The document establishes a unified methodological approach to identifying information security threats and developing models of information security threats in state information systems (hereinafter referred to as information systems), in which information is protected in accordance with the Information Security Requirements that do not constitute state secrets contained in state information systems , approved by order of the FSTEC of Russia of February 11, 2013 No. 17 (registered by the Ministry of Justice of Russia on May 31, 2013, reg. No. 28608).
')
By decision of the operator of personal data, the Methodology can be used to determine ... the security of personal data when they are processed in personal data information systems, the protection of which is ensured in accordance with the Composition and content of organizational and technical measures to ensure the security of personal data when they are processed in personal data information systems,
approved by order of the FSTEC of Russia of February 18, 2013 No. 21 (registered by the Ministry of Justice of Russia on May 14, 2013, reg. No. 28375).
The method does not apply to the identification of threats to the security of information constituting a state secret.
The Methodology uses terms and their definitions established by national standards in the field of information security.
Information security threat assessment is carried out by an expert method.
... the physical and logical boundaries of the information system must be defined, in which information protection measures for which the operator is responsible are taken and controlled, as well as the protection objects and information system segments.
The process of identifying information security threats is organized by a division of the operator designated as responsible for protecting information in the information system.
The sources of threats to the security of information may be actors (individuals, organizations, states ) or phenomena (man-made accidents, natural disasters, other natural phenomena).
Information security threat is relevant (UBIJA), if for an information system with given structural and functional characteristics and features of operation, there is a likelihood of the threat being considered by the violator with the corresponding potential and its implementation will lead to unacceptable negative consequences (damage) from breach of confidentiality, integrity or availability of information .
In the absence of statistical data on the implementation of information security threats (the occurrence of security incidents) in the information system and / or information systems of the same type, the relevance of the information security threat is determined based on an assessment of the feasibility of the information security threat (Yj)
To identify threats to the security of information in the information system are defined:
- capabilities (type, type, potential) of violators that they need to implement threats to the security of information;
- vulnerabilities that can be used when implementing information security threats (including specially implemented software bookmarks);
- methods (methods) of implementing information security threats;
- objects of the information system, which are directed to the threat of information security (objects of influence);
- the result and consequences of the realization of information security threats.
When determining possible ways to implement threats to the security of information, it is necessary to proceed from the following conditions:
- the offender may act alone or as part of a group of offenders;
- with respect to the information system, an external intruder may act in conjunction with an internal violator;
- threats can be implemented at any time and at any point of the information system (on any node or host) ;
- to achieve its goal, the offender chooses the weakest link in the information system.
- changes in the requirements of the legislation of the Russian Federation on the protection of information, regulatory legal acts and methodological documents governing the protection of information;
- changes in the configuration (composition of the main components) and features of the information system, which resulted in the emergence of new threats to information security;
- identifying vulnerabilities leading to the emergence of new threats to information security or to an increase in the possibility of realizing existing ones;
- the appearance of information and facts about the new opportunities of violators.
Threats to the security of information in the information system can be implemented by the following types of violators:
- special services of foreign states (blocs of states);
- terrorist, extremist groups;
- criminal groups (criminal structures);
- external subjects (individuals);
- competing organizations;
- developers, manufacturers, suppliers of software, hardware and software and hardware;
- Persons involved in the installation, commissioning, installation, commissioning and other types of work;
- persons ensuring the functioning of information systems or servicing the infrastructure of the operator (administration, security, cleaners, etc.);
- information system users;
- information system administrators and security administrators;
- former employees (users).
As possible goals (motivation) for the implementation by violators of threats to the security of information in the information system can be:
- damage to the state, its individual areas of activity or sectors of the economy;
- implementation of threats to the security of information for ideological or political reasons;
- the organization of a terrorist act;
- damage to property by fraud or other criminal means;
- discrediting or destabilizing the activities of state bodies and organizations;
- gaining competitive advantage;
- the introduction of additional functionality in software or software and hardware at the design stage;
- curiosity or desire for self-realization;
- the identification of vulnerabilities for the purpose of their further sale and financial gain;
- implementation of threats to the security of information from revenge;
- implementation of information security threats unintentionally due to negligence or unqualified actions.
Depending on the access rights, violators may have legitimate physical (immediate) and (or) logical access to information system components and (or) information contained in them or not have such access.
Access rights analysis is carried out, at a minimum, with respect to the following
information system component:
- input / output (display) devices;
- wireless devices;
- software, software and hardware and technical means of information processing;
- removable computer storage media;
- computer storage media out of service;
- active (switching) and passive equipment of communication channels;
- communication channels outside the controlled area.
The results of the assessment of violators' capabilities are included in the violator model, which is an integral part (section) of the information security threat model and contains:
- types, types and potential of violators who can ensure the realization of information security threats;
- goals that can be pursued by violators of each type in the implementation of information security threats;
- possible ways to implement information security threats.
Causing property damage through fraud or other criminal means.
Curiosity or desire for self-realization (proof of status).
Revenge for previously committed actions.
Identification of vulnerabilities for the purpose of their further sale and financial gain.
Unintended, careless or unqualified actions.
The probability of the realization of a threat to the security of information is understood to be an indicator defined by an expert, characterizing how likely the implementation of the j-th threat to the security of information in an information system with given structural and functional characteristics and features of functioning is. Three verbal gradations of this indicator are introduced:
- low probability - there are no objective prerequisites for the implementation of the j-th information security threat, there is no required statistics on the facts of the j-th information security threat (occurrence of security incidents), there is no motivation for the j-th threat, the possible frequency of the j-th threat is not exceeds 1 time in 5 years;
- medium probability - there are prerequisites for the implementation of the j-th information security threat, there are cases of the j-th information security threat occurrence (occurrence of security incidents) or there is other information indicating the possibility of the j-th information security threat, there are signs that the intruder has motivation for the realization of such a threat, the possible frequency of realization of the j-th threat does not exceed 1 time per year;
- high probability - there are objective prerequisites for the implementation of the j-th information security threat, there is reliable statistics on the implementation of the j-th information security threat (occurrence of security incidents) or there is other information indicating a high possibility of realizing the j-th information security threat; motives for the realization of the j-th threat, the frequency of the j-th threat - more often 1 time per year.
In the absence of the required data to assess the likelihood of a threat to the security of information or doubts about the objectivity of expert assessments when determining verbal gradations of the likelihood of a threat to information security, the relevance of the j-th threat to the security of information is determined based on an assessment of its feasibility (Yj).
The possibility of implementing the j-th information security threat (Yj) is estimated based on the level of information system security (Y1) and the potential of the offender.
When identifying information security threats at the stage of creating an information system in the event that information protection measures are not implemented or their sufficiency and effectiveness are not assessed, the possibility of implementing the j-th information security threat (Yj) is assessed relative to the level of information system design security.
- Creating prerequisites for harming the health of citizens.
- The possibility of disruption of the objects of life support of citizens.
- Organization of pickets, strikes, rallies and other actions.
- Layoffs
- Increasing the number of complaints to state or local authorities.
- .
- () ().
- , .
( , , ):
- , ;
- ;
- ;
- , ;
- ;
- ( ).
, , , () .
, , . , .
, («», «», «» «», «» ). , .
, . (), () , .
, (ubi.fstec.ru), , 4 8 , 16 2004 . β 1085.
, , , , .
, , , , . , , .
, .
Source: https://habr.com/ru/post/258685/
All Articles