RA1-Example.pdf 123Measuring and Managing Information Risk. http://dx.doi.org/10.1016/B XXXXXXXXXX00008-7 Copyright © 2015 Elsevier Inc. All rights reserved. CHAPTER Risk Analysis Examples 8 OVERVIEW...

1 answer below »
Complete risk assessment


RA1-Example.pdf 123Measuring and Managing Information Risk. http://dx.doi.org/10.1016/B978-0-12-420231-3.00008-7 Copyright © 2015 Elsevier Inc. All rights reserved. CHAPTER Risk Analysis Examples 8 OVERVIEW We could have written an entire book containing nothing but example analyses. Instead, we have tried to provide some examples that will reinforce the concepts and methods we’ve introduced thus far in the book. If we haven’t included an example that is similar to a scenario you are wrestling with, feel free to drop us a note through LinkedIn. We may have one on file that we can share or we might be able to provide an idea that will be helpful. You are not alone. Please note that you don’t have to read all of these example analyses before mov- ing on and reading the rest of the book. These are here as a guide and reference that you will hopefully find valuable as you begin to use FAIR. INAPPROPRIATE ACCESS PRIVILEGES PURPOSE Determine the level of risk associated with inappropriate access privileges in a cus- tomer service application. BACKGROUND During a recent audit, it was discovered there were active accounts in a customer service application with inappropriate access privileges. These accounts were for employees who still worked in the organization, but whose job responsibilities no lon- ger required access to this information. Internal audit labeled this a high risk finding. ASSET(S) AT RISK The account privileges in question permit access to the entire customer database, comprised of roughly 500,000 people. This information includes customer name, address, date of birth, and social security number. No banking, credit, or other finan- cial information exists in these records. TCOM(S) The primary threat community (TCom) is made up of employees whose accounts have inappropriate privileges in the account. Given that this group of people has CHAPTER 8 Risk Analysis Examples124 access and experience with the application, they are considered privileged insiders for the purpose of this analysis. You will sometimes get an argument that they aren’t supposed to have access, so they shouldn’t be labeled privileged insiders. Keep in mind that the label “privileged insider” is not about whether their privileges are approved or not, it’s about the fact that they have logical or physical proximity to the assets in question, and they don’t have to overcome resistive controls in order to do whatever you are concerned about them doing. Another potential TCom to consider in this analysis would be nonprivileged insiders who gain illicit access to one of these accounts and leverage the inappro- priate access in a malicious act. For example, John, who sits across from Debbie, might not have access to this application, but he knows that Debbie does. He knows this because she mentioned the other day how odd it was that her account could still get into the application 3 months after changing roles. He wants to gain access to the application, so he shoulder surfs Debbie’s password the day before she’s supposed to go on vacation. The next day, he logs into her account and looks up personal information on a handful of people. He sells this information to someone he met in a bar. This scenario is certainly a possibility and can be scoped into the analysis as well. Another potential TCom is cyber criminals. The thinking here is that one of these accounts could be compromised via malware that gives remote access to a cyber criminal. The cyber criminal leverages the inappropriate access to steal customer data. We’ll discuss some considerations regarding each of these TComs in the Analy- sis section below. THREAT TYPE(S) The primary type of threat event here is clearly malicious. It is difficult to realisti- cally imagine that someone with inappropriate access to an application they’re no longer supposed to have access to would accidentally log into that application, and do something that would inappropriately disclose customer information. However, there is a twist here. What about the possibility of an employee with inappropriate access logging into the application and just rummaging around looking up customer information out of boredom or curiosity but not with an intent to harm—snooping, as it were? That is absolutely a realistic scenario, and it’s something that the organization is not okay with, so the question boils down to whether we scope that separately from the truly malicious event. Deciding whether to combine or separate scenarios like this typically boils down to whether there is likely to be a significant difference in the: • Frequency of one scenario over the other • Capability between the threat agents in one scenario versus the another • Losses that would occur, or • The controls that would apply Inappropriate access privileges 125 In this analysis, the capability of the threat agents is the same, so that wouldn’t be a good differentiating factor. Likewise, the applicable controls should be the same. The losses that would occur might be different, as a malicious actor might on aver- age take more information, and there’s a much greater chance for customers to actu- ally experience loss, which would increase secondary losses. There is also likely to be a higher frequency of the events involving nonmalicious actors, because truly malicious acts tend to be less frequent than acts of misbehavior (there are more jay- walkers in the world than there are serial killers). For these reasons, it makes sense to have two distinct threat types for this analysis. We’ll label them “malicious” and “snooping.” THREAT EFFECT(S) The relevant threat effects in this scenario will depend on the type of privileges an account has. If an account has inappropriate read-only privilege, then the only threat effect in play is confidentiality. If an account has change or delete privileges, then integrity and availability come into play. As a result, unless you already know that inappropriate privileges are limited to read-access, you’ll need to include all three threat effect types. SCOPE Based on the considerations above, our scope table at this point looks like this (Table 8.1): You’ll notice that snooping is limited to confidentiality events. This is because we assume that as soon as someone illicitly changes or deletes a record, they’ve crossed the line into malicious intent. Table 8.1 The Scope Table for Level of Risks Associated with Inappropriate Access Privileges Asset at Risk Threat Community Threat Type Effect Customer PII Privileged insiders Malicious Confidentiality Customer PII Privileged insiders Snooping Confidentiality Customer PII Privileged insiders Malicious Availability Customer PII Privileged insiders Malicious Integrity Customer PII Nonpriv insiders Malicious Confidentiality Customer PII Nonpriv insiders Malicious Availability Customer PII Nonpriv insiders Malicious Integrity Customer PII Cyber criminals Malicious Confidentiality Customer PII Cyber criminals Malicious Availability Customer PII Cyber criminals Malicious Integrity CHAPTER 8 Risk Analysis Examples126 At this point, the scoping table consists of 10 scenarios. It would be nice if we could slim this down a bit by eliminating a few of these. The first and most obvious way to accomplish this is to find out whether the inappropriate privileges are limited to read-only, or whether they have change and delete privileges as well. Let’s say for the purposes of this example that none of these accounts have delete privileges. This being the case, our scope table now looks like this (Table 8.2): There’s another very important consideration, though, that can help you skinny- down the number of scenarios you need to analyze in a situation like this. Ask your- self what question these analyses are trying to answer. We know that inappropriate access privileges aren’t a good thing, so that’s not in question. In this case, what we are trying to understand is the level of risk associated with these inappropriate privi- leges so that we can accurately report it to management and appropriately prioritize it among all of the other risk issues the organization is faced with. Our next step, then, is to look at the scenarios in our scope table and try to identify one or more scenarios that are likely to be much more (or less) frequent and/or much more (or less) impactful than the others. This is where your critical thinking muscles can get some serious exercise. The first scenario that catches our eye in this regard is the one about cyber crimi- nals/integrity. In our minds, there’s very little likelihood that a cyber criminal is going to benefit from damaging the integrity of customer records. It’s possible that their purpose is not financial gain, but rather to simply harm the company or indi- viduals, but it seems a very remote probability that an actor with sufficient skills to gain this kind of access is going to have that focus. Furthermore, damaging or delet- ing records is much more likely to be recognized and reacted to than simply steal- ing data, and it seems especially unlikely that a cyber criminal would sacrifice their hard-won access in this manner. If the scenario were different, however, and instead of customer PII, the information at stake was something a cyber criminal or other threat community would gain significantly from by damaging or deleting, then this scenario might make perfect sense. We are going to delete it from our scope, though. As we look at our scenarios, it also seems to us that the frequency of nonprivi- leged insiders hijacking an account that has inappropriate privileges is likely to be much smaller than the malicious or abusive acts of privileged insiders. It also occurs Table 8.2 The Slimmed Scope Table Asset at Risk Threat Community Threat Type Effect Customer PII Privileged insiders Malicious Confidentiality Customer PII Privileged insiders Snooping Confidentiality Customer PII Privileged insiders Malicious Integrity Customer PII Nonpriv insiders Malicious Confidentiality Customer PII Nonpriv insiders Malicious Integrity Customer PII Cyber criminals Malicious Confidentiality Customer PII Cyber criminals Malicious Integrity Inappropriate access privileges 127 to us that illicit actions by nonprivileged actors would take place against accounts with appropriate access privileges roughly 85% of the time, because there would be little reason for them to single out and attack an account that had inappropriate privileges. For these reasons, we suspect the frequency of privileged insider actions to be much higher than the frequency of nonprivileged insiders, so we’ll remove the nonprivileged insider scenarios from scope, too. Now our table looks like this (Table 8.3): It’s looking better all the time. At this point, we aren’t sure we’re comfortable removing any more scenarios from our scope. That doesn’t mean, however, that we have to analyze all four of these. Our approach now is to choose one that we believe will represent the most risk
Answered 1 days AfterJul 17, 2021

Answer To: RA1-Example.pdf 123Measuring and Managing Information Risk. http://dx.doi.org/10.1016/B...

Vasudha answered on Jul 19 2021
171 Votes
Analyst Name:
    Date Completed:
FAIR Basic Risk Assessment Form
See Appendix A: Basic Risk Assessment Guide in An Introduction to Factor Analysis of Information Risk (FAIR) by Jack Jones for instruction on filling out this form.
*If not directly estimating vulnerability, we will derive vulnerability from Tcap and RS
Stage 1 – Identify Scenario Components
Step 1 – Identify the Asset(s) at risk
Asset(s) at risk: B
usiness needs to deal with variety of information. Risk is potentially present at all levels of the organization, but there are certain threats when affected to the main assets of the business, it puts business at stake. Data Snooping is one such risk which is associated for the assets. Although data snooping cannot be eliminated fully, awareness about this risk to the asset is important.
The assets at risk are confidential information relating to the customers, external stake holders and the information relating to the business. These are the primary data on which business functions. These are the assets of the company, which contains personal information of the customers, some security numbers, passwords, banking and credit information, financial information which are meant only for the intended party. Assets at risk are highly confidential information which need to be protected, if not will lead to the major loss to the customer and the business, either it might be financial, loyalty , trust and faith.
Major assets which are at risk in any business is information or the data related to the customers, vendors, credit information of the business and the customers, transactional information and when it comes to medical sector – patients health records, history of the patient and the treatment which they have taken are the assets at risk.
    
Step 2 – Identify the Threat Community
Threat community: The community of people from whom the risk is generated or the group/category of people from whom the information is at risk is the threat community.
Business experiences major threat internally from its employees. Unauthorized of access, access to the information even if there is change in the job role and sharing the password in the known circle. Accessing the information from someone else’s log in credentials and later on selling or using the information for personal benefit. More specifically threat community will be employees who use this information as the part of their job responsibility and also service engineers, IT Security and people who provide and access passwords internally.
Threat community may also be from outside, like cyber criminals. These criminals can access the information through malware and steal the data for knowing customer information like SSN, account information, access the account and at times use the data in diverting the transactions.
Threat community may also be culmination of internal and external community. Like IT security and department employees who collect the information internally and sell to the outside agencies or to the cyber criminals.
These threats are analyzed and identified based on the components of the data flow. These threats can be evaluated based on the time, knowledge, access and equipments used.
Threat community when it is internal is usually humans, mostly internal employees of the business. Threat community is malware when it is from external threat, as internal stake holders cannot use these malware on the protected hardware. The hardware will be protected internal security mechanism.
Characterization of threat:
1. The leakage of the information, information is passed on to the unauthorized persons. Data or the information need to be shared and used only for the authorized persons like employees who are in-charge of that particular activity or only to those decision makers.
2. Threat poses risk to financial and personal information and may result in financial loss.
3. Integrity of information is lost, when is it accessed and shared between the unauthorized persons.
4. Use of certain application/ software which are prohibited by the business.
5. Threat to the protected hardware and software.
Stage 2 – Evaluate Loss Event Frequency
Step 3 – Threat Event Frequency (TEF)
    Rating
    
    Description
    Very High...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here