPcommunitystringsandpass phrases OtherImportantPolicies Apolicywhichaddressesforwardingofemailtooffsiteaddresses Apolicywhichaddresseswirelessnetworks Apolicywhichaddressesbaselinelabsecuritystandards Apolicywhichaddressesbaselinerouterconfigurationparameters Apolicywhichaddressesrequirementsforinstallingdevicesonadirtynetwork SecurityProcedures Policiesonlydefine what istobeprotected Proceduresdefine how toprotectresourcesandarethemechanismstoenforcepolicy Proceduresdefinedetailedactionstotakeforspecificincidents Proceduresprovideaquickreferenceintimesofcrisis Procedureshelpeliminatetheproblemofasinglepointoffailure e g anemployeesuddenlyleavesorisunavailableinatimeofcrisis ConfigurationManagementProcedure Defineshownewhardware softwareistestedandinstalled Defineshowhardware softwarechangesaredocumented Defineswhomustbeinformedwhenhardwareandsoftwarechangesoccur Defineswhohasauthoritytomakehardwareandsoftwareconfigurationchanges DataBackupandOff siteStorageProcedures Defineswhichfilesystemsarebackedup Defineshowoftenbackupsareperformed Defineshowoftenstoragemediaisrotated Defineshowoftenbackupsarestoredoff site Defineshowstoragemediaislabeledanddocumented IncidentHandlingProcedure Defineshowtohandleanomalyinvestigationandintruderattacks Definesareasofresponsibilitiesformembersoftheresponseteam Defineswhatinformationtorecordandtrack Defineswhotonotifyandwhen Defineswhocanreleaseinformationandtheprocedureforreleasingtheinformation Defineshowafollow upanalysisshouldbeperformedandwhowillparticipate RISKMANAGEMENT Risk Riskisthelikelihoodoftheoccurrenceofavulnerabilitymultipliedbythevalueoftheinformationassetminusthepercentageofriskmitigatedbycurrentcontrolsplustheuncertaintyofcurrentknowledgeofthevulnerability WhatisRisk AdefinableeventProbabilityofoccurrenceImpactofoccurrenceAriskoccurswhentheproblemhappensLossexpectancythatathreatmightexploitavulnerability Relationshipamongdifferentsecuritycomponents ThreatAgent Threat Vulnerability RISK Exposure Safeguard Givesriseto Exploits Leadsto Candamage Andcausesan Canbecountermeasuredbya Directlyaffects Risk VulnerabilityIdentification Vulnerability isasoftware hardware orproceduralweaknessthatmayprovideanattackertheopendoortoenterasystem SpecificavenuesthreatagentscanexploittoattackaninformationassetarecalledvulnerabilitiesExaminehoweachthreatcouldbeperpetratedandlistorganization sassetsandvulnerabilitiesProcessworksbestwhenpeoplewithdiversebackgroundswithinorganizationworkiterativelyinaseriesofbrainstormingsessionsAttheendofriskidentificationprocess listofassetsandtheirvulnerabilitiesisachieved RiskMitigation UnderstandsecurityriskUnderstandtechnologyAcceptRiskDocumentationofriskacceptanceisaformofmitigation DeferortransferriskInsuranceMitigateriskTechnologycanmitigaterisk RiskManagementProcess HowtoDevelopaSecurityRiskManagementProcess Securityriskmanagementprocess Aprocessforidentifying prioritizing andmanagingrisktoanacceptablelevelwithintheorganizationDevelopingaformalsecurityriskmanagementprocessmustaddressthefollowing ThreatresponsetimeRegulatorycomplianceInfrastructuremanagementcostsRiskidentificationandassessment prioritization SuccessfulFactorsforSecurityRiskManagementProcess Keyfactorstoimplementingasuccessfulsecurityriskmanagementprocessinclude ExecutivesponsorshipWell definedlistofriskmanagementstakeholdersOrganizationalmaturityintermsofriskmanagementAnatmosphereofopencommunicationsandteamworkAholisticviewoftheorganizationSecurityriskmanagementteam sauthority RiskManagementProcess RiskAssessmentFlowchart Step1 SystemCharacterization Input RiskAssessmentActivities Output Step2 ThreatIdentification Step3 VulnerabilityIdentification Step4 ControlAnalysis Step5 LikelihoodDetermination Step6 ImpactAnalysis LossofIntegrity LossofAvailability LossofConfidentiality Step7 RiskDetermination Step8 ControlRecommendations Step9 ResultsDocumentation Hardware Software Systeminterfaces Dataandinformation People Systemmission Historyofsystemattack Datafromintelligenceagencies NIPC OIG FedCIRC massmedia Reportsfrompriorriskassessments Anyauditcomments Securityrequirements Securitytestresults Missionimpactanalysis Assetcriticalityassessment Datacriticality Datasensitivity Currentcontrols Plannedcontrols Threat sourcemotivation Threatcapacity Natureofvulnerability Currentcontrols SystemBoundary SystemFunctions SystemandDataCriticality SystemandDataSensitivity ImpactRating ThreatStatement ListofPotentialVulnerabilities ListofCurrentandPlannedControls LikelihoodRating Likelihoodofthreatexploitation Magnitudeofimpact Adequacyofplannedorcurrentcontrols RisksandAssociatedRiskLevels RecommendedControls RiskAssessmentReport RiskMitigationFlowchart Input RiskMitigationActivities Output Step1 PrioritizeActions Step2 EvaluateRecommendedControlOptions Associatedcosts Feasibility Step3 ConductCost BenefitAnalysis Impactofimplementing Impactofnotimplementing Associatedcosts Step4 SelectControls Step5 AssignResponsibility Step6 DevelopSafeguardImplementationPlan RisksandAssociatedRiskLevels PrioritizedActions RecommendedControls SelectedPlannedControls ResponsiblePersons StartDate TargetCompletionDate MaintenanceRequirements Step7 ImplementSelectedControls Risklevelsfromtheriskassessmentreport Riskassessmentreport ActionsrankingfromHightoLow Safeguardimplementationplan Listofpossiblecontrols Cost benefitanalysis SelectedControls Listofresponsiblepersons ResidualRisks RiskAnalysisMethod RiskAnalysisMethod Twotypesofriskanalysis Quantitative attemptstoassignrealnumberstothecostsofsafeguardsandtheamountofdamagethatcantakeplaceQualitative Ananalysisthatjudgesanorganization srisktothreats whichisbasedonjudgment intuition andtheexperienceversusassigningrealnumberstothispossiblerisksandtheirpotentialloss e g AnalyticalHierarchyProcess AHP StepsofQuantitativeRiskAnalysis Assignvaluetoinformationassets tangibleandintangible EstimatepotentiallossperriskPerformathreatanalysisDerivetheoveralllosspotentialperriskChoosesafeguards countermeasureforeachriskDetermineriskresponse e g mitigation avoidance acceptance QuantitativeRiskAnalysis ExposureFactor EF Percentageofassetlosscausedbyidentifiedthreat rangesfrom0to100 SingleLossExpectancy SLE AssetValuexExposureFactor 1 000 000 10 likelihood 100 000AnnualizedRateofOccurrence ARO Estimatedfrequencyathreatwilloccurwithinayearandischaracterizedonanannualbasis Athreatoccurringoncein10yearshasanAROof0 1 athreatoccurring50timesinayearhasanAROof50AnnualizedLossExpectancy ALE SingleLossExpectancyxAnnualizedRateofOccurrenceSafeguardcost benefitanalysis ALEbeforeimplementingsafeguard ALEafterimplementingsafeguard annualcostofsafeguard valueofsafeguardtothecompany QuantitativeRiskAnalysis Summary ProsUsesprobabilityconcepts thelikelihoodthatanriskwilloccurorwillnotoccurThevalueofinformationisexpressedinmonetarytermswithsupportingrationaleRiskassessmentresultsarederivedandexpressedinmanagementspeak ConsPurelyquantitativeriskanalysisnotpossiblebecausequantitativemeasuresmustbeappliedtoqualitativeelementsCanbelessambiguousbutusingnumberscangiveappearanceofspecificitythatdoesnotreallyexistHugeamountofdatamustbegatheredandmanaged QualitativeRiskAnalysis Doesnotassignnumbersandmonetaryvaluetocomponentsandlosses Walksthroughdifferentscenariosofriskpossibilitiesandranktheseriousnessofthethreatsforthesensitivityoftheassets IdentifyingQualitativeRisks ExpertInterviewsBrainstormingNominalGroupTechniqueAffinityDiagramAnalogyTechniques QualitativeRisksMatrix 100 4 12 ExampleQualitativeRiskMatrix Hostage KidnapStrike WalkoutHostileTakeover MajorExplosion TerrorismIndustrialEspionage0 SabotageComm Disease Flood SuicideTelecommFailure Maj OperatorError ChildCareIncidentTransportationIncident MinorExplosion NeighborIssue CivilUnrest EmployeeViolence Tornado BreachITSecurity OrganizedCrime Blizzard Bribery Extortion ProtestersInjury DeathAccusation Libel Slander Fog BombThreatEquipmentMalfunc PowerFailure IceStorm MediaInvestigation ChemicalSpill Contamination MajorFire ClassActionLawsuit ManagementIssues SecurityBreach LossofIT Virus MajorElectricalStorm HIGHRISK LOWRISK MEDIUMHIGH MEDIUMLOW QualitativeRiskAnalysis Summary ProsIssimpleandreadilyunderstoodandexecuted Providesageneralindicationofsignificantareasofriskthatshouldbeaddressed ConsIsdifficulttoenforceinuniformityandconsistencybutprovidessomeorderofmeasurementIssubjectiveinbothprocessandmetrics Cannotprovidecost benefitanalysis QuantitativeversusQualitative Source CISSPCommonBodyofKnowledgeReviewSeminar ISC2 CorporateRiskAnalysisStrategy CorporateRiskAnalysisStrategy CorporateRiskAnalysisStrategy BaselineApproach InformalApproach DetailedApproach CombinedApproach CombinedApproach HighLevelRiskAnalysis DetailedRiskAnalysis BaselineApproach SelectionofSafeguards RiskAcceptance ITSystemSecurityPolicy ITSecurityPlan BaselineApproach EstablishaminimumsetofsafeguardstoprotectallorsomeITsystemsofanorganizationAchievedthroughtheuseofsafeguardcatalogueswhichsuggestasetofsafeguardstoprotectanITsystemagainstthemostcommonthreatsThelevelofbaselinesecuritycanbeadjustedtotheneedsoftheorganization InformalApproach ConductinformalpragmaticriskanalysisExploittheknowledgeandexperienceofindividuals DetailedApproach Involvestheidentificationoftherelatedrisks andanassessmentoftheirmagnitudeforallITsystemsTheresultoftheanalysisshouldbesavedAssetandtheirvaluesThreat vulnerability andrisklevelsSafeguardsidentified CombinedApproach Firstitisnecessarytoconductaninitialhighlevelriskanalysistoidentifywhichapproach baselineordetailedapproach isappropriateforeachITsystemInputforthedecisionastowhichapproachissuitableforwhichITsystem ThebusinessvaluesoftheITsystemsThelevelofinvestmentinthisITsystemTheasset svalueoftheITsystem TheProcessofRiskAnalysis EstablishmentofReviewBoundary IdentificationofAssets ValuationofAssetsandEstablishmentofDependenciesBetweenAssets ThreatAssessment VulnerabilityAssessment IdentificationofExisting PlanningSafeguards AssessmentofRisks SelectionofSafeguards Ri
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 萍乡一模初三数学试卷
- 农村五年级数学试卷
- 二零二五年度金融科技项目股权转让与运营管理合同范本
- 宁夏2024自主招生数学试卷
- 二零二五年度无息个人消费信贷产品合同范本信用生活新选择
- 求陕西高考数学试卷
- 2025版环保PPP项目合同第三、四章环境保护责任落实细则
- 2025版汽车制造公司间汽车设计秘密保密合同
- 二零二五版绿色建筑节能材料安装合同样本
- 二零二五年度二手房购房定金合同:智能家居与智能家居售后服务范本
- 2025电气设计强条
- 2025年中国城市礼物发展白皮书
- 土方消纳处置合同协议书
- 2025综合管理岗位劳动合同模板版
- T/CCS 075-2023煤矿柔性薄喷材料喷涂施工技术要求
- 医院健康培训课件
- 物理-2024-2025学年沪科版物理八年级下学期各章节知识点梳理
- 健身房项目计划书
- 专题12 文言文阅读02 《醉翁亭记》-三年(2022-2024)中考语文真题汇编(全国)(含解析)
- 部编版二上语文第一单元教材解读
- 走账返还协议书范本
评论
0/150
提交评论