The CIA triad
Confidentiality:Protection of organizational data from unauthorize disclosure
Integrity: Assurance that data have not been altered (i.e., that data hasn’t lost its accuracy or validity)
Availability: Protection against disruption, destruction and disasters (also referred to as business continuity)
Security Threats Types:
– Threats to business continuity: Disruption, destruction and disaster
* Loss or reduction in network service caused by viruses, hardware/software malfunctioning, natural or manmade disasters, etc.
* Can lead to destruction of data
– Threats to confidentiality: unauthorized access (i.e., intrusion by hackers [from outside the organization] or rogue employees [from inside the organization])
Controls are mechanisms that reduce/eliminate security threats and categorized as:
– Preventive controls stop a threat from occurring (Ex: passwords)
– Detective controls reveal unwanted events (Ex: auditing software)
– Corrective controls rectify an unwanted event (Ex: restoring an IS after a fire)
**“Security in layers” **means all three types of control should be combined in order to 1) prevent unwanted events from happing, 2) detect them when they couldn’t be prevented and 3) recover from them when the “damage is done”
Risk Assessment
Three common risk assessment frameworks (or methods):
– Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE)
– Control Objectives for Information and Related Technology (COBIT)
– Risk Management Guide for Information Technology Systems (NIST guide)
Risk Assessment steps
Develop Risk Measurement Criteria
Context: Security must first focus on IT assets with highest risk score
– A definition: Risk = Exposure to danger
– Risk Score = Priority (or likelihood) score X Impact score (“all relative”, see Slide #10)
To calculate Impact score, business managers assess how risk impacts the organization:
– They consider 4 key impact areas (see table below)
– They prioritize each impact area: 3 levels (see table below)
– They operationalize (i.e., measure the effect of) each impact level by area
Step 2: Inventory IT assets
* IT managers and Business managers must:
– Identify all organization’s IT assets (Fig. 11-2: Type of assets)
– Document and rank the importance of each asset for the organization:
* Note:Mission-criticalapplicationsanddataarethemostimportant
* Ranking must be based on answer to questions such as “what happens if
this IT asset’s C or I or A were compromised?
Illustration: Fig. 11-3 summarizes for each IT asset: – Its description and owner(s)
– Its importance (High, Medium, Low)
– Applicable security requirements (CIA)
Step 3: Identify Threats
Step 4: Document existing controls
Step 5: Identify improvements
Key controls for business continuity
Key Controls for intrusion Protection
Best practice recommendations