Information Technology Sector Risk Management Stra

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

InformationTechnologySectorRiskManagementInformationTechnologySectorRiskManagementStrategyfortheProvideDomainNameResolutionServicesCriticalFunctionJune2011InformationTechnologySectorRiskManagementContentsExecutiveSummary.......................................................................................................................................i1InformationTechnologySectorRiskManagementOverview................................................................12RiskOverview–ProvideDomainNameResolutionServicesCriticalFunction....................................23ProvideDomainNameResolutionServicesRiskManagementStrategy.............................................43.1RiskofConcern–InformationDisclosure/PrivacyLoss(ManmadeUnintentional)......................63.1.1RiskOverview...........................................................................................................................63.1.2RiskResponse..........................................................................................................................73.2RiskofConcern–PolicyFailure:BreakdownofSingle,Interoperable,GlobalInternet(ManmadeDeliberate).............................................................................................................................103.2.1RiskOverview.........................................................................................................................103.2.2RiskResponse........................................................................................................................113.3RiskResponsetoLargeScaleAttackonInfrastructure:DenialofService(ManmadeDeliberate)163.3.1RiskOverview.........................................................................................................................163.3.2RiskResponse........................................................................................................................18FiguresFigure1:ProvideDomainNameResolutionServicesAttackTree(Summary)...........................................3Figure2:ProvideDomainNameResolutionServicesRelativeRiskTable.................................................4Figure3:InformationDisclosure/PrivacyLoss(DNS3)...............................................................................7Figure4:EffectivenessofProposedMitigationStrategytoInformationDisclosure/PrivacyLoss...............8Figure5:BreakdownofSingle,Interoperable,GlobalInternet(DNS1).....................................................11Figure6:EffectivenessofProposedMitigationStrategytoBreakdownofSingle,Interoperable,GlobalInternet........................................................................................................................................................15Figure7:DenialofServicebyLargeScaleAttackonInfrastructure(DNS2a)..........................................18Figure8:EffectivenessofProposedMitigationStrategytoLargeScaleAttackonInfrastructure.............20TablesTable1:DNSRiskandMitigationOverview.................................................................................................iiTable2:ITSector‘sHighConsequenceRisksforDNS...............................................................................2Table3:DNSRiskandMitigationOverview.................................................................................................5Table4:FeasibilityofProposedMitigationStrategytoInformationDisclosure/PrivacyLoss......................9Table5:FeasibilityofProposedMitigationStrategytotheBreakdownofSingle,Interoperable,GlobalInternet........................................................................................................................................................16Table6:FeasibilityofProposedMitigationStrategytoLargeScaleAttackonInfrastructure....................21ExecutiveSummaryPublicandprivateInformationTechnology(IT)Sectorownersandoperatorscompletedthefirst-everfunctions-basedriskassessmentinAugust2009.TheITSectorBaselineRiskAssessment(ITSRA)assessesrisksfrommanmadedeliberate,manmadeunintentional,andnaturalthreatsusingthreat,vulnerability,andconsequenceframeworkswithintheSector‘sriskassessmentmethodology.TheITSRAresultedinacomprehensivebaselineITSectorRiskProfilethatidentifiesnational-levelrisksofconcernfortheITSector.Publicandprivatesectorpartnerscollaborativelydevelopedtheassessment,whichreflectsparticipatingsubject-matterexperts‘(SME)expertiseandcollectiveconsensus.SectorpartnersaresystematicallyaddressingtherisksofconcernforeachcriticalfunctionbyengaginginriskmanagementanalyseswhereinSMEsassessthemeritsanddrawbacksoftakingoneoffourapproachestoriskmitigation:Avoidtherisk;Accepttheriskanditspotentialconsequences;Transfertherisktoanotherentity,capability,orfunction;orMitigatetheriskbypreventativeorproscriptiveaction.Wheremitigationisthepreferredriskresponse,ITSectorpartnersidentifyappropriateRiskMitigationActivities(RMA)toreducenational-levelrisksacrosseachcriticalfunctionbasedonSMEinput.Theidentifiedriskresponsesandtheprioritizationofth

1 / 26
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功