W1INSE632

  • Upload
    aliknf

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

  • 7/25/2019 W1INSE632

    1/12

    1

    INSE 6320 -- Week 1

    Risk Analysis for Info rmation and Systems Engineering

    Go over Course Outline

    What is Risk? Introduction to Risk Analysis

    Dr. A. Ben Hamza Concordia University

    2

    Instructor: Dr. A. Ben Hamza

    Office: EV 7.631

    Lectures: Thur sday 5:45 - 8:15 PM

    Office Hours: Thursday 1:30 -3:30 PMor by appointment

    E-Mail: [email protected]

    3

    What is INSE 6320?

    INSE 6320 is an Information and Systems Engineering course

    You will learn how to: Assess risk for systems engineering using probability theory and statistics

    Use the basic tools of risk analysis: fault trees, event trees, simulation models,

    and influence diagrams

    Model uncertainty and measure risk through various methods Implement quantitative risk analyses, and develop strategies to identify, assess,

    monitor and mitigate risk.

    4

    Roadmap of the Course?

    Risk

    Management

    Risk & Uncertainty Decision TheoryFault & Event

    Trees

    Probability

    Distributions

    Statistical

    Inference

    Weibull

    An aly sis

    Rel iabi li ty Expert OpinionInfluence

    Diagrams

    INSE 6320

    Risk

    Measurement

    Midterm Exam Final Exam

  • 7/25/2019 W1INSE632

    2/12

    5

    Administration

    Course web page: MyConcordia Portal (Moodle)

    Its highly advised to checkMoodle regularly.

    Syllabus, Slides, Assignments, Projects, etc Go to MyConcordia Portal (Moodle).

    Preliminary exam dates and project due date: Midterm Exam

    February 19, 2015 (in class)

    Project due

    April 16, 2015

    Final Exam

    April ??, 2015 (TBA)

    6

    Recommended Textbook

    Probabilistic Risk Analysis: Foundations and Methods

    Authors: T. Bedford andR. Cooke

    Publisher: Cambridge University Press, 2001

    ISBN-13: 978-0521773201

    7

    Grading Policy

    Important Dates:

    February 12, 2015: Assignment #1 due February 19, 2015: Midterm ExamAp ril 9, 2015: Assignment #2 dueAp ril 16, 2015: Project Report dueApr il ?? , 2015: Final Exam

    Final Project

    Final reports due on April 16, 2015 A final project report, completed individually or in pairs, is required. The term project will have only one component: written report. For more details: MyConcordia Portal (Moodle)

    Two Assignments 10%

    Midterm Exam 30%

    Project 15%

    Final Exam 45%

    8

    What this course is about?

    This course is about Risk Analysis for Information and Systems Engineering .Engineering systemsare almost always designed, constructed, and operated

    under unavoidable conditions of risk and uncertainty.

    Risk perception of uncertainty inevents that occur and actions taken.

    Risks encountered in everydaydecision-making

    Multiple ways to consider risks: Risk as feelings

    Risk asanalysis

    Risk aspolitics

    We primarily evaluate risk intuitively(as feelings)

    It seems every week there is a newstory about some type of securitybreach

    That new story says that the securitybreach costs the organizationthousands or millions of dollars.

    Recent Sony security breach cost is$100 million

    The question is: how do they come up

    with those numbers?

  • 7/25/2019 W1INSE632

    3/12

    9

    Systems Engineering

    Science: Determines what is

    Component Engineering: Determines what can be

    Systems Engineering: Determines what should be

    So what is Systems Engineering?

    Many different definitions All define aprocessof developing goals and requirements,

    designing the system and development, verifying therequirements are met at each step.

    All include successive refinements and iteration on the abovesteps.

    The important thing is that security analysis be integrated intowhatever systems engineering process you use.

    10

    What is a System? There is no standard definition. Vague definition from a systems engineers perspective:

    Asystemis a combination of interacting componentsoperating within an external logical and physicalenvironment.

    Eachcomponenthasattributesthat describe what itdoes and how it does it.

    Components have relationshipswith othercomponents which describe how the componentsinteract to form a system.

    A system also interacts with other elements in itsenvironment

    For the Systems Engineer (SE), a system is the part

    the SE has some control over; the environment is whatyou have to take as is.

    A system has relationships with external componentsin its environment. These are critical in the SE process

    11

    Systems Engineering--One View

    Definition of Systems Engineering(NASA SE Handbook)

    Systems Engineering is a robust approach tothe design, creation, and operation of systems.

    Systems Engineering consists of

    Identification and quantification of system goals

    Creation of alternativesystem design concepts

    Performance of design trades

    Selection and implementation of the best design(balanced and robust)

    Verificationthat the design is actually built and properly integrated inaccordance with specifications

    Assessmentof how well the system meets the goals

    12

    Information Systems Security (ISS) Engineering

    Includes architecture, design, development, deployment System Architecture: where are the security functions performed? Where are new

    external interfaces required to support security? System design includes selection of commercial products: platforms, operating

    systems, networks, etc.

    Security requirements should be a part of all product selection criteria (not justselection of security specific components such as firewalls and crypto)

    Security design includes designing the management processes and procedures forindividuals that are required to maintain a secure system throughout its life cycle

    Risk analysis is a key part of the requirements prioritization--it lets you know what youmight be losing if you relax a security requirement

    Part of overall systems engineering process In a simple sense, security is just another source of requirements

  • 7/25/2019 W1INSE632

    4/12

    13

    Finance Risk in investments, insurance etc.,

    Industrial Plant failures, accidents, competitive risks

    Political Impact of decisions, probabilities of success etc.

    Nuclear Plant operation, fuel storage, proliferation of fissile material

    Aviation Safety of airplanes, weather conditions, terrorism impact

    Medicine Weighing different treatment options

    Risk Applications

    14

    What is Risk?

    Risk as a science was born in the sixteenth century Renaissance, a time ofdiscovery

    The word riskis derived from the early Italian risicare, which means to dare Today, risk is defined as the possibility of loss Loss Unless there is potential for loss, there is no risk

    The loss can be either a bad outcome or a lost opportunity

    Choice Unless there is a choice, there is no risk management

    The likelihood that a particular threat using a specific attack, willexploit a particular vulnerability of a system that results in anundesirable consequence.

    (Definition from National Information Systems Security (INFOSEC) Glossary,

    NSTISSI No. 4009, Aug. 1997)

    Definition:

    15

    What is Risk?

    The probability that a particular threat will exploit a particular vulnerability

    Risk can be described in terms of probability (the possibility of risk),consequence (the loss), and time frame

    Probability is the likelihood that the consequence will occur

    Consequence is the effect of an unsatisfactory outcome

    Time Frame refers to when the risk will occur during the product lifecycle, e.g.long, medium, short, imminent ...

    Risks are future events with a probability of occurrence and a potential for loss

    Many problems that arise in software development efforts were first known asrisks by someone on the project staff

    Caught in time, risks can be avoided, negated or have their impacts reduced

    16

    Probability

    How likely is a future problem to occur? Often difficult to define precisely Probability can be defined as a percentage, a phrase or a relative number:

    Probability Uncertainty Rank

    > 80% Almost certainly, highly likely 5

    61%-80% Probable, likely, probably, we believe 4

    41%-60% We doubt, improbable, better than even 3

    21%-40% Unlikely, probably not 2

    < 21% Highly unlikely, chances are slight 1

  • 7/25/2019 W1INSE632

    5/12

    17

    Risk is theprobability that aspecific threatwillsuccessfullyexploit avulnerability

    causing a loss.

    RiskRisk Management Process

    What can go wrong

    (Initiating Events)?

    How Bad

    (Consequences)?

    How Often

    (Likelihood of failure)?

    Aggreg ate Ri sk

    (Likelihood of consequences calculated for every

    possible combination of precipitating events)

    Measures to reduce the consequences of ri sk until t hey

    reach acceptable levels (Benefits > Aggregated Risk)

    18

    RiskExample: Driving to Work

    Potential Accidents

    Head on Collision

    Side/Rear-end impact

    Hit pedestrian

    Overturn Car

    Carjacking

    Hazard Control

    (Reduce likelihood of damage)

    License

    Proper road & signal construction

    Safety Barriers

    Police Surveillance & speed control

    Obeying traffic rules

    Protection & Damage Limitation

    (Reduce Consequences) Having Airbags Installed in Vehicle

    Wearing Seatbelts

    First Aid & Hospitalization

    How Bad

    (Consequences)

    Vehicle Damage

    Traffic Ticket

    Risk

    =ConsequencexLikelihood

    Cost-Benefit Analysi s

    Death

    Insurance PremiumHike

    Injury

    Causes Fatigue

    Poor Judgment

    EnvironmentalConditions

    Failure to see trafficsignals

    EmploymentTotal

    Risk

    Total

    Benefit

    19

    Threat : Any person, circumstance or event with the potential to causeloss or damage.

    Vulnerability: Any weakness that can be exploited by an adversary orthrough accident.

    Consequence: The amount of loss or damage that can be expected from asuccessful attack. Also refereed to as impact, loss or cost

    The RiskEquation

    Risk = Probability x Consequence

    = Function(Threat, Vulnerability, Consequence)

    20

    What is Risk Analysis?

    The process of identifying, assessing, and reducing risks to anacceptable level Defines and controls threats and vulnerabilities Implements risk reduction measures

    An analytic discipline with three parts: Risk assessment: determine what the risks are Risk management: evaluating alternatives for mitigating the risk Risk communication: presenting this material in an

    understandable way to decision makers and/or the public

    Risk analysis = Risk assessment + Risk management + Risk communic ation

  • 7/25/2019 W1INSE632

    6/12

    21

    Benefits of Risk Analysis

    Assurance that greatest risks have been identified and addressed Increased understanding of risks Mechanism for reaching consensus Support for needed controls

    Means for communicating results

    22

    Basic Risk Analysis Structure

    Evaluate Value of computing and information assets

    Vulnerabilities of the system

    Threats from inside and outside

    Risk priorities

    Examine Availability of security countermeasures

    Effectiveness of countermeasures

    Costs (installation, operation, etc.) of countermeasures

    Implement and Monitor

    Risk = Probability x Impact

    = Function(Threat,Vulnerability,Impact)

    23

    Example Critical Assets

    People and skills Goodwill Hardware/Software Data Documentation

    Supplies Physical plant Money

    Threats

    An expression of intention to inflict evil injury or damage Attacks against key security services

    Confidentiality, integrity, availability

    24

    Vulnerabilities

    Flaw or weakness in system that can be exploited to violatesystem integrity.

    Security Procedures

    Design Implementation

    Threats trigger vulnerabilities Accidental

    Malicious

  • 7/25/2019 W1INSE632

    7/12

    25

    Controls/Countermeasures

    Mechanisms or procedures for mitigating vulnerabilities Prevent

    Detect

    Recover

    Understand cost and coverage of control Controls follow vulnerability and threat analysis

    26

    Types of Risk Analysis: How to Calculate Risk?

    Quantitative Assigns real numbers to costs of safeguards and

    damage

    Annual loss exposure (ALE)

    Probability of event occurring

    Can be unreliable/inaccurate

    Qualitative Judges an organizations risk to threats

    Based on judgment, intuition, and experience

    Ranks the seriousness of the threats for the sensitivityof the asserts

    Subjective, lacks hard numbers to justify return oninvestment

    27

    Qualitative Risk Analysis

    Generally used in Information Security Hard to make meaningful valuations and meaningful probabilities

    Relative ordering is faster and more important

    Many approaches to performing qualitative risk analysis Same basic steps as quantitative analysis

    Still identifying asserts, threats, vulnerabilities, and controls

    Just evaluating importance differently

    Example:

    The system is weak in this area and we knowthat our adversary has the capability andmotivation to get to the data in the system so thelikelihood of this event occurring is high.

    28

    Criteria Development

    Simplified criteria

    Severity of Consequence

    Low, Medium or High

    Probability of Occurrence

    Use number between 0 and 1

    or L, M or H

    Qualitative Assessment

    Probability of Occurrence

    Low or 1

    = minimal or unlikely chance of occurrence

    Examples:One occurrence per 1000 years

    One occurrence per 50,000 units produced

  • 7/25/2019 W1INSE632

    8/12

    29

    Probability of Occurrence

    Medium or 2

    = medium or somewhat likely chance of occurrence

    Examples:

    One occurrence per 10 years

    One occurrence per 1000 units produced

    Qualitative Assessment

    Probability of Occurrence

    High or 3

    = maximum or very likely chance of occurrence

    Examples:

    One occurrence per year

    One occurrence per 50 units produced

    30

    Consequence of Occurrence

    Statement that defines actual impacts of risk occurring

    Example:

    Project/System = HouseRisk = Direct hit from F-4 tornado

    Consequence/Impact = People are injured or killed; house is severelydamaged or completed destroyed

    Qualitative Assessment

    Severity of Consequence

    Value that assigns a level of severity to the event

    Low or 1 = Minor or no injuries, minimal or no structuraldamage, cost impact of 90 days

    32

    Qualitative Representation of Risk

    Consequence of OccurrenceProbabilityof Occurrence

    Very Low

    Lo w

    Moderate

    High

    Very High

    Very Low Low Mo derat e High Very High

    Low Risk High RiskMedium Risk

    Qualitative risk representations are often used for quick evaluations and screening.

  • 7/25/2019 W1INSE632

    9/12

    33

    Risk analysis involves the identification and assessmentof the levels of risks calculated from the known values ofassets and the levels of threats to, and vulnerabilities of,those assets.

    It involves the interaction of the following elements: Assets Vulnerabilities

    Threats

    Impacts

    Likelihoods

    Controls

    Quantitative Risk AnalysisRisk Analysis Definition

    34

    Quantitative risk analysis methods are based on statisticaldata and compute numerical values of risk. They assign adollar value to risk.

    By quantifying risk, we can justify the benefits of spendingmoney to implement controls.

    It involves three steps Estimation of individual risks

    Aggregation of risks

    Identification of controls to mitigate risk

    Quantitative Risk AnalysisDefinitions

    35

    Quantitative Risk Analysis

    Risk = Risk-impact x Risk-Probability Loss of car: risk-impact is cost to replace car, e.g. $10,000

    Probability of car loss: 0.10

    Risk = 10,000 x 0.10 = 1,000

    Risk Management is about controlling risk. To control a risk Reduce the Probability

    and/or Reduce the Impact

    Single loss Expectancy (SLE): how much loss for one event?

    Risk calculation (per year): Annual Loss Expectancy (ALE) = SLE x Annual Rate of Occurrence (ARO)

    36

    Security risks can be analyzed by the following steps:

    1. Identify and determine the value of assets2. Determine vulnerabilities3. Estimate likelihood of exploitation

    Compute frequency of each attack (with & w/o controls) using statisticaldata

    4. Compute Annual Loss Expectancy Compute exposure of each asset given frequency of attacks

    5. Survey applicable controls and their costs6. Perform a cost-benefit analysis

    Compare exposure with controls and without

    controls to determine the optimum control

    Quantitative Risk AnalysisRisk Analysis Steps

    37 39

  • 7/25/2019 W1INSE632

    10/12

    37

    Identification of Assets and Vulnerabilities is the same forboth Qualitative and Quantitative Risk Analysis

    The differences in both of these is in terms of valuation: Qualitative Risk Analysis is more subjective and relative

    Quantitative Risk Analysis is based on actual numerical costsand impacts.

    Quantitative Risk AnalysisDetermining Assets & Vulnerabilities

    38

    Likelihood relates to the stringency of existingcontrols i.e. likelihood that someone or something will evade

    controls

    Several approaches to computing probability of anevent classical, frequency and subjective

    Probabilities hard to compute using classicalmethods Frequency can be computed by tracking failures that

    result in security breaches or create new vulnerabilitiescan be identified

    e.g. operating systems can track hardware failures, failed

    login attempts, changes in the sizes of data files, etc.

    Quantitative Risk AnalysisLikelihood of Exploitation

    39

    Difficult to obtain frequency of attacksusing statistical data. Why? Data is difficult to obtain & often inaccurate

    If automatic tracking is not feasible,expert judgment is used to determine

    frequency Approaches

    Delphi Approach: Probability in terms ofintegers (e.g. 1-10)

    Normalized: Probability in between 0 (notpossible) and 1 (certain)

    Quantitative Risk AnalysisLikelihood of Exploitation

    40

    Subjective probabilitytechnique originally devised todeal with public policydecisions

    Assumes experts can makeinformed decisions

    Results from several expertsanalyzed

    Estimates are revised untilconsensus is reached amongexperts

    Quantitative Risk AnalysisDelphi Approach

    Frequency Ratings

    More than once a day 10

    Once a day 9

    Once every three days 8

    Once a week 7

    Once in two weeks 6

    Once a month 5

    Once every four months 4

    Once a year 3

    Once every three years 2

    Less than once in three years 1

    41 43

  • 7/25/2019 W1INSE632

    11/12

    41

    Risk is usually measured as $ per annum and is quantified byrisk exposure. ALE (Annual Loss Expectancy, expressed as: $/year)

    If an event is associated with a loss LOSS = RISK IMPACT ($)

    The probability of an occurrence is in the range of: 0 (not possible) and 1 (certain)

    Quantifying the effects of a risk by multiplying risk impact byrisk probability yields risk exposure. RISK EXPOSURE = RISK IMPACT x RISK PROBABILITY

    = Function(Threat,Vulnerability,Impact)

    Quantitative Risk AnalysisRisk Exposure

    42

    Incorporating intangible assets within QuantitativeRisk Analysis is difficult as it is hard to put a price onthings such as trust, reputation, or human life.

    However, it is necessary to put an as accurate a valueas possible when factoring these assets within riskanalysis as they may be even more important thantangible assets.

    Quantitative Risk AnalysisIntangible Assets

    43

    Quantitative Risk AnalysisSummary

    Quantitative risk analysis involves statistical data and numericalvalues and can be used to justify the benefit of controls.

    While asset and vulnerability identification are the same forqualitative and quantitative methods, qualitative is more

    subjective and quantitative is more absolute. Probabilities can be calculated in multiple ways. This can be

    done using calculated values or the Delphi Approach (1-10) anda Normalized Approach (1,0), which are more subjective.

    44

    How to start and quit MATLAB?

    On both system leave a MATLAB session by typing :

    >> quit

    or by typing

    >> exit

    at the MATLAB prompt.

    PC - a double click on the MATLAB icon on

    your desktop

    unix system - setup MATLAB (return)

    MATLAB

    45 47

  • 7/25/2019 W1INSE632

    12/12

    45

    Getting started with MATLAB

    46

    Statistics with MATLAB

    Online help for Statistics Toolbox is available from the Matlab prompt (>> a

    double arrow), both generally (listing of all available commands):

    >> help stats

    [a long list of help topics follows]

    and for specific commands:

    >> help distool

    [a help message on the disttool function follows].

    >> help disttool

    DISTTOOL Demonstration of many probability distributions.

    DISTTOOL creates interactive plots of probability distributions.

    This is a demo that displays a plot of the cumulative distribution

    function (cdf) or probability distrib ution function (pdf) of the distributions

    in the Statistics Toolbox.

    47

    Plotting Probability Distributions

    >> disttool

    48

    Tips for success

    Start every assignment early Dont fall behind

    Ask if you dont know Do your own work

    Expect to spend enough time studying the material of the course

    Reading: Textbook

    Assignment #1 To be posted soon on Moodle