Make personal reflections in your answer on:
a) It is not difficult to intercept wireless signals and, depending on the protocol, extract security information. An on-going court case against Google is deciding whether it is an invasion of privacy for Google Streetview cars to collect wireless password data along with video data for extending Google maps. What is your opinion?
b) The Story of Send (https://www.youtube.com/watch?v=5Be2YnlRIg8 ) is an animation showing the path a Google Mail message, from your home or company, through a Google data centre, and then to the intended recipient (please notice how Google is promoting their “greenness”). Could you recommend Google Mail for secure and private corporate communication?
c) “When an organization makes decisions using a developed security mind, it separates itself from the struggles and costs commonly associated with information security” (Day 2003, p. 284). Do you agree or disagree with this statement? Why or why not?
These are important concepts that you must fully understand. Make some personal reflections in your answer on the following:
http://msnbcmedia.msn.com/i/MSNBC/Components/Photo/2009/December/091202/091203-engel-big-9a.jpg
Watch this video: http://youtu.be/RW9hOBCSy0g
Discuss the following points:
a) Why is it important for management to show ‘due diligence’ during the decision-making process, and how can risk management help with this? Donn Parker, a veteran security practitioner, believes that due diligence is sufficient to support informed security decision-making and that risk management is unnecessary, and largely without merit. Mr. Parker presents his case in the video you just viewed, or you can read a more precise written summary of his case. https://dl.dropboxusercontent.com/u/46696310/ITC596%20References/mod%206/2008%20Don%20Parker%2C%20Due%20Diligence%20based%20security%2C%20ISSA.pdf
b) Mr. Parker mentions that the main driver for security nowadays is compliance, such as PCI DSS for secure credit card payments, while other laws, particularly in the US, carry possible legal penalties. Mr. Parker would argue that the threat of going to jail is more of a motivation for executives to support better security initiatives as compared to a well-argued risk assessment. Would you agree with Mr. Parker, and do you think the executives of a company might do time behind bars for IT security breaches?
c) The reading from Blakely, McDermott and Geer stated that in IT Risk analysis we need to learn more from risk techniques in other domains outside of security. Consider the example here on page 58 of this engineering risk paper (https://dl.dropboxusercontent.com/u/46696310/ITC596%20References/mod%206/16122769-A-Risk-Analysis-of-Risk-Analysis.pdf) which gives an analysis of how high to build a levee (small dam) to prevent flooding damage to a given area of land. The higher the dam, the less likely that there will be a flood.
However the initial and ongoing costs are more for a higher dam. Given all the costs and data on rainfall patterns, there is an optimal or best dam height as shown in the example. Can you see an analogy with malware defences, and a possible path to determine an optimal amount of protection?
d) The notion of recurrence intervals is important in natural disaster planning, particularly for insurance companies. The severe flooding in Brisbane, Australia in 2011 was described as a 1-in-30 year flood. What would you say is the recurrence interval for a major security incident (say a worm breakout) in your company?
Quantitative risk management involves assigning a probability to the chances of an attack as well as determining how much damage a successful attack is likely to cause. This topic explores the fundamentals of this approach, which is based on the ALE (Average Loss Expectancy) formula. We also look at another important quantitative measure: ROSI (Return on Security Investment). A positive ROSI indicates that a security investment is justified from a financial standpoint, and can be used to convince management to fund a security solution.
Read
Commentary: Absolute and Relative ROSI
Make sure you’re aware of the distinction between the different ROSI calculations that appear in the readings. We might call these the absolute ROSI and the relative ROSI. Assume the following scenario (similar to that which appears in Reading 7 under the heading ‘ROSI Example’):
“You have been asked to protect a small database that contains critical business data. This data is valued at $2 million and has never been compromised. Based on recent events in similar companies with this type of server and data, you determine that such an attack will occur once every ten years. Further, you determine that if such an attack occurs, about 70% of the data in the database will be destroyed. The current access controls in place on this database cost the company $15,000 per year. What is the ROSI on these controls?”
This scenario is absolute because we have no previous data to compare with. Hence, we use the straightforward ROSI formula of Annual Loss Expectancy (ALE) – Current Cost of Control (CCC) = ROSI
In this case:
SLE = Exposure Factor (EF) * Asset Value (AV) = 0.70 * $2,000,000 = $1,400,000
ALE = Single Loss Expectancy (SLE) * Annualized Rate of Occurrence (ARO) = $1,400,000 * 0.1 = $140,000
ROSI = ALE – CCC = $140,000 – $15,000 = $125,000
There is a flaw with this method, however. Assume the ALE in this case is higher (i.e., we expect to lose more data annually from this type of threat) – adding up the numbers, we get a higher ROSI even though the control might be ineffective! However, if the data is available, we can use a ‘before and after’ approach to calculating the ROSI. Let’s take Endorf’s example about the IDS that appears in Reading 8.
Original ALE (without the IDS control) = $500,000
IDS costs the company $250,000 per year.
The IDS is 80% effective, which reduces the original ALE to $500,000 * .80 = $100,000
This means the IDS has saved us $400,000 a year.
The relative ROSI is found via the following formula (see Reading 9) Savings – Mitigation Cost = ROSI
Hence, $400,000 – $250,000 = $150,000
When looking at the bigger picture, this makes sense. If our IDS costs $250,000 per year but has helped save $400,000 per year then we are better off to the tune of $150,000 annually.
Scenario-based Exercise
This is another area that is critical that you understand. Work through this problem to make sure that you understand the principles and the process:
You have been asked to protect a small database that contains critical business data. This data is valued at $2 million and has never been compromised. Based on recent events in similar companies with this type of server and data, you determine that such an attack will occur once every ten years. Further, you determine that if such an attack occurs, about 70% of the data in the database will be destroyed. What is the ALE for this scenario?
Qualitative risk assessment relies more on observational, subjective data rather than hard facts. There are many advantages to this approach. ‘Hard numbers’ are often difficult to come by when assessing security threats. One reason for this is that so many firms are reluctant to report security breaches – thus the real chances of being attacked tend to be underestimated. Qualitative assessment, in contrast, allows a more ‘seat of the pants’ approach. In this topic, we examine several well known methods of conducting a qualitative risk assessment. Note the difference in approach between Peltier and Munteanu, and especially note Munteanu’s introduces two new factors: time constraints and the moral hazard facing the analyst.
Read
Reading 12: Peltier, T. (2005). Quantitative versus qualitative risk assessment. In Information security risk analysis (2nd ed., pp. 77-114).
Make personal reflections in your answer on the following:
a) Explain how cost benefit analysis can be performed when doing a qualitative risk assessment.
b) Do some research on the Web to locate some different qualitative risk assessment implementations (i.e., FRAAP, OCTAVE, OWASP, CRAMM, etc). Name and briefly describe two (2) of these.
c) One of your colleagues wants a brief description of the 30 minute Risk Analysis and how it works. What do you tell them?
Taking out an insurance policy is the most common approach for transferring risk. Cyber insurance, however, is still in its infancy and faces many challenges before being fully accepted as a market solution in the same way as traditional insurance.
Read
Also visit the following webpages before completing your topic.
http://datalossdb.org/ -The Data Loss Database is a site that lists all major reported data loss events.
http://datalossdb.org/analysis – lists and analysis the breach types of data loss.
Question
One of the most embarrassing and potentially costly incidents for any large organisation is the public loss of data, whether it be customer data, health data or simply corporate data on employees. The largest incident to date is a loss of 150 million records by the Shanghai Roadway in 2012, and perhaps most infamously, 94 million records on credit card data lost by TJX in 2007.
In many cases, the cost of litigation and restoring public confidence is exorbitant, and therefore seems a prime candidate for companies to use insurance for protection. Consider the Breach Types, which are essentially the vulnerabilities exploited to steal data, and how an insurance policy might account for and price the risk of data loss for a given company.
How would you assess if a company is a good risk against these Breach Types and would you trust your analysis? Discuss you views on your answer.
People process risk differently and many of our intuitive judgments about risk are flawed. In this topic, we touch on the issue of risk perception, which also has implications on how we educated others about risk.
Read
Watch
Rolf Dobelli, a Swiss writer, recently translated his successful business book on this topic from German to English, called The Art of Thinking Clearly, and you can watch him explain the premise of Cognitive Biases.
Website
SOURCE: http://reports.weforum.org/global-risks-2013/section-seven-online-only-content/data-explorer
Forum post
Both readings this week talk about the mental models we use to assess risk, and the limitations that they bring. Generally we are bound by a large set of cognitive biases which we often are unaware of operating in our decision-making processes. After watching the video above and reading about cognitive biases, discuss on the forum which cognitive biases seem most relevant to making IT Risk decisions.
Online Research
The reading by Slovic considers some of the large risks that we face in terms of technology and our response to say industrial accidents. The World Economic Forum (WEF) compiles a list of global risks each year, and if you visited the interactive graphic on the website (link provided above), you will see that there are 50 risks listed, rated for impact and likelihood, over a 10-year horizon. Find the risks specifically related to IT technology.
BLOG
The Digital Wildfires section of the WEF report considers the risks in a hyper-connected world. Examine the diagram (Figure 11 on the Digital Wildfires webpage) showing related risks.
Discuss on your blog what role IT Security has in reducing both the likelihood and impact of these risks.
The relational risk assessment process was pioneered by the author of your text, Kevin Day. It is similar in style to a qualitative risk analysis, but with more emphasis on concepts such as vulnerability inheritance and chained risk
Read
Chapter 8 from Day, K. (2003). Inside the security mind: Making the tough decisions. Upper Saddle River, NJ: Prentice Hall.
Forum Discussion
a) In chapter 8 of Inside The Security Mind, Kevin Day cites the following problems with traditional models of risk management:
Quantitative:
Qualitative:
And for both qualitative and quantitative:
Does the relational model that Day proposes adequately address any of these concerns? If so, how?
b) Is the relational model nearer in spirit to the quantitative or qualitative approaches? Justify your answer.
c) Would the relational model would be useful in an enterprise setting? Would the relational model be acceptable to management, and to the auditors? Discuss on the Forum.
You are asked the question: Is our security better this year than last year? Could you respond? And if so how? This is the type of question that may only be answered if you have collected some type of metrics relating to the domain under consideration. As Lord Kelvin (1824-1907) once famously said ‘When you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge of it is of a meager and unsatisfactory kind’.
Read
BLOG
Andrew Jaquith is a leading authority on security metrics and he explains most of his book’s content in this video series. Mr. Jaquith also created a site called securitymetrics.org, and has been running a small annual conference series called MetricCon since 2006. Take a look at some of the presentations from Metricon 7, held in 2012.
Read the following this summary and comment in your Blog .
Consider the following two presentations – this one and this one. One is by a business person and the other by a seasoned security professional. Which do you think will have the more appeal to a set of business stakeholders? Discuss your thoughts on your Blog.
———————————-
Note:
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more