SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Information
Security
from
Risk
Management
and Design
Build a Secure Cyberspace 2019
“Phishing scams? No more!” Seminar
May 3rd 2019 @ Hong Kong
Albert Hui
GREM,GCFA,GCFE,GNFA,GCIA,GCIH,GXPN,GPEN,GAWN,GSNA, GSEV,CISA, CISM,CRISC
Who am I?
 Spoke at Black Hat,
ACFEAsia Pacific Fraud Conference,
HTCIAAsia Pacific ForensicsConference,and
EconomistCorporate Network.
 Risk & SecurityConsultantfor
Banks,Government andCritical Infrastructures.
 Digital ForensicAnalyst & Fraud Investigator.
 Co-designedHong Kong’s first
Digital Forensics course
for the HK PoliceForce and ICAC by HKUST.
Albert Hui
GREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, GSEV, CISA, CISM, CRISC
albert@securityronin.com
S ec urI ty Ro ni n
Security
pitfalls #1:
Inappropriate
controls
Source: https://www.redbubble.com/people/memecentral/works/21912648-question-mark-guy-meme-transparent?p=sticker
Security
pitfalls #2:
Inadequate
threat
modeling
Source: https://getyarn.io/yarn-clip/80499338-efe7-43e5-970e-5e7a79cbf3a2
Security
pitfalls #2:
Inadequate
threat
modeling
Source: https://www.scmp.com/news/hong-kong/hong-kong-economy/article/2170803/hong-kong-monetary-authority-expects-uncover-more
Case Study
5Steps
of
Risk
Management
1.
Identify
2.
Analyze
3.
Prioritize
4.
Treat
5.
Monitor
Asset
Identification:
What do you
want to
Protect?
Data
Process
Identify your important assets
(mission-critical/ business-critical/ crown jewel):
Examples:
• Customer information
• Supplierprocurement records
• Design blueprints
• …
Examples
• e-Commerce / ShoppingCart operations (for online shops)
• Power generation (for power plants)
• …
Possible Loss
Identification:
What can you
Possibly Lose?
Primarylosses:
• Money
• Customer data (e.g. credit card data)
• Proprietary information (design blueprints, strategic plans, etc.)
• Goodwill, brand damage and reputation loss
• …
Secondary losses:
• Fines & penalties, loss of license, insurance premium
• Victim compensation (e.g. monetary compensation, credit monitoring)
• Cleanup cost (e.g. investigation and remediation)
• …
Risk
Identification:
What is
Threat?
Opportunity
Threat
Threat
Modeling:
Threat
Actors
Secular Sacred
egomoney
ideology
(e.g. hacktivists)
revenge
(e.g. former
employees)
curiosity
industrial
espionage
war & terrorism
(e.g. state-sponsored
hackers)
political
(e.g. unfavorable
foreign government
policies)
Threat
Modeling:
Dataflow
Diagram (DFD)
Source: https://security.ufl.edu/it-workers/risk-assessment/creating-an-information-systemdata-flow-diagram/
Example of a good DFD
Threat
Modeling:
Plausible
Attacks
Source: https://security.ufl.edu/it-workers/risk-assessment/creating-an-information-systemdata-flow-diagram/
Threat
Modeling:
Threat
Actions
STRIDE Model
 Spoofingidentity
 Tampering
 Repudiation
 Information disclosure
 Denial of service
 Elevation of privilege
Risk
Identification:
What is
Risk?
Risk
LossEvent
Frequency
ThreatEvent
Frequency
Contact
Frequency
Probabilityof
Action
Vulnerability
Difficulty
Threat
Capability
Loss
Magnitude
Primary
Loss
SecondaryLoss
SecondaryLoss
Event
Frequency
SecondaryLoss
Magnitude
Risk
Likelihood Impact
FAIR (FactorAnalysisof Information Risk)
RiskOntology
RiskAnalysis:
Likelihood
Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf
MIL-STD-882E
RiskAnalysis:
Impact
Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf
MIL-STD-882E
RiskAnalysis:
Risk Matrix
Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf
MIL-STD-882E
Risk
Prioritization
•……High
•……High
•……Serious
•……Serious
•……Serious
•……Medium
•……Medium
•……Low
•……Low
•……Low
•……Low
•……Low
•……Low
•……Low
•……Low
•……Low
•……Low
Risk Level
Risk
Treatment:
Overview Vulnerability
Impact
Terminate
Tolerate
Treat
Threat
Risk
Transfer
Analysis Treatment
Risk
Treatment:
Option 1:
Transfer
Examples:
• Purchase an insurance policy
• Use a payment processor instead of
handling transactions on your own
• Host system on a cloud platform
• …
Risk
Treatment:
Option 2:
Terminate
Risk
Treatment:
Option 3:
Tolerate
Risk
Treatment:
Option 4:
Treat
(Mitigate)
Risk
Treatment:
Mitigation
controls
Preventive Detective Corrective
firewall
encryption
backup antivirus
threat
hunting
restore
block
Examples
Asset at Stake:
Plausible Compromise:
One Possible Mitigation Control:
Shoppingcart operations
Hacker gain access to DB and destroy data
DeployWAF
Example 1:
Asset at Stake:
Plausible Compromise:
One Possible Mitigation Control:
Shoppingcart operations
System / DB goes down and corrupt data
Daily backup
Example 2:
Asset at Stake:
Plausible Compromise:
One Possible Mitigation Control:
Shoppingcart history
Backup lost (due to hackingor accident)
Backup to write-onlymedia
Example 3:
Risk
Monitoring
Key
Takeaways
1. Know your assets
2. Know your threats
3. Rank your risks
4. Design corresponding controls
Thank you
albert@securityronin.com

Weitere ähnliche Inhalte

Ähnlich wie Information Security from Risk Management and Design

We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Cameron Brown
 
Computer security power point prsentation.ppt
Computer security power point prsentation.pptComputer security power point prsentation.ppt
Computer security power point prsentation.ppt
pihadar269
 

Ähnlich wie Information Security from Risk Management and Design (20)

Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
1530 track1 ulinski
1530 track1 ulinski1530 track1 ulinski
1530 track1 ulinski
 
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Introduction to Computer Security.ppt
Introduction to Computer Security.pptIntroduction to Computer Security.ppt
Introduction to Computer Security.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1 (1).ppt
hel1 (1).ppthel1 (1).ppt
hel1 (1).ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
Computer security power point prsentation.ppt
Computer security power point prsentation.pptComputer security power point prsentation.ppt
Computer security power point prsentation.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Alliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate PresentationAlliance Group Research (AGR) Corporate Presentation
Alliance Group Research (AGR) Corporate Presentation
 

Mehr von Albert Hui

Laying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident InvestigationLaying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident Investigation
Albert Hui
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
Albert Hui
 
(Mis)trust in the cyber era
(Mis)trust in the cyber era(Mis)trust in the cyber era
(Mis)trust in the cyber era
Albert Hui
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
Albert Hui
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
Albert Hui
 
Insights into the Cybercrime Ecosystem
Insights into the Cybercrime EcosystemInsights into the Cybercrime Ecosystem
Insights into the Cybercrime Ecosystem
Albert Hui
 

Mehr von Albert Hui (13)

The Practice of Cyber Crime Investigations
The Practice of Cyber Crime InvestigationsThe Practice of Cyber Crime Investigations
The Practice of Cyber Crime Investigations
 
Practical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank FraudstersPractical Defences Against A New Type of Professional Bank Fraudsters
Practical Defences Against A New Type of Professional Bank Fraudsters
 
New Frontiers in Cyber Forensics
New Frontiers in Cyber ForensicsNew Frontiers in Cyber Forensics
New Frontiers in Cyber Forensics
 
Laying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident InvestigationLaying the Corporate Groundwork for Effective Incident Investigation
Laying the Corporate Groundwork for Effective Incident Investigation
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
 
Detecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an AttackerDetecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an Attacker
 
(Mis)trust in the cyber era
(Mis)trust in the cyber era(Mis)trust in the cyber era
(Mis)trust in the cyber era
 
Universal DDoS Mitigation Bypass
Universal DDoS Mitigation BypassUniversal DDoS Mitigation Bypass
Universal DDoS Mitigation Bypass
 
Cyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the CorporateCyber Security: Challenges and Solutions for the Corporate
Cyber Security: Challenges and Solutions for the Corporate
 
The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?The Aftermath: You Have Been Attacked! So what's next?
The Aftermath: You Have Been Attacked! So what's next?
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
Insights into the Cybercrime Ecosystem
Insights into the Cybercrime EcosystemInsights into the Cybercrime Ecosystem
Insights into the Cybercrime Ecosystem
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 

Kürzlich hochgeladen

Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
Silpa
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
seri bangash
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
Areesha Ahmad
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
MohamedFarag457087
 

Kürzlich hochgeladen (20)

GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICEPATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
PATNA CALL GIRLS 8617370543 LOW PRICE ESCORT SERVICE
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptxPSYCHOSOCIAL NEEDS. in nursing II sem pptx
PSYCHOSOCIAL NEEDS. in nursing II sem pptx
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
The Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptxThe Mariana Trench remarkable geological features on Earth.pptx
The Mariana Trench remarkable geological features on Earth.pptx
 
Conjugation, transduction and transformation
Conjugation, transduction and transformationConjugation, transduction and transformation
Conjugation, transduction and transformation
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
An introduction on sequence tagged site mapping
An introduction on sequence tagged site mappingAn introduction on sequence tagged site mapping
An introduction on sequence tagged site mapping
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.Selaginella: features, morphology ,anatomy and reproduction.
Selaginella: features, morphology ,anatomy and reproduction.
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
 
Velocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.pptVelocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.ppt
 

Information Security from Risk Management and Design