|
|
|
|
Lesson#30
|
Threat Identification
|
|
|
|
Threat Identification
“A threat is some action or event that can lead to a loss.”
Various types of threats may exist that could, if they occur
result in information assets being exposed,
removed either temporarily or permanently, lost, damaged,
destroyed, or used for un-authorized purposes
are identified. Susceptibility to threats, whether logical or
physical are a major risk factor for the data base
and information system of an organization. These risks are to be
identified and steps that include physical
and logical controls need to be instituted and monitored on a
regular basis. Security measures can be
designed only if we know what kind of threats or risks are to be
guarded against. Obviously, we would also
have to determine the frequency of the known and the unknown
risks or threats.
Threats and risks are usually used synonymously. These are
always there and cannot be avoided but should
be managed to minimize losses and maximize returns. Each level
of management and each operational
area perceives risk differently and communicates these
perceptions in different terms.
29.1 Types of Threats
•
Physical threat
– This refers to the damage caused to
the physical infrastructure of the information
systems, e.g.
•
Fire
•
Water
•
Energy Variations
•
Structural damage
•
Pollution
•
Intrusion
•
Logical
– This refers to damage caused to the
software and data without physical presence.
•
Viruses and worms
•
Logical intrusion
Likelihood of occurrence of Threat:
Having identified the threats, they need to be ranked on the
basis of their probability of occurrence.
Sometimes analysis on occurrence of threat is easily available.
For example, the insurance company might
be having a study of occurrence of fire incidents in a city for
the purposes of fire insurance; however, the
extent of threat resulting from a new virus may not yet have
been identified or become known to the users,
etc. In such a situation where no past data or reliable source
of probability occurrence is available, users can
be asked to give the best estimate of how frequently the threat
is possible to occur. Usually, higher the value
of the information asset identified, higher are the chances for
it being susceptible to vulnerability, for
example, an ERP software built up to a high integration level,
may need to be provided with high level of
security against potential threats.
29.2 Control Analysis
The goal of this step is to analyze the controls that have been
implemented or are planned for
implementation by the organizations to minimize or eliminate the
likelihood of occurrence of threat. To
derive an overall likelihood rating that indicates the
probability that a potential vulnerability may be
exercised within the construct of the associated threat
environment. Security controls encompass the use of
134
technical and non-technical methods. Technical methods are
safeguards that are incorporated into
computer hardware, software and firmware such as controls
mechanisms, identification and authentication
mechanisms, encryption methods, intrusion detection software,
etc. Non technical controls are management
and operational controls such as security policies and
operational procedures and personnel, physical and
environmental security. The control categories for both
technical and non technical control methods can be
further classified as either preventive or detective. These two
sub-categories are explained as follows
•
Preventive controls
inhibit attempts to violate security policy and include controls as access
control
enforcement, encryption and authentication
•
Detective controls warn
of violations or attempted violations of security policy which include such
controls as audit trails, intrusion detection methods.
Likelihood Determination
To derive an overall likelihood rating that indicates the
probability that a potential value may be exercised
within the construct of the associated threat environment, the
following governing factors must be
considered.
o
Threat-source motivation
and capability
o
Nature of the
vulnerability
o
Existence of
effectiveness of current controls
29.3 Impact analysis
The next major step in measuring level of risk is to determine
the adverse impact resulting into a successful
exercise of vulnerability. Before beginning the impact analysis,
it is necessary to obtain the following
necessary information.
•
System mission
•
System and data
criticality
•
System and data
sensitivity
The information can be obtained from existing organizational
documentation, such as the mission impact
analysis report or asset criticality assessment report. A
business impact analysis report or asset criticality
assessment report. The adverse impact of a security event can be
described in terms of loss or delay of
any or all of the three security goals.
•
Loss of integrity:
System and data integrity refers to the requirement that information should be
protected from improper modification. Integrity is lost if
unauthorized changes are made to the
data or IT system by either intentional or accidental loss of
system or data. Violation of integrity
may be the first step in a successful attack against
availability or confidentiality. For all these
reasons, loss of integrity reduces assurance of an IT system.
•
Loss of availability: If
a mission-critical IT system is unavailable to its end user, the organization’s
missions may be affected. Loss of system functionality and
operational effectiveness.
•
Loss of confidentiality:
System and data confidentiality refers to the protection of information from
unauthorized disclosure. The impact of unauthorized disclosure
of confidential information can
range from the jeopardizing of national security. Unauthorized,
unanticipated, or unintentional
disclosure could result in loss of public confidence
embarrassment or legal action against the
organization.
29.4 Risk Determination/Exposure Analysis
This phase relates to analyzing how much the information assets
are exposed to various threats identified
and thus quantifying the loss caused to the asset through this
threat. This phase relates to analysis of both
physical and logical threats and comprises of four steps. Four
steps are usually followed while analyzing the
135
exposure.
•
Figure out whether there
are any physical or logical controls in place
•
Employees are
interviewed
•
Walk trough’s are
conducted
•
How reliable are these
controls
•
Check whether the
firewall stops a virus from entering the organization’s system
•
Check whether the
antivirus installed stops the virus from execution
•
We cannot start an
earthquake to see if the building can absorb shocks or not
•
What is the probability
that occurrence of threat can be successful against these controls
•
Compare assets
identified with threats identified to see if controls exists
•
Estimate the probability
of occurrence based on past experience and future
apprehensions/expectations
•
How much loss can occur
due to the threat being successful
•
scenarios are written to
see how an identified potential threat can compromise control
Risk identification is often confused with risk mitigation. Risk
mitigation is a process that takes place after
the process of risk assessment has been completed. Let’s take a
look at various risk mitigation options.
•
Risk assumption: To
accept the potential risk and continue operating the IT system or to
implement controls to lower the risk to an acceptable level.
•
Risk Avoidance: To avoid
the risk by eliminating the risk cause and e.g. forgo certain functions of
the system or shut down the system when risks are identified.
•
Risk Limitation: To
limit the risk by implementing controls that minimize the adverse impact of a
threat’s exercising a vulnerability e.g. use of supporting
preventive and detective controls.
•
Risk Planning: To manage
risk by developing a risk mitigation plant that predicts implements and
maintains controls.
•
Research and
acknowledgement: To lower the risk of loss by acknowledging vulnerability or
flaw
and researching controls to correct the vulnerability.
•
Risk Transference: To
transfer the risk by using other options to compensate loss such as
purchasing insurance.
29.5 Occurrence of threat
When a threat occurs, there can be following consequences.
1. Controls against the threat exists
•
Controls can help stop
the occurrence of the threat.
•
Threat occurs but damage
is avoided by the controls
•
Threat circumvents
controls and causes damage
2. Controls against threat do not exist.
•
Threat has not yet been
identified
•
Threat has been
identified but the consequent loss is considered as minor
•
Threat occurs, whether
identified or not and causes damage to the system.
136
Threat can cause damage whether controls exist or not.
Cumulative amount of loss can be a major threat to the system.
There is no international standard on
acceptable level of losses. Materiality of every loss, howsoever
determined by management must be written
and backed up by the approval of those who are in charge of the
IT Governance. Review of these matters
will be undertaken when a security audit is done in order to
ascertain the comfort level the can draw from
the security policy of the organization.
29.6 Computing Expected Loss
In fourth step of the exposure analysis, the amount of expected
loss is computed through following formula
A = B x C x D
1. A = Expected Loss
2. B = Chances (in %) of threat occurrence
3. C = Chances (in %) of Threat being successful
4. D = Loss which can occur once the threat is successful
Control Adjustment
This phase involves determining whether any controls can be
designed, implemented, operated. The cost of
devising controls should not exceed the expected potential
benefit being en-cashed and the potential loss
being avoided. The controls that could mitigate or eliminate the
identified risk appropriate to the
organization’s operations are provided. The goal of the
recommended controls is to reduce the level of risk
to the IT system and its data to an acceptable level. Following
factors should be considered in
recommending controls and alternative solutions to minimize or
eliminate identified risks.
•
Effectiveness of
recommended options
•
Legislation and
regulation
•
Organizational policy
•
Operational Impact
•
Safety and reliability
The control recommendations are the results of the risk
assessment process and provide the risk mitigation
process during which the recommended procedural and technical
security controls are evaluated, prioritized
and implemented.
It should be noted that not all possible recommended controls
can be implemented to reach and to
determine which ones are required and appropriate for a specific
organization, a cost analysis, should be
conducted for the proposed recommendations of controls to
demonstrate that the costs of implementing
the controls can be justified by the reduction in the level of
risk. In addition, the operational impact and
feasibility of introducing recommended option should be
evaluated carefully during the risk mitigation
process.
The above decision takes into account consideration of following
factors:
5. Personal judgment of the situation
6. Any information gained on desired/non-existing controls
during the previous phases
7. Seek demands of users for an ideal control environment.
Existing controls should not be totally discarded while
adjusting controls. They can either be terminated
totally, due to the threats not being there any more or
existence of better controls or modification for
betterment, this phase should consider the security to be cost
effective, and integrated. |
|
|
|
|