SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Lec-3: Cyber Security
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Managing Risk
• If you are connected to the Internet, your system is exposed to
countless risks.
• Cybersecurity is primarily about risk management.
• Minimize your risk through smart practices.
• Ensure your systems are properly configured, patched, and audited.
• Ensure your workforce is trained and regularly tested.
• Make cybersecurity part of your daily business practices.
Life is full of Risk………….
As a Security Consultant or Executive
• Primary Responsibilities
• To manage Risk
• To protect your business
• Create an environment for business to grow
• Risk can not be removed 100% but can be managed at every level of your
business.
• Important to create and maintain a risk management program owned
at the most senior levels and designed to cascade throughout the
business to where each employee knows and understand that they
are valued stakeholders in the risk management program.
What are your risks?
• Understand
• Where you are vulnerable?
• To whom or what
• Likelihood of someone exploiting those vulnerabilities
Essential for
determining your
risk Posture
• Most companies do not have a clue as to what their cyber risk profile
is nor do they know how to calculate it.
• Many believed that there is no means to calculate your cybersecurity
risk.
• but its not true………………
Cybersecurity risk can be calculated using
some of the same techniques as calculating
risk in other sectors
Example: vulnerability Checklist (Cyber
Espionage, Theft and Exploitation)
1. Do you have intellectual property and trade secrets you need to protect?
2. Do you currently or in the future have market competitors who would benefit
by having access to your intellectual property and trade secrets?
3. Do you store your intellectual property and trade secrets on computer systems?
4. Are your computer systems connected to the Internet?
5. Do your computer systems have Universal Serial Bus (USB) connections that
enable thumb drives to be connected?
6. Do your computers have read–write DVD/compact disk drives?
7. Do you have frequent and regularly scheduled backups of your information?
8. Do you store your backup information in an off-site location?
9. Do you use any data feeds from other sources into your network?
10. Do you contract your system administration, maintenance, or software support?
Your answers
• How many “yes” answers did you have?
• If you had one or more, then you are susceptible to cyber-based risk.
Technical Risks
• Technical risks are those risks presented through the operations and
maintenance of the technical systems used by your business, for
example, computers, processors, monitors, controllers, timers,
alarms, etc.
Example: Vulnerability Checklist (CTR)
1. Have you or your business ever been hacked?
2. Have you ever found malicious code (such as viruses, trojans, or worms) or
unauthorized software on your systems?
3. Is your network being probed by outside entities?
4. Do any of the members of your IT staff fail to maintain current industry
certifications in their specialties?
5. Are there more current software versions, including patches, available for your
system?
6. Do you store data “in the cloud”?
7. Does your workforce use mobile devices such as smart phones, tablet computers,
and laptops to conduct your corporate business?
8. Does your business solely rely on passwords to control access to the network
and information?
9. Does your business conduct annual vulnerability scans of your network?
10. Do you allow remote access to your network?
• If you answered “yes” to any of these questions, you have technical
risks that need to be addressed.
Cyber Security is a Team Effort
Human Risks
• Because cybersecurity is a team effort, as an executive or security
consultant, you need to recognize the strengths and weaknesses of your
team.
• Not everyone on your team is a superstar when it comes to cybersecurity
• Poorly trained workforce presents the greatest cybersecurity threat to you
and your business.
• Human risks to your cybersecurity posture are profound. From the top of
your organization to the bottom, your workforce presents significant risks
that you need to address.
• Wonder what kinds of human risks you and your company may face in the
cybersecurity realm?
Introduction
Risk Analysis and Management Framework
Assets Threats Vulnerabilities
Risks
Security Measures
}
}
Analysis
Management
Key Terms definition of Risk Management
The definition of the following terms in this area is not universally
agreed. We will use the following
• Threat: Harm that can happen to an asset
• Impact: A measure of the seriousness of a threat
• Attack: A threatening event
• Attacker: The agent causing an attack (not necessarily human)
• Vulnerability: a weakness in the system that makes an attack more
likely to succeed
• Risk: a quantified measure of the likelihood of a threat being realised
Key Terms definition of Risk Management
• Risk Analysis: involves the identification and assessment of the levels
of risk, calculated from the
• Values of assets
• Threats to the assets
• Their vulnerabilities and likelihood of exploitation
• Risk Management: involves the identification, selection and adoption
of security measures justified by
• The identified risks to assets
• The reduction of these risks to acceptable levels
Risk Analysis
• RA is important requirement for any organization .
• To determine hurdles and problems, which halt or slow down the
progress of internal operations as well as external reputation of the
organizations.
Goals of Risk Analysis
• All assets have been identified
• All threats have been identified
• Their impact on assets has been valued
• All vulnerabilities have been identified and assessed
Problems of Measuring Risk
Businesses normally wish to measure in money, but
• Many of the entities do not allow this
• Valuation of assets
• Value of data and in-house software - no market value
• Value of goodwill and customer confidence
• Likelihood of threats
• How relevant is past data to the calculation of future probabilities?
• The nature of future attacks is unpredictable
• The actions of future attackers are unpredictable
• Measurement of benefit from security measures
• Problems with the difference of two approximate quantities
• How does an extra security measure affect a ~10-5 probability of attack?
Risk Levels
• Precise monetary values give a false precision
• Better to use levels, e.g.
• High, Medium, Low
• High: major impact on the organisation
• Medium: noticeable impact (“material” in auditing terms)
• Low: can be absorbed without difficulty
• 1 - 10
• Express money values in levels, e.g.
• For a large University Department a possibility is
• High
• Medium
• Low
Risk Analysis Steps
• Decide on scope of analysis
• Set the system boundary
• Identification of assets & business processes
• Identification of threats and valuation of their impact on assets
(impact valuation)
• Identification and assessment of vulnerabilities to threats
• Risk assessment
Risk Analysis – Defining the Scope
• Draw a context diagram
• Decide on the boundary
• It will rarely be the computer!
• Make explicit assumptions about the security of neighbouring
domains
• Verify them!
Risk Analysis - Identification of Assets
• Types of asset
• Hardware
• Software: purchased or developed programs
• Data
• People: who run the system
• Documentation: manuals, administrative procedures, etc.
• Supplies: paper forms, magnetic media, printer liquid, etc.
• Money
• Intangibles
• Goodwill
• Organization confidence
• Organisation Reputation or image
Risk Analysis – Impact Valuation
Identification and valuation of threats - for each group of assets
• Identify threats, e.g. for stored data
• Loss of confidentiality
• Loss of integrity
• Loss of completeness
• Loss of availability (Denial of Service)
• For many asset types the only threat is loss of availability
• Assess impact of threat
• Assess in levels, e.g H-M-L or 1 - 10
• This gives the valuation of the asset in the face of the threat
Risk Analysis – Process Analysis
• Every company or organisation has some processes that are critical to its
operation
• The criticality of a process may increase the impact valuation of one or
more assets identified
So
• Identify critical processes
• Review assets needed for critical processes
• Revise impact valuation of these assets
Risk Analysis – Vulnerabilities 1
• Identify vulnerabilities against a baseline system
• For risk analysis of an existing system
• Existing system with its known security measures and weaknesses
• For development of a new system
• Security facilities of the envisaged software, e.g. Windows NT
• Standard good practice, e.g. BS 7799 recommendations of good practice
Risk Analysis – Vulnerabilities 2
For each threat
• Identify vulnerabilities
• How to exploit a threat successfully;
• Assess levels of likelihood - High, Medium, Low
• Of attempt
• Expensive attacks are less likely (e.g. brute-force attacks on encryption keys)
• Successful exploitation of vulnerability;
• Combine them Likelihood of Attempt
Likelihood
of Success
Low
Low
Low
Med Med
Low
Med High
HighHigh
High
Med
Med
Low
Low
RISK LIKELIHOOD DETERMINATION
• According to the ISO 31000 standard, likelihood can be defined as the
chance that something might happen.
• Likelihood can be defined, determined, or measured objectively or
subjectively and can be expressed either qualitatively or
quantitatively (Using mathematics).
Likelihood Description Table
Risk Likelihood Rating
Risk Assessment
Assess risk
• If we had accurate probabilities and values, risk would be
• Impact valuation x probability of threat x probability of exploitation
• Plus a correction factor for risk aversion
• We construct matrices such as
Risk
Impact valuation
Low
Low
Low
Med Med
Low
Med High
HighHigh
High
Med
Med
Low
Low
Vulnerability
Responses to Risk
Responses to risk
• Avoid it completely by withdrawing from an activity
• Accept it and do nothing
• Reduce it with security measures
Security Measures
Possible security measures
• Transfer the risk, e.g. insurance
• Reduce vulnerability
• Reduce likelihood of attempt
• e.g. publicise security measures in order to deter attackers
• e.g. competitive approach - the lion-hunter’s approach to security
• Reduce likelihood of success by preventive measures
• e.g. access control, encryption, firewall
• Reduce impact, e.g. use fire extinguisher / firewall
• Recovery measures, e.g. restoration from backup
Risk Management
• Identify possible security measures
• Decide which to choose
• Ensure complete coverage with confidence that:
• The selected security measures address all threats
• The results are consistent
• The expenditure and its benefits are commensurate with the risks
Iterate
• Adding security measures changes the system
• Vulnerabilities may have been introduced
• After deciding on security measures, revisit the risk analysis and
management processes
• e.g. introduction of encryption of stored files may remove the threat to
Confidentiality but introduce a threat to Availability
• What happens if the secret key is lost?
Conclusion: Problems of Risk Analysis and
Management
• Lack of precision
• Volume of work and volume of output
• Integrating them into a ”normal” development process
Assignment#01
Write a Risk Assessment and Analysis Report on your
organization.
Bakhtar University 37
Thank You
For Your Patience

Weitere ähnliche Inhalte

Was ist angesagt?

Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)Masudur Rahman
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lectureZara Nawaz
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
Securing information system
Securing information systemSecuring information system
Securing information systemTanjim Rasul
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 

Was ist angesagt? (20)

Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
System security
System securitySystem security
System security
 
Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Unit4 next
Unit4 nextUnit4 next
Unit4 next
 
Data Security
Data SecurityData Security
Data Security
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Securing information system (Management Information System)
Securing information system (Management Information System)Securing information system (Management Information System)
Securing information system (Management Information System)
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
Incident handling of cyber espionage
Incident handling of cyber espionageIncident handling of cyber espionage
Incident handling of cyber espionage
 
Securing information system
Securing information systemSecuring information system
Securing information system
 
Software Security
Software SecuritySoftware Security
Software Security
 
Information security management
Information security managementInformation security management
Information security management
 

Ähnlich wie Cyber Security # Lec 3

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxImXaib
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Security metrics
Security metrics Security metrics
Security metrics PRAYAGRAJ11
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 

Ähnlich wie Cyber Security # Lec 3 (20)

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Security metrics
Security metrics Security metrics
Security metrics
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 

Mehr von Kabul Education University

Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawKabul Education University
 

Mehr von Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Lect 4 computer forensics
Lect 4 computer forensicsLect 4 computer forensics
Lect 4 computer forensics
 

Kürzlich hochgeladen

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Kürzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Cyber Security # Lec 3

  • 1. Lec-3: Cyber Security Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 2. Managing Risk • If you are connected to the Internet, your system is exposed to countless risks. • Cybersecurity is primarily about risk management. • Minimize your risk through smart practices. • Ensure your systems are properly configured, patched, and audited. • Ensure your workforce is trained and regularly tested. • Make cybersecurity part of your daily business practices.
  • 3. Life is full of Risk………….
  • 4. As a Security Consultant or Executive • Primary Responsibilities • To manage Risk • To protect your business • Create an environment for business to grow • Risk can not be removed 100% but can be managed at every level of your business. • Important to create and maintain a risk management program owned at the most senior levels and designed to cascade throughout the business to where each employee knows and understand that they are valued stakeholders in the risk management program.
  • 5. What are your risks? • Understand • Where you are vulnerable? • To whom or what • Likelihood of someone exploiting those vulnerabilities Essential for determining your risk Posture
  • 6. • Most companies do not have a clue as to what their cyber risk profile is nor do they know how to calculate it. • Many believed that there is no means to calculate your cybersecurity risk. • but its not true……………… Cybersecurity risk can be calculated using some of the same techniques as calculating risk in other sectors
  • 7. Example: vulnerability Checklist (Cyber Espionage, Theft and Exploitation) 1. Do you have intellectual property and trade secrets you need to protect? 2. Do you currently or in the future have market competitors who would benefit by having access to your intellectual property and trade secrets? 3. Do you store your intellectual property and trade secrets on computer systems? 4. Are your computer systems connected to the Internet? 5. Do your computer systems have Universal Serial Bus (USB) connections that enable thumb drives to be connected? 6. Do your computers have read–write DVD/compact disk drives? 7. Do you have frequent and regularly scheduled backups of your information? 8. Do you store your backup information in an off-site location? 9. Do you use any data feeds from other sources into your network? 10. Do you contract your system administration, maintenance, or software support?
  • 8. Your answers • How many “yes” answers did you have? • If you had one or more, then you are susceptible to cyber-based risk.
  • 9. Technical Risks • Technical risks are those risks presented through the operations and maintenance of the technical systems used by your business, for example, computers, processors, monitors, controllers, timers, alarms, etc.
  • 10. Example: Vulnerability Checklist (CTR) 1. Have you or your business ever been hacked? 2. Have you ever found malicious code (such as viruses, trojans, or worms) or unauthorized software on your systems? 3. Is your network being probed by outside entities? 4. Do any of the members of your IT staff fail to maintain current industry certifications in their specialties? 5. Are there more current software versions, including patches, available for your system? 6. Do you store data “in the cloud”? 7. Does your workforce use mobile devices such as smart phones, tablet computers, and laptops to conduct your corporate business? 8. Does your business solely rely on passwords to control access to the network and information? 9. Does your business conduct annual vulnerability scans of your network? 10. Do you allow remote access to your network?
  • 11. • If you answered “yes” to any of these questions, you have technical risks that need to be addressed.
  • 12. Cyber Security is a Team Effort
  • 13. Human Risks • Because cybersecurity is a team effort, as an executive or security consultant, you need to recognize the strengths and weaknesses of your team. • Not everyone on your team is a superstar when it comes to cybersecurity • Poorly trained workforce presents the greatest cybersecurity threat to you and your business. • Human risks to your cybersecurity posture are profound. From the top of your organization to the bottom, your workforce presents significant risks that you need to address. • Wonder what kinds of human risks you and your company may face in the cybersecurity realm?
  • 14. Introduction Risk Analysis and Management Framework Assets Threats Vulnerabilities Risks Security Measures } } Analysis Management
  • 15. Key Terms definition of Risk Management The definition of the following terms in this area is not universally agreed. We will use the following • Threat: Harm that can happen to an asset • Impact: A measure of the seriousness of a threat • Attack: A threatening event • Attacker: The agent causing an attack (not necessarily human) • Vulnerability: a weakness in the system that makes an attack more likely to succeed • Risk: a quantified measure of the likelihood of a threat being realised
  • 16. Key Terms definition of Risk Management • Risk Analysis: involves the identification and assessment of the levels of risk, calculated from the • Values of assets • Threats to the assets • Their vulnerabilities and likelihood of exploitation • Risk Management: involves the identification, selection and adoption of security measures justified by • The identified risks to assets • The reduction of these risks to acceptable levels
  • 17. Risk Analysis • RA is important requirement for any organization . • To determine hurdles and problems, which halt or slow down the progress of internal operations as well as external reputation of the organizations.
  • 18. Goals of Risk Analysis • All assets have been identified • All threats have been identified • Their impact on assets has been valued • All vulnerabilities have been identified and assessed
  • 19. Problems of Measuring Risk Businesses normally wish to measure in money, but • Many of the entities do not allow this • Valuation of assets • Value of data and in-house software - no market value • Value of goodwill and customer confidence • Likelihood of threats • How relevant is past data to the calculation of future probabilities? • The nature of future attacks is unpredictable • The actions of future attackers are unpredictable • Measurement of benefit from security measures • Problems with the difference of two approximate quantities • How does an extra security measure affect a ~10-5 probability of attack?
  • 20. Risk Levels • Precise monetary values give a false precision • Better to use levels, e.g. • High, Medium, Low • High: major impact on the organisation • Medium: noticeable impact (“material” in auditing terms) • Low: can be absorbed without difficulty • 1 - 10 • Express money values in levels, e.g. • For a large University Department a possibility is • High • Medium • Low
  • 21. Risk Analysis Steps • Decide on scope of analysis • Set the system boundary • Identification of assets & business processes • Identification of threats and valuation of their impact on assets (impact valuation) • Identification and assessment of vulnerabilities to threats • Risk assessment
  • 22. Risk Analysis – Defining the Scope • Draw a context diagram • Decide on the boundary • It will rarely be the computer! • Make explicit assumptions about the security of neighbouring domains • Verify them!
  • 23. Risk Analysis - Identification of Assets • Types of asset • Hardware • Software: purchased or developed programs • Data • People: who run the system • Documentation: manuals, administrative procedures, etc. • Supplies: paper forms, magnetic media, printer liquid, etc. • Money • Intangibles • Goodwill • Organization confidence • Organisation Reputation or image
  • 24. Risk Analysis – Impact Valuation Identification and valuation of threats - for each group of assets • Identify threats, e.g. for stored data • Loss of confidentiality • Loss of integrity • Loss of completeness • Loss of availability (Denial of Service) • For many asset types the only threat is loss of availability • Assess impact of threat • Assess in levels, e.g H-M-L or 1 - 10 • This gives the valuation of the asset in the face of the threat
  • 25. Risk Analysis – Process Analysis • Every company or organisation has some processes that are critical to its operation • The criticality of a process may increase the impact valuation of one or more assets identified So • Identify critical processes • Review assets needed for critical processes • Revise impact valuation of these assets
  • 26. Risk Analysis – Vulnerabilities 1 • Identify vulnerabilities against a baseline system • For risk analysis of an existing system • Existing system with its known security measures and weaknesses • For development of a new system • Security facilities of the envisaged software, e.g. Windows NT • Standard good practice, e.g. BS 7799 recommendations of good practice
  • 27. Risk Analysis – Vulnerabilities 2 For each threat • Identify vulnerabilities • How to exploit a threat successfully; • Assess levels of likelihood - High, Medium, Low • Of attempt • Expensive attacks are less likely (e.g. brute-force attacks on encryption keys) • Successful exploitation of vulnerability; • Combine them Likelihood of Attempt Likelihood of Success Low Low Low Med Med Low Med High HighHigh High Med Med Low Low
  • 28. RISK LIKELIHOOD DETERMINATION • According to the ISO 31000 standard, likelihood can be defined as the chance that something might happen. • Likelihood can be defined, determined, or measured objectively or subjectively and can be expressed either qualitatively or quantitatively (Using mathematics).
  • 31. Risk Assessment Assess risk • If we had accurate probabilities and values, risk would be • Impact valuation x probability of threat x probability of exploitation • Plus a correction factor for risk aversion • We construct matrices such as Risk Impact valuation Low Low Low Med Med Low Med High HighHigh High Med Med Low Low Vulnerability
  • 32. Responses to Risk Responses to risk • Avoid it completely by withdrawing from an activity • Accept it and do nothing • Reduce it with security measures
  • 33. Security Measures Possible security measures • Transfer the risk, e.g. insurance • Reduce vulnerability • Reduce likelihood of attempt • e.g. publicise security measures in order to deter attackers • e.g. competitive approach - the lion-hunter’s approach to security • Reduce likelihood of success by preventive measures • e.g. access control, encryption, firewall • Reduce impact, e.g. use fire extinguisher / firewall • Recovery measures, e.g. restoration from backup
  • 34. Risk Management • Identify possible security measures • Decide which to choose • Ensure complete coverage with confidence that: • The selected security measures address all threats • The results are consistent • The expenditure and its benefits are commensurate with the risks
  • 35. Iterate • Adding security measures changes the system • Vulnerabilities may have been introduced • After deciding on security measures, revisit the risk analysis and management processes • e.g. introduction of encryption of stored files may remove the threat to Confidentiality but introduce a threat to Availability • What happens if the secret key is lost?
  • 36. Conclusion: Problems of Risk Analysis and Management • Lack of precision • Volume of work and volume of output • Integrating them into a ”normal” development process
  • 37. Assignment#01 Write a Risk Assessment and Analysis Report on your organization. Bakhtar University 37
  • 38. Thank You For Your Patience

Hinweis der Redaktion

  1. CTRL: Common Technical Risks
  2. A system context diagram (SCD) in engineering is adiagram that defines the boundary between the system, or part of a system, and its environment, showing the entities that interact with it. This diagramis a high level view of a system. It is similar to a blockdiagram.