Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder...

36
1 Prof. Dr.-Ing. Hannes Federrath IT-Sicherheitsmanagement Economic Aspects Of Information Security Hannes Federrath Department Management of Information Security University of Regensburg

Transcript of Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder...

Page 1: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

1

Prof. Dr.-Ing.Hannes FederrathIT-Sicherheitsmanagement

Economic Aspects Of Information Security

Hannes Federrath

Department Management of Information SecurityUniversity of Regensburg

Page 2: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

2

Prof. Dr Hannes Federrath

2

Agenda

• What is information security?

• Technical building blocks

• Risk management cycle

• Return on Security Investment

• Architecture for Collectingquantitative historical data

Page 3: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

3

Prof. Dr Hannes Federrath

3

What is information security?

• Communication networks– a lot of users– quite a lot of

operators

Unauthorized acquisition of information

Unauthorized modification of information

Unauthorized impairment of functionality

Threats

Confidentiality

Integrity

Availability

Protection goals

Page 4: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

4

Prof. Dr Hannes Federrath

4

Radio waves

(Fixed) lines

inside(Trojan Horses)

Nodes (computers) communication channels

>dirAUTTOEXEC.BATCOMAND.COM.

Potential attacks

outside only

outside(electromagnetic radiation)

Page 5: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

6

Prof. Dr Hannes Federrath

6

Typical attack sequence

1. Gaining information– IP addresses, passwords,

entry points

2. Attack (mostly via the Internet)– exploits, weak protocols,

misuse of data/passwords etc.

3. Extension of access privileges– particularly installation of a

back door

4. remove traces– delete or manipulate log files

Confidentiality

Integrity

Availability

Protection goals

Page 6: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

8

Prof. Dr Hannes Federrath

8

Protection Goals

Confidentiality

Integrity

Availability

Subject of communicationWHAT?

Circumstances of communicationWHEN?, WHERE?, WHO?

AnonymityUnobservability

AccountabilityLegal Enforcement

Contents Sender

Recipient

Location

BillingContents

Sender

Recipient

Hiding

Page 7: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

9

Prof. Dr Hannes Federrath

9

Types of attacks

Confidentiality

Availability

Integrity

• Passive attacks– eavesdropping– traffic analysis

• Active attacks– masquerading

• man-in-the-middle attack

– modification of data

– injection of data• replay• flooding, spamming

– denial of service

Page 8: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

10

Prof. Dr Hannes Federrath

10

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Symmetric Encryption:– one key, two copies

• Asymmetric Encryption: two keys– public key: everybody knows it– private key: known by recipient

• Steganography:– hiding the existence of content

Page 9: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

11

Prof. Dr Hannes Federrath

11

x

random number r

plaintextciphertext

ksecret key

En-cryption

De-cryption

keygenerationk:=gen(r)

x plaintext

k(x)

k

Symmetric Encryption

• one key, two copies

Page 10: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

12

Prof. Dr Hannes Federrath

12

x message

ksecret key

Em-bedding

Ex-traction

x

message

k

Steganography

• hiding the existence of content

c cover

Page 11: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

13

Prof. Dr Hannes Federrath

13

c

x c(x)

random number r

plaintextciphertext

d

public key(cipher key)

private key (fordecryption)

En-cryption

De-cryption

keygeneration

x plaintext

(c,d):=gen(r)

secret area of recipient

Asymmetric Encryption

• two keys: public key and private key

RecipientSender

Page 12: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

14

Prof. Dr Hannes Federrath

14

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Symmetric Encryption:– one key, two copies

• Asymmetric Encryption: two keys– public key: everybody knows it– private key: known by recipient

• Steganography:– hiding the existence of content

Encryption and Steganography– Fast, secure and cheap!

PGP.comGnuPG.org

Page 13: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

15

Prof. Dr Hannes Federrath

15

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Message Authentication Codes– based on symmetric encryption– protects from modification by external

attacks– fast, secure and cheap

• Digital signatures– based on asymmetric encryption– two keys

• public key: everybody knows it• private key: known by recipient

– private key used to sign a document– public key used to verify– allows legal accountability and

enforcement (similar to contract signingin the real world)

Page 14: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

16

Prof. Dr Hannes Federrath

16

t

x x, sig(x)

random number

messagemsg/w signature andverification result msg/w signature

s

public key (testingof signatures)

privatesignature key

x, sig(x), Testen„ok“ oder „failed“

Signieren

keygeneration

Digital Signature

Recipient Sender

• only the sender cangenerate a signed message

secret area of sender

Page 15: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

17

Prof. Dr Hannes Federrath

17

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Digital signatures– based on asymmetric encryption– two keys

• public key: everybody knows it• private key: known by recipient

– private key used to sign a document– public key used to verify– allows legal accountability and

enforcement (similar to contract signingin the real world)

Page 16: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

18

Prof. Dr Hannes Federrath

18

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Digital signatures in the real world are– Fast, secure, but:

• Expensive!

• Digital signatures– based on asymmetric encryption– two keys

• public key: everybody knows it• private key: known by recipient

– private key used to sign a document– public key used to verify– allows legal accountability and

enforcement (similar to contract signingin the real world)

More exactly: Tech. cheap Orga. expensive

Page 17: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

19

Prof. Dr Hannes Federrath

19

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Public key infrastructure (expensive)– authenticity of public keys has to be

ensured by technical (cheap) andorganizational (expensive) means:

• digital key certificates (e.g. X.509)• Certification authority has to

– check physical identification documents– process is handled by paper (legal

issues)– for every user, year after year

• Costs (for handling paperwork and thephysical process)– 10 - 150 EUR per certificate p.a.

• 80 Mill. Germans: > 1 billion EUR– Who should pay for the security?

The signer The recipient

Page 18: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

20

Prof. Dr Hannes Federrath

20

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Protection of privacy– Anonymity: Protection of the identity of

a user while using a service (e.g.counseling services)

– Unobservability: Protection of thecommunication relations of users

• Internationally agreed privacy principles(e.g. EU Privacy Directive of 1995)– no covert collections of personal

information– informed consent to purpose prior to

collection– retention and use only according to

agreed purpose

Page 19: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

21

Prof. Dr Hannes Federrath

21

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Reality:– organizations ignore privacy– international

• Privacy activists– develop anonymization tools

• http://tor.eff.org• http://www.anon-online.org

• To respect the privacy laws is1. a matter of legal compliance,2. a marketing issue (acceptance of privacy

friendly systems) and3. cheap!

No storage of personal data, noeffort for privacy protection.

Page 20: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

22

Prof. Dr Hannes Federrath

22

Technical building blocks

ConfidentialityHiding

IntegrityAccountabilityLegal Enforcement

AnonymityUnobservability

Availability

• Availability:– ensures that data and services are

accessible to the user within a certainperiod of time

• Two Mechanisms:– Redundancy: duplication of components

or repetition of operations to providealternative functional channels in case offailure

– Diversity: functional identical channelswith a variety of designs provide reliablefunctionality in case of (software) failure

• Redundancy and diversity:– Expensive

Risk management

Page 21: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

23

Prof. Dr Hannes Federrath

23

Identification

Control

Assessment

Monitoring

ChecklistsWorkshopsHistor. data

Experts

BaselineQualitative

Quantitative

Best PracticeScoringQuant.

Methods

ChecklistsScorecardsBusinessRatios

Securitymanagementis a riskmanagementtask

Risk management cycle

Page 22: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

24

Prof. Dr Hannes Federrath

24

Identification of threats

• Question– »What are the threats?«

• Methods & Tools– checklists– workshops– attack trees– fault trees

• Challenge– cover all threats

Page 23: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

25

Prof. Dr Hannes Federrath

25

Assessment of threats

• Question– »What are the probabilities and

consequences of threats?«– Risk = probability * consequence

• Methods & Tools– qualitative assessment– quantitative assessment– game theory

• Challenges– dependency from assets– strategic attackers– correlations between threats– source of (quantitative) input

low med high

low

med

high

Probability of damage

Cos

ts o

f dam

age

Risik

Page 24: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

26

Prof. Dr Hannes Federrath

26

Control of threats

• Question– »How to handle risks?«

• Methods– best practice approaches– baseline protection

Risik assessment

Entire risk Risik avoidance

Protection measures

Damage limitation

ShiftingSecurity architecture

Emergencyplan

Insurances

according to: Schaumüller-Bichl

Residual risk

Page 25: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

27

Prof. Dr Hannes Federrath

27

Monitoring of risks and measures

• Questions– »Were the measures effective and efficient?«

»What is the current protection level?«

• Method– scorecard approaches

according to: Loomans, 2002

Page 26: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

28

Prof. Dr Hannes Federrath

28

Identification

Control

Assessment

Monitoring

ChecklistsWorkshopsHistor. data

Experts

BaselineQualitative

Quantitative

Best PracticeScoringQuant.

Methods

ChecklistsScorecardsBusinessRatios

Quantitativesecuritymanagementneedsquantitativedata

Risk management cycle

Page 27: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

29

Prof. Dr Hannes Federrath

29

Return on Security Investment (ROSI)

• based on the calculation of an annual loss expectancy for a certainundesirable event (threat): (FIBS 1979)

• aggregation of ALEs of several events:(Soo Hoo 2000)

• Return on security investment: (Wei et. al 2001)

• if ROSI >0 then investment was advantageous

ALE0-ALE1: change of theALE from year 0 to year 1

Cost: cost of the securitymeasure

!

ALE = SLE " ARO

Oi: harmful outcome i

S(Oi): Severity of Oi (inmonetary units)

ALE: annual loss expectancy

SLE: single loss expectancy

ARO: annual rate ofoccurrence

!

ALE = S(Oi)Fi

i =1

n

"

!

ROSI = ALE0" ALE

1" cost

Page 28: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

30

Prof. Dr Hannes Federrath

30

• ROSI– Alternative calculation as a ratio: (Sonnenreich et. al. 2006)

– Another variation: (Pfleeger and Pfleeger 2003)

• Advantages– Different security measures can now be compared.– Security investments can now be compared with other

investments (non-security).

difference of risk exposurebefore and after reduction inrelation to the costs of themeasure

!

ROSI =(risk exposure "% risk mitigated) # cost

cost

!

risk leverage =(risk exp. before red.)" (risk exp. after red.)

cost of risk reduction

Return on Security Investment (ROSI)

Page 29: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

31

Prof. Dr Hannes Federrath

31

cost

benefit

do something

= nothing happens

cost

benefit

do the right

= nothing happens

Detailed information(numbers) on past events

cost-benefitanalysis

Some information from thepast

...

Quantitative data is needed

• Risk assessment needs input:– probability of a security-related event and– level of damage (cost in case of …)

• Problem:– enterprises are not willing to reveal such information– loss of reputation/trust

Page 30: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

32

Prof. Dr Hannes Federrath

32

Potential Sources for Quantitative Data

Not applicable to allsituationsNot yet available

Capital market analysesExploit derivativesBug challenges

Market Mechanisms

Widely used in otherareas (e.g. insurances)Past != FutureHardly available so far

Good, however reliableinput data is needed

Used frequently, butnot originallyquantitativeSubjective, incomplete

Evaluation

CERTS collect data onsecurity eventsInternal incidentreporting

Historical Data

Historical simulationsMonte carlo simulations

Simulations

Interviews with internalor external expertsCSI/FBI Survey

Expert Judgements

ExampleMechanism

Page 31: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

33

Prof. Dr Hannes Federrath

33

Idea: Collecting quantitative historical data

• Idea– Building a system for the collection of quantitative historical data

on security incidents from different organizations

• Goal– A database that gives information about impact and frequency of

security incidents

• Existing approaches have a different focus

• Microeconomic theory shows the utility of that concept

• Various possibilities to use that data– Risk assessment, investment decisions– Benchmarking between organizations– Examination of statistical distribution functions, correlations

Page 32: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

34

Prof. Dr Hannes Federrath

34

ExternalSources

CERTsHoneynetsExpertsSurveys

PlatformProvider

Participant A

Participant B

Participant C

IncidentData

Aggreg.Data

AdditionalData

Basic Architecture

Page 33: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

35

Prof. Dr Hannes Federrath

35

IncidentDescription

IncidentEffects

IncidentHandling

OrganizationalSetting

Reports

RiskParameters

Input and Output

Page 34: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

37

Prof. Dr Hannes Federrath

37

Fairness Requirements

• Two major problems known from economics– Free-riding– Truth-telling

• Mechanisms– Incentive system– Reputation system– Legal framework– Statistical checks for plausibility

Page 35: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

38

Prof. Dr Hannes Federrath

38

Current State of Implementation

• Web-based multi-tier Application– Java Servlets, JavaServer Pages PostgreSQL

• Taxonomy realized as XML-schema– All incident reports in XML

• Already implemented– Data collection/transfer– Data storage

• Next steps– Data analysis mechanisms– Interface for ext. data– Deciding on mechanisms

to provide fairness

Page 36: Economic Aspects Of Information Security · –injection of data ... , Testen „ok“ oder „failed“ ... –dependency from assets –strategic attackers –correlations between

Management of Information Security

41

Prof. Dr Hannes Federrath

41

Conclusions

• Security management becomes more challenging– Increasing dependence on information systems– Growing number of threats– Compliance requirements

• Security management is a risk management task– Measuring costs and benefits of security is challenging– Quantitative data is needed for modern security management– Historical data might be a solution for that problem

Thank you!

Prof. Dr. Hannes FederrathLehrstuhl Management der InformationssicherheitUniversität RegensburgD-93040 Regensburg

E-Mail: [email protected]: http://www-sec.uni-regensburg.de

Phone +49-941-943-2870Telefax +49-941-943-2888