UNIT 3 - Information Security (1)
UNIT 3 - Information Security (1)
School of Computing
Department of Networking and Communications
Dr.V.Nallarasan
Assistant Professor / NWC
Course Content
Unit 3
Risk Management: Identifying and Assessing Risk, Assessing and
Confinement Problem
2
Risk Management
sensitive data and prevent security breaches. Here's an overview of the key steps
3
Risk Management
Risk Identification
could affect the security of the organization's information assets. This may include
4
Risk Management
Risk Assessment
likelihood and potential impact on the organization's information assets. This step
5
Risk Management
Risk Analysis
those risks. This step helps in understanding the potential loss associated with each
6
Risk Management
Risk Treatment
strategies to treat or mitigate the identified risks. Risk treatment options may
include risk avoidance, risk reduction, risk transfer, or risk acceptance. This step
aims to reduce the likelihood and impact of identified risks to an acceptable level.
7
Risk Management
monitor and review the effectiveness of risk mitigation measures. This involves
necessary.
8
Risk Management
documenting risk assessment findings, risk treatment plans, and any decisions
9
Risk Management
10
Risk Management
11
Risk Management
12
Risk Management
13
Risk Management
14
Identifying and Assessing Risk
Identifying Risks
Asset Inventory
Threat Identification
Vulnerability Assessment
15
Identifying and Assessing Risk
Asset Inventory
Begin by identifying all the assets within the organization that need
protection. This includes physical assets like servers and computers, as well as
Threat Identification
16
Identifying and Assessing Risk
Vulnerability Assessment
17
Identifying and Assessing Risk
Assessing Risk:
Risk Analysis
Risk Prioritization
Risk Evaluation
Risk Acceptance
18
Identifying and Assessing Risk
Risk Analysis
low, medium, high) or quantitative (e.g., using mathematical models and metrics).
19
Identifying and Assessing Risk
Risk Prioritization
organization. Risks with high likelihood and high impact should be given higher
20
Identifying and Assessing Risk
Risk Evaluation
place to address identified risks. Determine whether these controls are adequate and
Risk Acceptance
impact are low, and the cost of mitigation outweighs the potential loss. However,
21
Identifying and Assessing Risk
Techniques and Tools for Risk Identification and Assessment
Risk Registers
(e.g., risk matrices, risk scoring), quantitative risk assessment (e.g., Monte Carlo
22
Identifying and Assessing Risk
Threat Modeling
23
Identifying and Assessing Risk
Risk identification and assessment are not one-time activities. They should be
24
Identifying and Assessing Risk
25
Identifying and Assessing Risk
26
Assessing and Controlling Risk
security effectively. Once risks have been identified and assessed, organizations
their severity and potential impact. Here's how organizations typically assess and
27
Assessing and Controlling Risk
Risk Assessment
Quantitative Analysis
Qualitative Analysis
Threat Modeling
28
Assessing and Controlling Risk
Quantitative Analysis
identified risks. This can be done using various mathematical models and metrics to
Qualitative Analysis
impact, and severity. This method often uses risk matrices or risk scoring systems
29
Assessing and Controlling Risk
Threat Modeling
30
Assessing and Controlling Risk
Risk Controls
Preventive Controls
Detective Controls
Corrective Controls
Compensating Controls
31
Assessing and Controlling Risk
Preventive Controls
Detective Controls
include security monitoring, log analysis, intrusion detection systems, and security
32
Assessing and Controlling Risk
Corrective Controls
These controls include incident response plans, data backup and recovery
Compensating Controls
primary controls are not feasible or effective. Compensating controls are often used
33
Assessing and Controlling Risk
Risk Avoidance
Risk Reduction
Risk Transfer
Risk Acceptance
34
Assessing and Controlling Risk
Risk Avoidance
Risk Transfer
35
Assessing and Controlling Risk
Risk Reduction
security training and awareness programs, and regularly updating software and
systems.
36
Assessing and Controlling Risk
Risk Acceptance
approach is typically taken for risks with low likelihood and impact or when the
37
Assessing and Controlling Risk
exercises.
38
Assessing and Controlling Risk
reduce the likelihood and impact of security incidents. However, it's essential to
39
Assessing and Controlling Risk
40
Assessing and Controlling Risk
41
Assessing and Controlling Risk
42
Assessing and Controlling Risk
43
Systems: Access Control Mechanisms
ensuring that only authorized individuals or systems can access resources, thereby
reducing the likelihood of unauthorized access, data breaches, and other security
mitigate various risks associated with unauthorized access. Here are some
44
Systems: Access Control Mechanisms
Authentication
such as passwords, biometrics (fingerprint, iris, etc.), security tokens, smart cards,
45
Systems: Access Control Mechanisms
Authorization
authorization mechanisms used to define and enforce access rights based on user
46
Systems: Access Control Mechanisms
Encryption
parties can access it. By encrypting sensitive data at rest (stored data) and in transit
(data being transmitted over a network), organizations can mitigate the risk of
47
Systems: Access Control Mechanisms
users or systems are granted access rights to that object and what operations they
can perform. ACLs are commonly used in file systems, network devices, and
48
Systems: Access Control Mechanisms
to restrict unauthorized access and limit the potential impact of security breaches.
49
Systems: Access Control Mechanisms
violations and can automatically take action to block or mitigate threats. They help
detect and prevent unauthorized access attempts, data breaches, and other security
incidents in real-time.
50
Systems: Access Control Mechanisms
51
Systems: Access Control Mechanisms
52
Systems: Access Control Mechanisms
breaches, data leaks, and other risks associated with unauthorized access to
53
Systems: Access Control Mechanisms
54
Systems: Access Control Mechanisms
55
Systems: Access Control Mechanisms
56
Information Flow
assessing, and mitigating risks in a timely manner. Here's how information flows
57
Information Flow
Data Collection
The first step in managing risks is to collect relevant data from various
sources within the organization and from external sources such as industry reports,
regulatory bodies, and threat intelligence feeds. This data may include information
58
Information Flow
Risk Identification
59
Information Flow
Risk Assessment
severity, likelihood, and potential impact. This may include using risk assessment
response.
60
Information Flow
Risk Treatment
plans to mitigate, transfer, accept, or avoid the identified risks. This involves
implementing controls and measures to reduce the likelihood and impact of risks
61
Information Flow
efforts. This includes monitoring changes in the risk landscape, assessing the
needed.
62
Information Flow
Communication
This includes communicating risk assessment findings, risk treatment plans, and
63
Information Flow
Reporting
on the organization's risk profile, risk treatment progress, and any significant
64
Information Flow
and using them to enhance future risk management efforts. This includes
analyzing past incidents and near misses, identifying root causes, and
65
Information Flow
66
Confinement Problem
challenge of ensuring that a program or process can only access resources and
67
Confinement Problem
of systems and data. Failure to adequately confine processes can lead to various
malicious actors.
68
Confinement Problem
There are several approaches to addressing the confinement problem in
information security:
based access control (RBAC), and mandatory access control (MAC), are used to
enforce policies that specify which users or processes are authorized to access
specific resources and perform certain operations. These mechanisms help restrict
69
Confinement Problem
Privilege Separation
into separate entities with different levels of privilege. By running processes with
the potential impact of security breaches and limits the ability of attackers to
exploit vulnerabilities.
70
Confinement Problem
Sandboxing
safely executed without posing a risk to the rest of the system. Sandboxing
which restrict the resources and system calls available to sandboxed processes.
71
Confinement Problem
Validating code and data inputs can help prevent unauthorized access
sanitization, and code signing can help ensure that only trusted and properly
formatted data and code are processed, reducing the risk of security breaches.
72
Confinement Problem
guidelines, code reviews, and vulnerability assessments, can help mitigate the risk
73
Confinement Problem
Monitoring and auditing systems can help detect and mitigate security
74
Confinement Problem
monitoring and auditing to ensure that systems and data are adequately protected
75
Confinement Problem in Risk Analysis
76