Главная страница
Навигация по странице:

  • 5.2.1 Physical Access Control

  • 5.2.2 Application Controls

  • 5.2.3 Audit Trails

  • 5.2.4 Classification Markings

  • 5.2.5 Contingency Plan

  • Основы ИБ. Фан_6363_лаб-7-23.12. Отчет по лабораторной работе 7 по дисциплине Основы информационной безопасности Тема а нализ рисков с использованием программного обеспечения RiskWatch 1


    Скачать 185.49 Kb.
    НазваниеОтчет по лабораторной работе 7 по дисциплине Основы информационной безопасности Тема а нализ рисков с использованием программного обеспечения RiskWatch 1
    АнкорОсновы ИБ
    Дата17.09.2022
    Размер185.49 Kb.
    Формат файлаdocx
    Имя файлаФан_6363_лаб-7-23.12.docx
    ТипОтчет
    #681689
    страница3 из 7
    1   2   3   4   5   6   7
    1.4 RiskWatch Parameters and Data Analysis

    RiskWatch Parameters
    This section provides the parameters selected by the Risk Analysis Team and approved by the work group for use in this analysis. The information provided includes the hours and days of operation, the number of records handled, the number of users, and the questionnaire non-compliance threshold.
    Name of Organization: COMPANY IBS

    Number/Code of Organizational Unit: 7611003390

    System to be analyzed: Server for Sbis++

    How many days/week does system operate: 6

    How many hours/day does system operate: 9

    Down time before serious consequences: 2

    Time to replace Minimum Function: 0.5

    Number of full-time users: 37

    Data sensitivity level: 1

    Security mode: C1

    Orange Book Level: Proprietary

    Maximum $$ handled: $15,873.

    Interpret xx% or more as 100 xx = 60

    (answers less than 85% were flagged as potential vulnerabilities)
    Figure 3: Summary of Parameters
    Data Analysis

    [[[

    The team began the risk analysis by preparing and distributing questionnaire diskettes to 113 individuals. Included among these individuals were COMPANY IBS and NAME employees, Central Office and Regional Office System Security Officers, RACF Group Administrators, and NAME and non-COMPANY IBS users of the DATA CENTER. Although diskettes were sent to a broad range of users, the scope of the risk analysis was limited to the DATA CENTER.
    Each diskette contained 449 questions from which the respondents were instructed to select and answer questions in one or more functional areas. Each participant was instructed to indicate how each question (statement) applied or was perceived by the person on a scale of 0 (low) to 100 (high). If the question was not applicable or the person was unfamiliar with it, he or she was instructed to respond "N".
    The team received 102 completed diskettes. The response diskettes were downloaded to the RiskWatch program which processed the responses to produce a list of vulnerabilities (weaknesses) which were reviewed by the risk analysis team and validated by a review team comprised of COMPANY IBS and NAME managers and technical experts.
    Using the validated set of applicable vulnerabilities and a list of assets which was prepared by the risk analysis team and validated by the Director, NAME, the risk analysis team used the RiskWatch software to determine the applicable threats and annual loss expectancies and develop a set of recommended safeguards which, if implemented, could substantially reduce potential losses.

    ]]]
    VULNERABILITY AREA REPORT
    OVERALL COMPLIANCE:


    VULNERABILITY AREA: Access Control

    There is 100% compliance in this area of vulnerability.
    VULNERABILITY AREA: Accountability



    VULNERABILITY AREA: Administration

    There is 100% non-compliance in this area of vulnerability.
    VULNERABILITY AREA: Audit Trails



    VULNERABILITY AREA: Construction

    There is no information available for this area of vulnerability.
    VULNERABILITY AREA: Contingency Plan



    VULNERABILITY AREA: Data Integrity



    VULNERABILITY AREA: Disclosure

    There is 100% non-compliance in this area of vulnerability.
    VULNERABILITY AREA: Documentation

    There is 100% non-compliance in this area of vulnerability.
    VULNERABILITY AREA: Evaluation

    There is 100% compliance in this area of vulnerability.
    VULNERABILITY AREA: Labeling

    There is no information available for this area of vulnerability.
    VULNERABILITY AREA: Maintenance

    There is no information available for this area of vulnerability.
    VULNERABILITY AREA: Organization



    VULNERABILITY AREA: Privacy Act

    There is 100% compliance in this area of vulnerability.
    VULNERABILITY AREA: Procedures



    VULNERABILITY AREA: Reliability

    There is no information available for this area of vulnerability.
    VULNERABILITY AREA: Terminal Site

    There is no information available for this area of vulnerability.
    VULNERABILITY AREA: Training


    VULNERABILITY DISTRIBUTION REP0RT
    Those individual questions that indicate the largest degree of perceived vulnerability, as tallied from the responses, are shown below.

    Following each question is its associated area of vulnerability.

    1. Contingency/disaster recovery plans and procedures are reviewed and tested on an annual basis?
    Vulnerability Area: Contingency Plan
    2. Reproduction facilities and copy machines are secured or locked to prevent abuse?
    Vulnerability Area: Accountability
    3. The organization has established effective and verifiable inspection procedures for packages, briefcases, and other materials.
    Vulnerability Area: Procedures
    4. The network (NOS) system files are kept in a protected directory or are encrypted by the system (i.e. password files, configuration files, etc.)?
    Vulnerability Area: Disclosure
    5. In-house developed code is adequately protected from editing by unauthorized users?
    Vulnerability Area: Data Integrity
    6. Sufficient controls and procedures exist to ensure data is validated at each point as it moves from one medium to another?
    Vulnerability Area: Data Integrity
    7. All code is protected from unauthorized and illegal duplication?
    Vulnerability Area: Data Integrity
    8. The application documentation has sufficient references to internal audit and security controls to ensure validation of record accesses, to monitor unauthorized access to sensitive data, and to assess system integrity?
    Vulnerability Area: Documentation
    9. All employees in the organization receive IT security awareness training annually?
    Vulnerability Area: Training
    10. All new employees are scheduled for IT security awareness training immediately upon reporting to the organization?
    Vulnerability Area: Training
    11. There are controls in place to inhibit the re-employment of employees terminated from other government agencies for cause?
    Vulnerability Area: Procedures
    12. Additions, deletions, and modifications to financial and other sensitive programs and databases are regularly reviewed by the responsible data/application owner and/or knowledgeable independent organizational element.
    Vulnerability Area: Audit Trails
    13. All data files are accounted for on servers or systems?
    Vulnerability Area: Accountability
    14. The organization has written policy for the accountability, control and release of equipment and material from the facility?
    Vulnerability Area: Accountability
    15. The agency security staff maintains documentation on the results of testing of the security protective features?
    Vulnerability Area: Documentation
    16. The organization has staffed an effective internal audit function to be used for the development and maintenance of a system of internal controls and to provide the needed internal audit support?
    Vulnerability Area: Organization
    17. Applications and systems have been reviewed to determine if they are sensitive, according to the integrity, availability, and confidentiality criteria?
    Vulnerability Area: Administration
    18. Ownership of all data files have been established and files are accounted for on servers or systems?
    Vulnerability Area: Accountability
    19. Program and/or function managers are involved in developing contingency plans for their critical business functions?
    Vulnerability Area: Contingency Plan
    20. All system changes or new releases are tested using formal procedures and approved before being placed in operational use?
    Vulnerability Area: Data Integrity
    21. In order to prevent loss, there are controls in place to screen candidates for employment.
    Vulnerability Area: Procedures
    22. Controls are in place to assure that vacant positions are filled in a timely fashion.
    Vulnerability Area: Organization
    23. Automated information processing systems are established and enforced or are under development to meet present and anticipated human resource management needs?
    Vulnerability Area: Organization
    24. The organization has a quality assurance and performance monitoring program?
    Vulnerability Area: Training
    25. The organization has budgeted and maintains a viable and technologically advanced training program to ensure organizational effectiveness, availability of sufficient job skills and high morale?
    Vulnerability Area: Training
    26. Users are required to verify that the information in their files and reports is in accordance with their expectations?
    Vulnerability Area: Data Integrity
    27. Users have proper training in recovery of data and/or backup procedures?
    Vulnerability Area: Training
    28. All security investigation reports are maintained for at least three years or the time required by regulations?
    Vulnerability Area: Audit Trails
    29. All data files are periodically reviewed by data/ application owners?
    Vulnerability Area: Data Integrity
    30. Users are restricted to those applications, screens, and data they need to perform their current duty assignments?
    Vulnerability Area: Access Control
    31. Network and system administrators have received IT security awareness training which includes agency policy, procedures, and responsibilities for network and system management?
    Vulnerability Area: Training
    32. The organization has established confidentiality policy and has issued directives, guidelines and operating procedures?
    Vulnerability Area: Privacy Act
    33. All data files are backed up and stored off-site in accordance with a prescribed schedule?
    Vulnerability Area: Contingency Plan
    34. There is continuous accountability and control for all equipment and materials maintained by the organization?
    Vulnerability Area: Accountability
    35. The organization has established a centralized authority to coordinate and approve all computer hardware and software purchases?
    Vulnerability Area: Organization
    36. The facility has been audited for security within the last twelve months?
    Vulnerability Area: Evaluation
    37. The training budget is sufficient to support the organization's total training needs?
    Vulnerability Area: Training
    38. All emergency equipment, plans and procedures are tested on a periodic basis?
    Vulnerability Area: Contingency Plan
    39. The organization uses error checking software when performing file transfers between its systems and networks and those owned and managed by other agencies and/or businesses?
    Vulnerability Area: Data Integrity
    40. Procedures are in place and enforced to ensure that all documentation required by federal, state and local statutes are obtained and maintained in employee personnel files?
    Vulnerability Area: Procedures
    41. The organization has a viable, verifiable system of accountability and control for all equipment and material entrusted to the organization?
    Vulnerability Area: Accountability

    The areas of vulnerability associated with the questions above are shown below, ranked according to the number of questions in each.

    Following the table is a chart indicating the relative importance of each area of vulnerability, as determined from the question set.

    Vulnerability Areas Number of Questions

    1. Data Integrity 7

    2. Training 7

    3. Accountability 6

    4. Organization 4

    5. Procedures 4

    6. Contingency Plan 4

    7. Documentation 2

    8. Audit Trails 2

    9. Evaluation 1

    10. Access Control 1

    11. Privacy Act 1

    12. Disclosure 1

    13. Administration 1

    14. Labeling 0

    15. Maintenance 0

    16. Reliability 0

    17. Terminal Site 0

    18. Construction 0


    5.2 FULL SAFEGUARD REPORT
    This report contains information about each safeguard, including a cost benefit analysis.
    5.2.1 Physical Access Control
    Lifetime: 3 Implementation Cost: $20,000. Annual Maintenance Cost: $500.
    Year Benefits Costs Disc. Ben(0.1) Disc. Cost(0.1) DB-DC(0.1)

    1 $3,501. $20,000. $3,182. $18,181. $-14,998.

    2 $3,501. $500. $2,893. $413. $2,480.

    3 $3,501. $500. $2,630. $375. $2,254.

    Sum of discounted benefits (0.05): $9,533.

    Sum of discounted benefits (0.1): $8,705.

    Sum of discounted benefits (0.15): $7,993.

    Sum of discounted costs (0.05): $19,931.

    Sum of discounted costs (0.1): $18,969.

    Sum of discounted costs (0.15): $18,097.

    Benefit Cost Ratio (0.05): 0.48

    Benefit Cost Ratio (0.1): 0.46

    Benefit Cost Ratio (0.15): 0.44

    Return On Investment (0.05): 0.16

    Return On Investment (0.1): 0.15

    Return On Investment (0.15): 0.15

    Payback period (0.05): 0

    Payback period (0.1): 0

    Payback period (0.15): 0

    5.2.2 Application Controls
    Lifetime: 3 Implementation Cost: $500. Annual Maintenance Cost: $50.
    Year Benefits Costs Disc. Ben(0.1) Disc. Cost(0.1) DB-DC(0.1)

    1 $15,148. $500. $13,770. $454. $13,316.

    2 $15,148. $50. $12,518. $41. $12,477.

    3 $15,148. $50. $11,380. $37. $11,343.

    Sum of discounted benefits (0.05): $41,250.

    Sum of discounted benefits (0.1): $37,668.

    Sum of discounted benefits (0.15): $34,586.

    Sum of discounted costs (0.05): $564.

    Sum of discounted costs (0.1): $532.

    Sum of discounted costs (0.15): $503.

    Benefit Cost Ratio (0.05): 73.05

    Benefit Cost Ratio (0.1): 70.62

    Benefit Cost Ratio (0.15): 68.42

    Return On Investment (0.05): 24.35

    Return On Investment (0.1): 23.54

    Return On Investment (0.15): 22.81

    Payback period (0.05): 1

    Payback period (0.1): 1

    Payback period (0.15): 1

    5.2.3 Audit Trails
    Lifetime: 5 Implementation Cost: $1,000. Annual Maintenance Cost: $500.
    Year Benefits Costs Disc. Ben(0.1) Disc. Cost(0.1) DB-DC(0.1)

    1 $3,967. $1,000. $3,606. $909. $2,697.

    2 $3,967. $500. $3,278. $413. $2,865.

    3 $3,967. $500. $2,980. $375. $2,604.

    4 $3,967. $500. $2,709. $341. $2,368.

    5 $3,967. $500. $2,463. $310. $2,152.

    Sum of discounted benefits (0.05): $17,174.

    Sum of discounted benefits (0.1): $15,036.

    Sum of discounted benefits (0.15): $13,296.

    Sum of discounted costs (0.05): $2,638.

    Sum of discounted costs (0.1): $2,348.

    Sum of discounted costs (0.15): $2,108.

    Benefit Cost Ratio (0.05): 6.50

    Benefit Cost Ratio (0.1): 6.40

    Benefit Cost Ratio (0.15): 6.30

    Return On Investment (0.05): 1.30

    Return On Investment (0.1): 1.28

    Return On Investment (0.15): 1.26

    Payback period (0.05): 1

    Payback period (0.1): 1

    Payback period (0.15): 1

    5.2.4 Classification Markings
    Lifetime: 3 Implementation Cost: $500. Annual Maintenance Cost: $50.
    Year Benefits Costs Disc. Ben(0.1) Disc. Cost(0.1) DB-DC(0.1)

    1 $1,920. $500. $1,745. $454. $1,290.

    2 $1,920. $50. $1,586. $41. $1,545.

    3 $1,920. $50. $1,442. $37. $1,404.

    Sum of discounted benefits (0.05): $5,227.

    Sum of discounted benefits (0.1): $4,773.

    Sum of discounted benefits (0.15): $4,382.

    Sum of discounted costs (0.05): $564.

    Sum of discounted costs (0.1): $532.

    Sum of discounted costs (0.15): $503.

    Benefit Cost Ratio (0.05): 9.26

    Benefit Cost Ratio (0.1): 8.95

    Benefit Cost Ratio (0.15): 8.67

    Return On Investment (0.05): 3.09

    Return On Investment (0.1): 2.98

    Return On Investment (0.15): 2.89

    Payback period (0.05): 1

    Payback period (0.1): 1

    Payback period (0.15): 1

    5.2.5 Contingency Plan
    Lifetime: 2 Implementation Cost: $1,000. Annual Maintenance Cost: $200.
    Year Benefits Costs Disc. Ben(0.1) Disc. Cost(0.1) DB-DC(0.1)

    1 $158. $1,000. $143. $909. $-765.

    2 $158. $200. $130. $165. $-34.

    Sum of discounted benefits (0.05): $293.

    Sum of discounted benefits (0.1): $273.

    Sum of discounted benefits (0.15): $256.

    Sum of discounted costs (0.05): $1,133.

    Sum of discounted costs (0.1): $1,074.

    Sum of discounted costs (0.15): $1,020.

    Benefit Cost Ratio (0.05): 0.26

    Benefit Cost Ratio (0.1): 0.26

    Benefit Cost Ratio (0.15): 0.25

    Return On Investment (0.05): 0.13

    Return On Investment (0.1): 0.13

    Return On Investment (0.15): 0.13

    Payback period (0.05): 0

    Payback period (0.1): 0

    Payback period (0.15): 0
    1   2   3   4   5   6   7


    написать администратору сайта