0% found this document useful (0 votes)
13 views

UNIT 3 - Information Security (1)

The document outlines the key components of risk management in information security, including risk identification, assessment, treatment, and monitoring. It emphasizes the importance of access control mechanisms and effective information flow to mitigate risks and protect organizational assets. Continuous training and compliance with regulations are also highlighted as critical elements in maintaining a robust security posture.

Uploaded by

25devv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

UNIT 3 - Information Security (1)

The document outlines the key components of risk management in information security, including risk identification, assessment, treatment, and monitoring. It emphasizes the importance of access control mechanisms and effective information flow to mitigate risks and protect organizational assets. Continuous training and compliance with regulations are also highlighted as critical elements in maintaining a robust security posture.

Uploaded by

25devv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

SRM IST

School of Computing
Department of Networking and Communications

21CSE282T - INFORMATION SECURITY

Dr.V.Nallarasan
Assistant Professor / NWC
Course Content
Unit 3
Risk Management: Identifying and Assessing Risk, Assessing and

Controlling Risk - Systems: Access Control Mechanisms, Information Flow and

Confinement Problem

CO3: Demonstrate the Aspects of Risk Management

2
Risk Management

Risk management in information security is a critical aspect of ensuring

the confidentiality, integrity, and availability of an organization's information

assets. It involves identifying, assessing, prioritizing, and mitigating risks to protect

sensitive data and prevent security breaches. Here's an overview of the key steps

involved in risk management in information security:

3
Risk Management

Risk Identification

This step involves identifying potential threats and vulnerabilities that

could affect the security of the organization's information assets. This may include

external threats such as cyberattacks, malware, and phishing, as well as internal

risks such as unauthorized access, human error, and system failures.

4
Risk Management

Risk Assessment

Once risks are identified, they need to be assessed in terms of their

likelihood and potential impact on the organization's information assets. This step

helps prioritize risks based on their severity and likelihood of occurrence.

5
Risk Management

Risk Analysis

Risk analysis involves analyzing the identified risks to determine their

potential consequences and the effectiveness of existing controls in mitigating

those risks. This step helps in understanding the potential loss associated with each

risk and aids in decision-making regarding risk treatment.

6
Risk Management

Risk Treatment

After analyzing the risks, organizations need to develop and implement

strategies to treat or mitigate the identified risks. Risk treatment options may

include risk avoidance, risk reduction, risk transfer, or risk acceptance. This step

aims to reduce the likelihood and impact of identified risks to an acceptable level.

7
Risk Management

Risk Monitoring and Review

Risk management is an ongoing process, and it's essential to continuously

monitor and review the effectiveness of risk mitigation measures. This involves

regularly assessing the changing threat landscape, evaluating the effectiveness of

existing controls, and making adjustments to the risk management strategies as

necessary.

8
Risk Management

Documentation and Communication

Proper documentation of the risk management process is crucial for

maintaining transparency and accountability within the organization. It involves

documenting risk assessment findings, risk treatment plans, and any decisions

made regarding risk management. Effective communication of risks and risk

management strategies is also essential to ensure that stakeholders are aware of

potential threats and their respective roles in mitigating those risks.

9
Risk Management

Compliance and Governance

Organizations must ensure that their risk management practices comply

with relevant laws, regulations, and industry standards governing information

security. This involves establishing robust governance frameworks and

incorporating risk management into the organization's overall governance structure.

10
Risk Management

Training and Awareness

Employees are often the weakest link in an organization's security posture.

Therefore, providing regular training and awareness programs on information

security best practices and the importance of risk management is crucial in

mitigating human-related risks.

11
Risk Management

12
Risk Management

13
Risk Management

14
Identifying and Assessing Risk

Identifying and assessing risk is a fundamental step in the risk

management process, particularly in information security. Here's a detailed

breakdown of how organizations typically approach these aspects:

Identifying Risks

 Asset Inventory

 Threat Identification

 Vulnerability Assessment

15
Identifying and Assessing Risk
Asset Inventory

Begin by identifying all the assets within the organization that need

protection. This includes physical assets like servers and computers, as well as

intangible assets like data and intellectual property.

Threat Identification

Identify potential threats that could exploit vulnerabilities in the

organization's assets. These threats could be external (e.g., hackers, malware) or

internal (e.g., disgruntled employees, accidental data breaches).

16
Identifying and Assessing Risk

Vulnerability Assessment

Assess the vulnerabilities or weaknesses in the organization's systems,

processes, and controls that could be exploited by threats. This includes

vulnerabilities in software, hardware, network configurations, and human factors.

17
Identifying and Assessing Risk

Assessing Risk:

Four different types of Assessing the Risk as follows

 Risk Analysis

 Risk Prioritization

 Risk Evaluation

 Risk Acceptance

18
Identifying and Assessing Risk
Risk Analysis

Analyze the likelihood and potential impact of identified risks. This

involves evaluating the probability of a threat exploiting a vulnerability and the

potential consequences if it were to occur. Risk analysis can be qualitative (e.g.,

low, medium, high) or quantitative (e.g., using mathematical models and metrics).

19
Identifying and Assessing Risk

Risk Prioritization

Prioritize risks based on their significance and potential impact on the

organization. Risks with high likelihood and high impact should be given higher

priority for mitigation.

20
Identifying and Assessing Risk
Risk Evaluation

Evaluate the organization's current controls and mitigation measures in

place to address identified risks. Determine whether these controls are adequate and

effective in mitigating the risks to an acceptable level.

Risk Acceptance

Some risks may be deemed acceptable if their likelihood and potential

impact are low, and the cost of mitigation outweighs the potential loss. However,

this decision should be made consciously and documented.

21
Identifying and Assessing Risk
Techniques and Tools for Risk Identification and Assessment

Risk Registers

Maintain a risk register or database to document identified risks along

with their attributes such as likelihood, impact, and mitigation measures.

Risk Assessment Methods

Use various risk assessment methods such as qualitative risk assessment

(e.g., risk matrices, risk scoring), quantitative risk assessment (e.g., Monte Carlo

simulation, financial impact analysis), and semi-quantitative methods.

22
Identifying and Assessing Risk

Threat Modeling

Employ threat modeling techniques to systematically identify and analyze

potential threats to specific assets or systems. This helps in understanding attack

vectors and prioritizing security controls.

23
Identifying and Assessing Risk

Continuous Monitoring and Review

 Risk identification and assessment are not one-time activities. They should be

performed periodically or in response to significant changes in the

organization's environment (e.g., new technology deployments, regulatory

changes, security incidents).

 Continuous monitoring helps in identifying emerging risks and ensuring that

existing risk mitigation measures remain effective over time.

24
Identifying and Assessing Risk

25
Identifying and Assessing Risk

26
Assessing and Controlling Risk

Assessing and controlling risk is a critical aspect of managing information

security effectively. Once risks have been identified and assessed, organizations

need to implement strategies to mitigate, transfer, or accept these risks based on

their severity and potential impact. Here's how organizations typically assess and

control risk in the context of information security:

27
Assessing and Controlling Risk

Risk Assessment

Three different types of Risk Assessments are as follows

 Quantitative Analysis

 Qualitative Analysis

 Threat Modeling

28
Assessing and Controlling Risk
Quantitative Analysis

Involves assigning numerical values to the likelihood and impact of

identified risks. This can be done using various mathematical models and metrics to

calculate the potential financial impact of a security breach.

Qualitative Analysis

Involves assessing risks based on subjective criteria such as likelihood,

impact, and severity. This method often uses risk matrices or risk scoring systems

to prioritize risks based on predefined criteria.

29
Assessing and Controlling Risk

Threat Modeling

A systematic approach to identifying and analyzing potential threats to a

system or application. Threat modeling helps in understanding attack vectors and

designing appropriate security controls.

30
Assessing and Controlling Risk

Risk Controls

Four different types of Risk Assessments are as follows

 Preventive Controls

 Detective Controls

 Corrective Controls

 Compensating Controls

31
Assessing and Controlling Risk
Preventive Controls

Aimed at preventing security incidents from occurring. These controls

include measures such as access controls, encryption, firewalls, intrusion detection

systems, and security awareness training.

Detective Controls

Focus on detecting security incidents that have occurred. Examples

include security monitoring, log analysis, intrusion detection systems, and security

incident response procedures.

32
Assessing and Controlling Risk
Corrective Controls

Aimed at responding to and mitigating the impact of security incidents.

These controls include incident response plans, data backup and recovery

procedures, and system restoration processes.

Compensating Controls

Implemented to provide an alternative or additional layer of security when

primary controls are not feasible or effective. Compensating controls are often used

to address specific risks that cannot be fully mitigated by other controls.

33
Assessing and Controlling Risk

Risk Treatment Strategies

Four different types of Risk Treatment Strategies are as follows

 Risk Avoidance

 Risk Reduction

 Risk Transfer

 Risk Acceptance

34
Assessing and Controlling Risk

Risk Avoidance

Involves avoiding activities or situations that could potentially lead to

security risks. For example, avoiding the use of certain technologies or

discontinuing high-risk business activities.

Risk Transfer

Involves transferring the financial impact of a risk to a third party,

typically through insurance or contractual agreements.

35
Assessing and Controlling Risk

Risk Reduction

Involves implementing measures to reduce the likelihood or impact of

identified risks. This may include implementing security controls, conducting

security training and awareness programs, and regularly updating software and

systems.

36
Assessing and Controlling Risk

Risk Acceptance

Involves acknowledging the existence of a risk and accepting the potential

consequences without implementing additional risk mitigation measures. This

approach is typically taken for risks with low likelihood and impact or when the

cost of mitigation outweighs the potential loss.

37
Assessing and Controlling Risk

Monitoring and Review

 Once risk controls are implemented, organizations need to continuously monitor

and review their effectiveness. This includes regular security assessments,

vulnerability scanning, penetration testing, and security incident response

exercises.

 Monitoring helps in identifying emerging risks, detecting security incidents, and

ensuring that controls remain effective over time.

38
Assessing and Controlling Risk

By assessing risks and implementing appropriate controls and treatment

strategies, organizations can effectively manage information security risks and

reduce the likelihood and impact of security incidents. However, it's essential to

continuously monitor and review the effectiveness of these measures to adapt to

evolving threats and vulnerabilities.

39
Assessing and Controlling Risk

40
Assessing and Controlling Risk

41
Assessing and Controlling Risk

42
Assessing and Controlling Risk

43
Systems: Access Control Mechanisms

Access control mechanisms play a critical role in risk management by

ensuring that only authorized individuals or systems can access resources, thereby

reducing the likelihood of unauthorized access, data breaches, and other security

incidents. These mechanisms help organizations enforce security policies and

mitigate various risks associated with unauthorized access. Here are some

common access control mechanisms used in risk management:

44
Systems: Access Control Mechanisms

Authentication

Authentication is the process of verifying the identity of users or systems

attempting to access resources. This can be achieved through various methods

such as passwords, biometrics (fingerprint, iris, etc.), security tokens, smart cards,

or multi-factor authentication (MFA) which combines two or more authentication

factors for added security.

45
Systems: Access Control Mechanisms

Authorization

Authorization determines what actions an authenticated user or system is

permitted to perform on a resource. Access control lists (ACLs), role-based access

control (RBAC), and attribute-based access control (ABAC) are common

authorization mechanisms used to define and enforce access rights based on user

roles, attributes, or specific conditions.

46
Systems: Access Control Mechanisms

Encryption

Encryption is the process of encoding data in a way that only authorized

parties can access it. By encrypting sensitive data at rest (stored data) and in transit

(data being transmitted over a network), organizations can mitigate the risk of

unauthorized access even if the data is compromised.

47
Systems: Access Control Mechanisms

Access Control Lists (ACLs)

ACLs are lists of permissions attached to an object that specify which

users or systems are granted access rights to that object and what operations they

can perform. ACLs are commonly used in file systems, network devices, and

databases to control access at a granular level.

48
Systems: Access Control Mechanisms

Firewalls and Network Segmentation

Firewalls are security devices or software that monitor and control

incoming and outgoing network traffic based on predetermined security rules.

Network segmentation involves dividing a network into smaller, isolated segments

to restrict unauthorized access and limit the potential impact of security breaches.

49
Systems: Access Control Mechanisms

Intrusion Detection and Prevention Systems (IDPS)

IDPS monitor network traffic for signs of malicious activity or policy

violations and can automatically take action to block or mitigate threats. They help

detect and prevent unauthorized access attempts, data breaches, and other security

incidents in real-time.

50
Systems: Access Control Mechanisms

Identity and Access Management (IAM)

IAM systems centralize the management of user identities, credentials,

and access rights across an organization's IT infrastructure. IAM solutions help

streamline access control processes, enforce security policies, and ensure

compliance with regulatory requirements.

51
Systems: Access Control Mechanisms

Physical Access Controls

Physical access controls include measures such as locks, access cards,

biometric scanners, and surveillance systems to regulate access to physical

facilities, equipment, and resources. These controls help prevent unauthorized

individuals from physically accessing sensitive areas or assets.

52
Systems: Access Control Mechanisms

By implementing and effectively managing these access control

mechanisms, organizations can reduce the likelihood and impact of security

breaches, data leaks, and other risks associated with unauthorized access to

resources. Additionally, regular monitoring, updates, and audits are essential to

ensure the ongoing effectiveness of access controls in mitigating risks.

53
Systems: Access Control Mechanisms

54
Systems: Access Control Mechanisms

55
Systems: Access Control Mechanisms

56
Information Flow

Information flow in risk management refers to the process of collecting,

analyzing, communicating, and acting upon information related to potential risks

faced by an organization. Effective information flow is crucial for identifying,

assessing, and mitigating risks in a timely manner. Here's how information flows

within the context of risk management:

57
Information Flow

Data Collection

The first step in managing risks is to collect relevant data from various

sources within the organization and from external sources such as industry reports,

regulatory bodies, and threat intelligence feeds. This data may include information

about assets, vulnerabilities, threats, controls, incidents, and business processes.

58
Information Flow

Risk Identification

Once data is collected, it is analyzed to identify potential risks that could

impact the organization's objectives. This involves systematically assessing the

likelihood and potential impact of various threats and vulnerabilities on the

organization's assets, operations, and goals.

59
Information Flow

Risk Assessment

Risk assessment involves evaluating the identified risks based on their

severity, likelihood, and potential impact. This may include using risk assessment

methodologies such as qualitative risk analysis, quantitative risk analysis, or a

combination of both to prioritize risks and determine the appropriate level of

response.

60
Information Flow

Risk Treatment

After assessing risks, organizations develop and implement risk treatment

plans to mitigate, transfer, accept, or avoid the identified risks. This involves

implementing controls and measures to reduce the likelihood and impact of risks

to an acceptable level while considering cost, resources, and other constraints.

61
Information Flow

Monitoring and Review

Risk management is an ongoing process, and organizations need to

continuously monitor and review the effectiveness of their risk management

efforts. This includes monitoring changes in the risk landscape, assessing the

effectiveness of implemented controls, and updating risk management strategies as

needed.

62
Information Flow

Communication

Effective communication is essential for ensuring that relevant

stakeholders are informed about the organization's risk management activities.

This includes communicating risk assessment findings, risk treatment plans, and

other relevant information to decision-makers, employees, partners, regulators,

and other stakeholders.

63
Information Flow

Reporting

Organizations need to report on their risk management activities to

internal and external stakeholders, including management, board of directors,

regulatory authorities, and shareholders. This includes providing regular updates

on the organization's risk profile, risk treatment progress, and any significant

changes in the risk landscape.

64
Information Flow

Learning and Improvement

Lastly, organizations should foster a culture of continuous learning and

improvement by capturing lessons learned from past risk management activities

and using them to enhance future risk management efforts. This includes

analyzing past incidents and near misses, identifying root causes, and

implementing corrective actions to prevent recurrence.

65
Information Flow

66
Confinement Problem

The "confinement problem" in information security refers to the

challenge of ensuring that a program or process can only access resources and

perform operations that it is authorized to perform, while preventing it from

accessing unauthorized resources or performing unauthorized operations. This

problem is particularly relevant in multi-user or multi-process environments, such

as operating systems and networked systems, where multiple entities with

different levels of privilege interact.

67
Confinement Problem

The confinement problem is critical in ensuring the security and integrity

of systems and data. Failure to adequately confine processes can lead to various

security vulnerabilities, including unauthorized access to sensitive information,

data leakage, privilege escalation, and exploitation of system vulnerabilities by

malicious actors.

68
Confinement Problem
There are several approaches to addressing the confinement problem in

information security:

Access Control Mechanisms

Access control mechanisms, such as access control lists (ACLs), role-

based access control (RBAC), and mandatory access control (MAC), are used to

enforce policies that specify which users or processes are authorized to access

specific resources and perform certain operations. These mechanisms help restrict

access based on user identities, roles, or other attributes.

69
Confinement Problem

Privilege Separation

Privilege separation involves dividing system components or processes

into separate entities with different levels of privilege. By running processes with

minimal privileges necessary to perform their tasks, privilege separation reduces

the potential impact of security breaches and limits the ability of attackers to

exploit vulnerabilities.

70
Confinement Problem

Sandboxing

Sandboxing involves isolating untrusted or potentially malicious

processes in a restricted environment, known as a sandbox, where they can be

safely executed without posing a risk to the rest of the system. Sandboxing

techniques include containerization, virtualization, and application sandboxing,

which restrict the resources and system calls available to sandboxed processes.

71
Confinement Problem

Code and Data Validation

Validating code and data inputs can help prevent unauthorized access

and exploitation of vulnerabilities. Techniques such as input validation, data

sanitization, and code signing can help ensure that only trusted and properly

formatted data and code are processed, reducing the risk of security breaches.

72
Confinement Problem

Secure Development Practices

Incorporating secure development practices, such as secure coding

guidelines, code reviews, and vulnerability assessments, can help mitigate the risk

of security vulnerabilities that could be exploited to bypass confinement

mechanisms. By designing and implementing secure software, developers can

reduce the likelihood of unauthorized access and privilege escalation.

73
Confinement Problem

Monitoring and Auditing

Monitoring and auditing systems can help detect and mitigate security

breaches by monitoring system activity, logging relevant events, and alerting

administrators to suspicious behavior. By analyzing logs and audit trails,

organizations can identify unauthorized access attempts and take appropriate

action to address security incidents.

74
Confinement Problem

Addressing the confinement problem requires a multi-faceted approach

that combines technical controls, secure development practices, and ongoing

monitoring and auditing to ensure that systems and data are adequately protected

from unauthorized access and misuse.

75
Confinement Problem in Risk Analysis

76

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy