Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk...

28
Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!” Seminar May 3 rd 2019 @ Hong Kong Albert Hui GREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, GSEC, CISA, CISM, CRISC

Transcript of Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk...

Page 1: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Information SecurityfromRisk Managementand Design

Build a Secure Cyberspace 2019

“Phishing scams? No more!” Seminar

May 3rd 2019 @ Hong Kong

Albert HuiGREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, GSEC, CISA, CISM, CRISC

Page 2: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Who am I?

Spoke at Black Hat,ACFE Asia Pacific Fraud Conference,HTCIA Asia Pacific Forensics Conference, andEconomist Corporate Network.

Risk & Security Consultant forBanks, Government and Critical Infrastructures.

Digital Forensic Analyst & Fraud Investigator.

Co-designed Hong Kong’s firstDigital Forensics coursefor the HK Police Force and ICAC by HKUST.

Albert HuiGREM, GCFA, GCFE, GNFA, GCIA, GCIH, GXPN, GPEN, GAWN, GSNA, GSEC, CISA, CISM, CRISC

[email protected] ec urI ty Ro n i n

Page 3: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Security pitfalls #1:Inappropriate controls

Source: https://www.redbubble.com/people/memecentral/works/21912648-question-mark-guy-meme-transparent?p=sticker

Page 4: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Security pitfalls #2:Inadequatethreatmodeling

Source: https://getyarn.io/yarn-clip/80499338-efe7-43e5-970e-5e7a79cbf3a2

Page 5: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Security pitfalls #2:Inadequate threat modeling

Source: https://www.scmp.com/news/hong-kong/hong-kong-economy/article/2170803/hong-kong-monetary-authority-expects-uncover-more

Case Study

Page 6: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

5 StepsofRiskManagement

1. Identify

2. Analyze

3. Prioritize

4. Treat

5. Monitor

Page 7: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Asset Identification:What do you want to Protect?

Data

Process

Identify your important assets(mission-critical / business-critical / crown jewel):

Examples:• Customer information• Supplier procurement records• Design blueprints• …

Examples• e-Commerce / Shopping Cart operations (for online shops)• Power generation (for power plants)• …

Page 8: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Possible Loss Identification:What can you Possibly Lose?

Primary losses:• Money• Customer data (e.g. credit card data)• Proprietary information (design blueprints, strategic plans, etc.)• Goodwill, brand damage and reputation loss• …

Secondary losses:• Fines & penalties, loss of license, insurance premium• Victim compensation (e.g. monetary compensation, credit monitoring)• Cleanup cost (e.g. investigation and remediation)• …

Page 9: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Threat Identification:What isThreat?

Opportunity

Threat

Copyright © 2019 Albert Hui. All Rights Reserved

Page 10: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

ThreatModeling:ThreatActors

Secular Sacred

egomoney

ideology(e.g. hacktivists)

revenge(e.g. former

employees)

curiosityindustrial

espionage

war & terrorism(e.g. state-sponsored

hackers)political

(e.g. unfavorable

foreign government

policies)

Copyright © 2019 Albert Hui. All Rights Reserved

Page 11: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Threat Modeling:Dataflow Diagram (DFD)

Source: https://security.ufl.edu/it-workers/risk-assessment/creating-an-information-systemdata-flow-diagram/

Example of a good DFD

Page 12: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Threat Modeling:Plausible Attacks

Source: https://security.ufl.edu/it-workers/risk-assessment/creating-an-information-systemdata-flow-diagram/

Page 13: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

ThreatModeling:ThreatActions

STRIDE Model

Spoofing identity

Tampering

Repudiation

Information disclosure

Denial of service

Elevation of privilege

Page 14: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Identification:What isRisk?

Risk

Loss Event Frequency

Threat Event Frequency

Contact Frequency

Probability of Action

Vulnerability

DifficultyThreat

Capability

Loss Magnitude

Primary

LossSecondary Loss

Secondary Loss Event

Frequency

Secondary Loss Magnitude

Risk

Likelihood Impact

FAIR (Factor Analysis of Information Risk)Risk Ontology

Copyright © 2019 Albert Hui. All Rights Reserved

Page 15: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Analysis:Likelihood

Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf

MIL-STD-882E

Page 16: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Analysis:Impact

Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf

MIL-STD-882E

Page 17: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Analysis:Risk Matrix

Source: https://www.system-safety.org/Documents/MIL-STD-882E.pdf

MIL-STD-882E

Page 18: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Prioritization

•……High

•……High

•……Serious

•……Serious

•……Serious

•……Medium

•……Medium

•……Low

•……Low

•……Low

•……Low

•……Low

•……Low

•……Low

•……Low

•……Low

•……Low

Risk Level

Page 19: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Overview Vulnerability

Impact

Terminate

Tolerate

Treat

Threat

Risk

Transfer

Analysis Treatment

Page 20: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Option 1: Transfer

Examples:• Purchase an insurance policy• Use a payment processor instead of

handling transactions on your own• Host system on a cloud platform• …

Page 21: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Option 2: Terminate

Page 22: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Option 3: Tolerate

Page 23: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Option 4:Treat(Mitigate)

Page 24: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Treatment:Mitigationcontrols

Preventive Detective Corrective

firewall

encryption

backup antivirus

threathunting

restore

block

Page 25: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Examples

Asset at Stake:

Plausible Compromise:

One Possible Mitigation Control:

Shopping cart operations

Hacker gain access to DB and destroy data

Deploy WAF

Example 1:

Asset at Stake:

Plausible Compromise:

One Possible Mitigation Control:

Shopping cart operations

System / DB goes down and corrupt data

Daily backup

Example 2:

Asset at Stake:

Plausible Compromise:

One Possible Mitigation Control:

Shopping cart history

Backup lost (due to hacking or accident)

Backup to write-only media

Example 3:

Page 26: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Risk Monitoring

Page 27: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

KeyTakeaways

1. Know your assets

2. Know your threats

3. Rank your risks

4. Design corresponding controls

Page 28: Build a Secure Cyberspace 2019 “Phishing scams? No more ... · Information Security from Risk Management and Design Build a Secure Cyberspace 2019 “Phishing scams? No more!”

Thank [email protected]