Step by-step for risk analysis and management-yaser aljohani

41
Lewis University Information Security Practicum Step-by-Step of Conducting Risk Analysis and Management to Digital Zone Corporation Spring 2013 Student’s name: Yaser Aljohani Instructor’s name: Dr. Faisal Abdullah 1

Transcript of Step by-step for risk analysis and management-yaser aljohani

Page 1: Step by-step for risk analysis and management-yaser aljohani

Lewis University

Information Security Practicum

Step-by-Step of Conducting Risk Analysis and

Management to Digital Zone Corporation

Spring 2013

Student’s name: Yaser Aljohani

Instructor’s name: Dr. Faisal Abdullah

1

Page 2: Step by-step for risk analysis and management-yaser aljohani

Introduction of Risk Analysis and Management

• Risk analysis and management is a very significant part

to any organization that wants to have a secure

computing environment.

• It helps organizations to improve their security against

any threats or risks that could harm their sensitive

information, assets, and business.

2

Page 3: Step by-step for risk analysis and management-yaser aljohani

Digital Zone Corporation

• It is an organization for computer & digital services

• It provides different kinds of IT services to their customers

such as, computer repair, computer upgrade,

wireless/wired network setup for home or business,

troubleshooting, and establish web site.

• To provide services to their customer, they collect

customer information such as, first name, last name,

phone number, home address, and email address,

and store them in their system.

3

Page 4: Step by-step for risk analysis and management-yaser aljohani

Goals and objectives

• Assets evaluation and their values: number of servers,

computers, networks…etc.

• Using risk assessment tools and security checklist

• Finding all vulnerabilities

• Finding all threats

• Finding all risks

4

Page 5: Step by-step for risk analysis and management-yaser aljohani

Goals and objectives Cont.

• Finding top 5 risks

• Finding all mitigations or remedies for risks and all

suggestions and recommendations

• Establishing Information Risk Management (IRM) policy

• Establishing security awareness program for both

employees and customers

• Establishing Insurance and contingency plan or recovery

plan

5

Page 6: Step by-step for risk analysis and management-yaser aljohani

What is Risk Analysis?

• Risk analysis is the process of analyzing and defining

the dangers to businesses, individuals, and government

agencies posed by potential natural and human-caused

adverse events.

• In IT, the report of risk analysis can be used to align

company's business objectives with technology-related

objectives.

• The report of risk analysis can be either qualitative or

quantitative.

6

Page 7: Step by-step for risk analysis and management-yaser aljohani

What is the difference between Risk analysis

and Risk management?

• Risk analysis includes assess and identifying the levels of

risks estimated from the known values of assets,

vulnerabilities of assets, and the levels of threats.

• Risk management includes selecting, identifying, and

adopting of countermeasures that is justified by the identified

risks to assets and the mitigation of risks to the acceptable

level.

7

Page 8: Step by-step for risk analysis and management-yaser aljohani

Why we use it and When?

• We used Risk Analysis because it helps us understand

risk, so that we can manage it, and minimize its

disruption.

• We used risk analysis when we plan projects,

improving safety and managing potential risks in the

workplace, preparing for events such as theft,

equipment or technology failure, natural disasters, or

planning for changes in our environment.

8

Page 9: Step by-step for risk analysis and management-yaser aljohani

Where we use it and how?

• We can use risk analysis in any place that have assets

such as computers, servers, networks, sensitive

information…. etc.

• We use the Risk Analysis for many different Components

such as, assets, threats, vulnerabilities, likelihoods,

impacts, and safeguards

9

Page 10: Step by-step for risk analysis and management-yaser aljohani

How to Calculate the Risk?

• Two kinds of risk assessment: Quantitative risk assessment and Qualitative risk assessments.

• Quantitative risk assessment draws upon methodologies used by financial institutions and insurance companies and it considered as the standard way of measuring risk in many fields.

• Qualitative risk assessments assume that there is already a great degree of uncertainty in the likelihood and impact values and defines them, and thus risk, in somewhat subjective or qualitative terms and it gives risk results of “High”, “Moderate” and “Low”.

10

Page 11: Step by-step for risk analysis and management-yaser aljohani

Steps for Risk analysis and management

1. Systems inventory : identify all the assets that are

involved in critical business processes support.

2. Threat analysis: identify the potential threats to the

critical systems

3. Infrastructure vulnerability assessment: identify

technology vulnerabilities that could be exploited.

11

Page 12: Step by-step for risk analysis and management-yaser aljohani

Steps for Risk analysis and management

Cont.

4. Develop the security control suggestions: link the

risk management strategy recommendations to the

results of the assessment.

5. Decision: act or accept (Risk management decision)

6. Monitoring and communication: management and

user support are important to make the control

implementation successfully.

12

Page 13: Step by-step for risk analysis and management-yaser aljohani

Risk, Threats, and Vulnerabilities

• Risk is the possible damage that could result from some current or future process/event .

• Threats are defined as any act that could assist to the tampering, damaging or denial of service.

• Examples of threats: Floods, Fire, Natural Disasters, Heat, Freezing, Manmade threats, Malware, Virus, Worms, Trojans, and Spyware

• Vulnerability is any weakness or flaw in the design, procedures of system security, internal controls, or implementation that can be used and result in violation of the system’s security policy or a security breach.

13

Page 14: Step by-step for risk analysis and management-yaser aljohani

Threats elements

Three critical elements of threat:

1. The profile of threat- what threats and risks that could

affect the asset?

2. The probability of threat- what is the threats

occurrence likelihood?

3. The consequence of Threat- what would the loss of the

asset effect or impact on the organization operations or

its employees?

14

Page 15: Step by-step for risk analysis and management-yaser aljohani

The Information Risk Management

(IRM) policy

• It explains the role of security and the acceptable level of

risk

• It should address the following issues:

• The IRM team Objectives

• What is considered as an acceptable risk

• the formal processes of risk identification

15

Page 16: Step by-step for risk analysis and management-yaser aljohani

The Information Risk Management

(IRM) policy Cont.

• The connection between the organization's strategic planning processes and the IRM policy

• It’s roles and responsibilities

• Mapping of risk to the internal controls

• Mapping of risks to budgets and performance objectives

• Key indicators to monitor the effectiveness of controls

• The approach that would change resource allocation and staff behaviors in response to risk assessment

16

Page 17: Step by-step for risk analysis and management-yaser aljohani

Security Checklists

• There are security checklists in many different components such as, networks, computers, servers, switches, firewall, routers, copiers, workstations, scanners…etc.

• Each one of these components provide recommendations that could help security specialists to find out all vulnerabilities and threats that could happen to system.

• by applying all these suggested recommendations, this will reduce and mitigate all risks that could results from threats.

17

Page 18: Step by-step for risk analysis and management-yaser aljohani

Contingency plan

1. Disaster recovery plan: It relates with the recovery that will occur on-site.(long- term service interruption)

2. Incident response plan: includes recovering from an incident, identifying, and responding .(short-term events).

3. Business continuity plan: It relates with the long-term incidents that require the organization to do the recovery to the off-site locations. (long- term service interruption)

18

Page 19: Step by-step for risk analysis and management-yaser aljohani

Security Assurance Program

• It helps both of employees and customers to understand

risks and the consequences of risks and how they

could avoid them.

• It gives guidelines and instructions for many different

elements such as, E-mail security, username and

password security, acceptable use of technology, mobile

devices, staying safe and secure online, remote access,

network, and sensitive information.

• It helps for reducing the probability of risks occurrence

19

Page 20: Step by-step for risk analysis and management-yaser aljohani

Cycle of Risk Management

• The U.S government Accounting Office has recommended for organizations a cycle of risk management activities for managing their information security risks which are as follows:

1. Conducting risk assessments for all their systems

2. Establishing information security policies and procedures that are commensurate with risk and that comprehensively address significant threats

3. Providing sufficient computer security training to their employees

20

Page 21: Step by-step for risk analysis and management-yaser aljohani

Cycle of Risk Management Cont.

4. Testing and evaluating controls as part of their

management assessments

5. Implementing documented incident handling procedures

6. Identifying and prioritizing their critical operations and

assets and determine the priority for restoring these

assets should a disruption in critical operations occur

21

Page 22: Step by-step for risk analysis and management-yaser aljohani

Advantages of Risk Analysis

and Management

• It builds strong IT infrastructure in organization

• It increases the confidence between organization and

customers

• It builds a good communication between management, IT

department, and end users.

• Customers will have a good quality of services.

• It will increase profits of organization

• Organization will have an Information Risk management (IRM)

policy, Security Assurance Program, and Contingency plan.

22

Page 23: Step by-step for risk analysis and management-yaser aljohani

Security Assessment Methodologies and

tools

23

Nessus SAINT OCTAVE FRAP

Practical Threat Analysis (PTA) Sara NIST COBRA

Microsoft Baseline Security

Analyzer

Risk Watch Whisker

Page 24: Step by-step for risk analysis and management-yaser aljohani

PTA- Assets

24

Page 25: Step by-step for risk analysis and management-yaser aljohani

PTA-Vulnerabilities

25

Page 26: Step by-step for risk analysis and management-yaser aljohani

PTA-Threats

26

Page 27: Step by-step for risk analysis and management-yaser aljohani

PTA-Countermeasures

27

Page 28: Step by-step for risk analysis and management-yaser aljohani

PTA-Results

28

Page 29: Step by-step for risk analysis and management-yaser aljohani

NESSUS

29

Page 30: Step by-step for risk analysis and management-yaser aljohani

Nessus-Scan list

30

Page 31: Step by-step for risk analysis and management-yaser aljohani

Nessus-Vulnerabilities

Summary

31

Page 32: Step by-step for risk analysis and management-yaser aljohani

Nessus-Host Summary

32

Page 33: Step by-step for risk analysis and management-yaser aljohani

Nessus-Filters options

33

Page 34: Step by-step for risk analysis and management-yaser aljohani

Nessus- Result after filters

34

Page 35: Step by-step for risk analysis and management-yaser aljohani

Nessus- Description of Vulnerability

35

Page 36: Step by-step for risk analysis and management-yaser aljohani

Baseline Security Analyzer

36

Page 37: Step by-step for risk analysis and management-yaser aljohani

Adjusting settings of scan

37

Page 38: Step by-step for risk analysis and management-yaser aljohani

Scanning process

38

Page 39: Step by-step for risk analysis and management-yaser aljohani

Result after Scan

39

Page 40: Step by-step for risk analysis and management-yaser aljohani

Conclusion

• There are three critical elements that should be considered in the

risk analysis and management, which are, information

confidentiality, system availability, and information integrity.

40

Page 41: Step by-step for risk analysis and management-yaser aljohani

Thank you

41