<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Model-based Information Security Risk Assessment Method for Science Gateways</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Evert Mouw</string-name>
          <email>post@evert.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Guido van 't Noordende Baas Louter Silvia Delgado Olabarriaga</string-name>
          <email>baas.louter@amc.uva.nl</email>
          <email>guido@science.uva.nl</email>
          <email>guido@science.uva.nl Email: baas.louter@amc.uva.nl Email: s.d.olabarriaga@amc.uva.nl</email>
          <email>s.d.olabarriaga@amc.uva.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Amsterdam University of Amsterdam University of Amsterdam</institution>
          ,
          <country>The Netherlands The Netherlands The Netherlands</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Amsterdam</institution>
          ,
          <country country="NL">The Netherlands</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-BACKGROUND: Information Security is important for e-Science research groups and other small organisations that design and operate science gateways and virtual research environments, especially when such environments are being used for (bio)medical research. We propose a novel method to do risk assessments: MISRAM, the Model-based Information Security Risk Assessment Method. It uses an information architecture model, a method to assign values to information assets and IT components, and a method to calculate risks. The output of MISRAM is a ranked list of risks and a list of actionable tasks to solve the main issues.</p>
      </abstract>
      <kwd-group>
        <kwd>MISRAM</kwd>
        <kwd>risk assessment</kwd>
        <kwd>information security</kwd>
        <kwd>eScience</kwd>
        <kwd>science gateway</kwd>
        <kwd>DCRA</kwd>
        <kwd>IT&amp;T</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>Science gateways are community tools, typically web
portals, that enable and facilitate access to distributed
infrastructures such as computational Grids. These portals are developed
by teams of e-Science experts in various fields (distributed
computing, user interfaces, data management, visualisation,
etc), and are typically operated by (subsets of) the same
teams as a service for the end-users, which are experts in
other scientific domains, not necessarily in computing. Typical
services include high-throughput or -performance computing,
visualisation, and access to data or application repositories.
Science gateways are therefore complex systems that combine
a large number and variety of software components under the
same ‘container’. Very often some of these components are
packages developed by other parties or services provided
remotely. For a detailed discussion about the types, technologies,
and required properties of science gateways, please refer to the
Science Gateway Primer recently published by the EGI-Inspire
Virtual Team on Science Gateways1.</p>
      <p>
        The e-BioScience group in the Academic Medical Center
(AMC) in Amsterdam, the Netherlands, offers a science
gateway, coined e-BioInfra gateway, for experimental data analysis
in the fields of high-resolution medical imaging, genomics, and
proteomics [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The backend is based on scientific workflow
management technology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], and makes use of grid-based
computing resources. Using such distributed resources for
sensitive medical data requires a solid security policy. This
is particularly true when intrinsically identifyable DNA data
is involved [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Ideally, the gateway should be subject to
Risk Management [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] following recommendations given by
standards such as ISO 27002 and the related Dutch standard
for information security management in healthcare, NEN 7510.
An important element of both standards is the execution of a
good Risk Assessment (RA), where a systematic analysis of
security aspects of the system is carried out.
      </p>
      <p>Concerned with the security features of the e-BioInfra
gateway, and driven by the increasing awareness of biomedical
researchers about privacy and ethical issues related to the
information that they process through this system, it was
decided to conduct a risk assessment of the e-BioInfra gateway.
In this paper, our risk assessment method is presented, together
with an example based on a simplified version of the risk
calculations to illustrate the approach. The experience obtained
by applying a modified risk assessment method at the AMC
is also presented. The method worked well for this e-Science
environment, providing insights and raising awareness about
the security of the e-BioInfra gateway. The method could also
be useful to other groups that develop and operate science
gateway services.</p>
      <sec id="sec-1-1">
        <title>A. Some specific needs for science gateways</title>
        <p>The distributed nature of the data processing, the amount
of data and computing, and the organisational characteristics
of a science gateway are unique. A particular aspect for
science gateways is that components can be internal or external
information processing systems which are owned by different
organisations. Therefore, the method applied should facilitate
the analysis of these interdependencies, following a
modelbased approach.</p>
        <p>
          1https://documents.egi.eu/public/RetrieveFile?docid=1463&amp;version=
10&amp;filename=Science Gateway Primer v092 nComments.pdf)
A typical e-Science group is small and consists of highly
skilled experts who develop and maintain their own software.
These properties make it hard for external security experts to
carry out a Risk Assessment. In fact, such outside analysts
often lack inside information and good working knowledge
on the technical components used by a science gateway. Our
method takes a multiple-stakeholder approach, also favoured
by Zambon et al. [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ], where people who manage the system
and the users of the system are involved in the risk assessment.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>B. Introduction to Risk Assessments</title>
        <p>
          The goal of doing a Risk Assessment (RA) is to get
an overview of the most relevant risks threatening some
system, person or organisation. For example, when playing
chess, a simple risk assessment would include the dangers
associated with losing the center pawns early in the game.
Risks and dangers are measured as probabilities. Even in a
deterministic game like chess, risk assessments come down
to probabilities [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Calculating such probabilities, and thus
risk, can become a messy business if the situation becomes
complicated [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]: “A complicated chess position requires deep
calculations and is more likely to cause a human player to
make an error.”
        </p>
        <p>A risk assessment is a method to estimate risks. In this
paper, we will focus on estimating the most important risks for
information systems used in science, such as science gateways.
Which information security risks threaten such gateways and
how to estimate them? How does one identify the main risks
and causes of such risk?</p>
        <p>Risk exists when something of value (e.g. an asset) could
be lost or damaged. Many different definitions of risk are being
used2. ISO 31000:2009 defines risk as effect of uncertainty
on objectives. A common idea is that risk is a probability or
potential that some unwanted event will happen in the future.
We use the following definition: risk is the chance of some
bad event happening multiplied with the impact of that event.
So, risk is likelihood multiplied with impact costs (damage).</p>
        <p>The “something of value”, which we will call an asset,
must be defined for the risk assessment. Assets include
information (such as patient data, customer lists, software, source
code, process data) and IT assets (such as server hardware).
The value of an asset is linked to the impact when such an
asset would become unavailable (e.g. due to a computer virus
or hardware failure) or would be compromised (such as theft
of data). For an information security risk assessment, we will
focus solely on information assets.</p>
        <p>Information assets are abstract assets that are stored in
some concrete form. An example is the knowledge a worker
has about the production process. This knowledge is an
information asset, but it cannot be easily backed up or copied.
Another information asset could be instructions (information)
contained in a manual, which would be far easier to copy.</p>
        <p>
          According to the UK National Archives [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], there are two
dimensions to value an information asset:
2For more definitions of risk, see http://en.wikipedia.org/wiki/Risk
Business value for an organisation or an individual
(e.g. a patient). This also includes scientific value. In
this text, this will just be called value.
        </p>
        <p>Confidentiality of the information. Who should have
access (scope or domain) and who should have not?
For example, the fire brigade needs to know where a fire
started in order to send the fire engine to the right location.
That is of high business value, so such information should
be reliable and available to the fire fighters. But it isn’t
confidential at all. Banks holding the money of their clients do
store information with both business value and confidentiality.
But even if there is little business value, some information
can still be confidential, e.g. bank transfers to a small savings
account.</p>
      </sec>
      <sec id="sec-1-3">
        <title>C. Vulnerability to unintentional errors and intentional attacks</title>
        <p>
          An information asset can be stolen and sold (e.g. creditcard
information), but it can also be damaged. A component in an
IT infrastructure can be vulnerable to intentional attacks and
also to unintentional errors, also called unintentional mistakes.
Experts can indicate the confidence they have in the security
of components by estimating the probability of intentional
and unintentional failures. These factors are used to measure
vulnerability by NIST SP 800-33 [8, p. 18] and Cisco [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ].
The total vulnerability is a summation of the vulnerability to
unintentional errors and the vulnerability to intentional attacks.
        </p>
      </sec>
      <sec id="sec-1-4">
        <title>D. Model-based vs. checklist-based Risk Assessments</title>
        <p>
          There are many methods to choose from to perform a
Risk Assessment (RA). Most of them consist of a list of
‘items’ to check or score. According to Morali et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ],
current mainstream risk assessment methods “do not take
the IT architecture of the system under examination”. In
contrast to the checklist-based RA methods, a model-based
or architecture-based method provides richer possibilities for
the analysis of complex systems.
        </p>
        <p>Architecture-based RA methods start from a model of
an information system, taking into account aspects such as
dependencies between components and value of the
information manipulated by them. This makes it possible to take
architectural aspects into account.</p>
        <p>
          We found only four RA methods recently described in
the literature which use a model-based approach, namely:
CORAS [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ], Qualitative Time Dependency (QualTD) [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ],
RiskM (‘Risk Method’) [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], and Distributed Confidentiality
Risk Assessment (DCRA) [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. A thorough analysis of
modelbased RA methods is described by Mouw [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. We concluded
on on the basis of that work [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ] that the DCRA [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] is the
most adequate for our use-case.
        </p>
      </sec>
      <sec id="sec-1-5">
        <title>E. Enterprise layers</title>
        <p>
          DCRA uses a modelling of the ‘enterprise’ that resembles
the ArchiMate modelling language [15, p. 3] and distinguishes
three main layers [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]:
The Information layer consists of Information
Assets. 3
The Application layer supports the information layer
with services that are realised by (software)
applications.
        </p>
        <p>The Technology layer offers infrastructural services
(e.g., processing, storage and communication services)
needed to run applications, and is realised by computer
and communication hardware and system software.</p>
      </sec>
      <sec id="sec-1-6">
        <title>F. DCRA’s IT&amp;I model</title>
        <p>At the heart of DCRA lies the IT assets and Information
(IT&amp;I) model. The information assets (I) are distributed over
supporting IT assets (IT ). For an example, see fig. 1.</p>
        <p>workflow system (service)
web client
for a user
workflow activity</p>
        <p>database
laptop
server</p>
        <p>Information Assets
(information layer)
Applications
(application layer)
Hardware &amp; system software
(technology layer)</p>
        <p>In the example (fig. 1), 100% of the information asset
“workflows” could be assigned to the application “workflow
activity database”, and 10% of “workflows” could be assigned
to the application “web client”. Both of these applications,
which reside in the application layer, are mapped to
components in the technology layer. E.g., the web client could
be running on a laptop. For DCRA, if the database server is
vulnerable, then the impact is higher then when the laptop is
vulnerable, because more of the information asset is mapped
to the workflow database.</p>
        <p>II.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>A NOVEL RA METHOD: MISRAM</title>
      <p>
        Although DCRA [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provides an excellent foundation, it is
not optimised for the context of science gateways. The method
is labour-intensive due to its detailed information model and
somewhat complex calculations, and only measures risk of
confidentiality breaches. MISRAM simplifies the calculation
model for pragmatic reasons, which comes at the cost of
precision reduction (see the Discussion). We extended the
model to measure both the confidentiality and business value of
information [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Furthermore, we decided to use the expertise,
3In AchiMate, the Information layer is called the Business layer. It
offers products and services to external customers, which are realised in the
organisation by business processes performed by business actors. In DCRA
and MISRAM, this business layer is replaced by an information layer. An
information layer has not all the entities a business layer has, and some are
simplified. For example, actors will become abstract users.
including implicit knowledge, of the e-Science group members
to assess the security of the IT components of the science
gateway. We used (and recommend) surveys to assess all
components of the IT infrastructure.
      </p>
      <p>Our method was not designed to easily find so-called
“low-hanging fruit” (easy to fix problems), but to find those
problems that are most likely to cause real damage. The
method generates a prioritised list of issues that need to be
addressed for security improvement.</p>
      <p>
        We call our modified method ‘MISRAM’, an acronym for
“Model-based Information Security Risk Assessment Method”.
It is based on an enterprise information model proposed
by DCRA [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], and an overview of the whole MISRAM
procedure is presented shortly.
      </p>
      <p>To do a risk assessment for an organisation, one first
needs to create an information model. The model should
contain indicative numbers for business values, confidentiality
indicators, attack vulnerabilities, and chances of unintentional
errors. One could use surveys or other methods to obtain
those numbers. And then, after the calculations are done and a
ranking of relative risks is made, one needs to translate these
relative risks to a risk classification, such that this information
can serve as input for the risk management coordinator.</p>
      <sec id="sec-2-1">
        <title>A. MISRAM: the whole picture</title>
        <p>We have broken down the whole MISRAM process in ten
steps. Part of these can be executed in parallel. See fig. 2 for
a graphical representation of the workflow.</p>
        <p>2. Create a list of
information assets
4. Assign values to
information assets</p>
        <p>1. Preparation
3. Create an overview
of all IT components
5. Measure trust in
the IT components
6. Create an
information architecture
and IT&amp;I model
8. Do questionnaire-based</p>
        <p>interviews
7. Calculate risks
9. Analyse high-risk components
and problem areas
10. Write an integrated
risk assessment report</p>
        <p>1) Preparation: Form a project team, agree on roles and
responsibilities, and make a project plan. Determine the scope:
what is the unit or group that will be assessed, who are the
stakeholders internal and external to that unit, and what is the
environment of the unit?</p>
      </sec>
      <sec id="sec-2-2">
        <title>2) Create a list of information assets: It is important to</title>
        <p>obtain a detailed list. The best way to collect such a list is
to interview different stakeholders such as internal developers
and administrators, business managers, clients, and suppliers.
The detailed list should be reduced to a list that is clear, short,
and has no overlaps. These information assets will comprise
the information layer.</p>
      </sec>
      <sec id="sec-2-3">
        <title>3) Create an overview of all IT components: The IT</title>
        <p>components of an organisation typically comprise (business)
applications, operating (system) software, and hardware. The
applications will comprise the application layer. The system
software and the hardware will comprise the technology layer.
Also external computation and storage facilities such as cloud
or grid resources must be listed.</p>
        <p>
          4) Assign values to information assets: All stakeholders
should be invited to score the value of the information assets,
e.g. by using a small survey. For each information asset,
participants are asked to score the importance of two
dimensions: business value and confidentiality. Many scoring
systems are possible; we suggest a relative value on a
fivepoint Likert scale [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ], using the values none, low, moderate,
high, very high. Also provide a no answer option. Additionally,
you should include a question on the type of stakeholder,
such as end-user or scientist or developer or manager, if
you want to differentiate on stakeholders later in the process.
This differentiation, however, will not be further discussed
here. Finally, when using a survey, keep it short to promote
participation and to avoid selection bias – busy people don’t
have time for extensive surveys. Always include a comment
field to allow free-text comments.
        </p>
        <p>The calculation of values from scores depends largely on
the number of interviews. Using the median is not such a good
idea because a survey often uses discrete responses. When
e.g. six of the respondents assign value ‘3’, and the seven
others assign ‘4’, then the mean (3.5) represents the average
opinion better than the median (4). A ‘no answer’ value does
not influence the mean, but many ‘no answer’ scores on an
component could raise a red flag: the respondents don’t feel
sure about such a component.</p>
        <p>In a small group, just one person with a somewhat extreme
opinion can have a large influence on the mean score, which
might be undesirable. A good method to reduce the influence
of such outliers is to use a truncated (trimmed) mean. The x%
trimmed mean leaves out the highest and the lowest values.
Often a value of 20% for x is chosen, in which case the 10%
highest values and the 10% lowest values are removed and the
mean is taken over the remaining values4.</p>
        <p>
          Some group members might have more knowledge and
experience than others. To take into account their expertise level,
a question can be included in the survey asking the respondent
to estimate her/his level of expertise or experience. There are
various methods to classify expert levels. One well-known
way to do this is the Dreyfus model of skill acquisition [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
A modification to that model was made by Schempp, who
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>4A short introduction to trimmed means:</title>
      <p>
        http://en.wikipedia.org/wiki/Truncated mean
renamed “Advanced Beginner” to “Capable” [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. The five
levels of expertise of Dreyfus-Schempp are: Novice, Capable,
Competent, Proficient, Expert.
      </p>
      <p>5) Measure trust in the IT components: Confidence or trust
in the reliability or security of components that are in the
application and the technology layers of the architecture can be
measured by surveying or interviewing experts: the developers,
administrators and expert users of those components. The
same comments on designing surveys from step 4 are equally
important here.</p>
      <p>For all components, ask the experts how they assess
security and reliability of a component, based on two factors:
the vulnerability of the components for intentional attacks and
the vulnerability for unintentional errors.</p>
      <sec id="sec-3-1">
        <title>6) Create an information architecture and IT&amp;I model:</title>
        <p>The method described in section I-F can be applied here. All
main information assets and IT components should be included
if their risks and effects are of interest, but it is not advisable to
add too much detail; it is considered most productive to focus
on the big picture. If architectural documents already exist, be
careful to examine whether they are up-to-date.</p>
        <p>7) Calculate risks: The likelihood of trouble happening
is probed by the measured trust in the IT components. The
costs are determined by the value and confidentiality of the
information assets. The method used to calculate risks in
MISRAM is described in section II-C.</p>
        <p>The result of this process is a ranked list of information
assets that are under risk (in our model, the risk of losing
business value or losing confidentiality).</p>
        <p>The calculated risk values lack a risk classification to
determine whether a particular asset is in fact at ‘high’,
‘medium’, or ‘low’ risk. For example, if the complete system
is already highly trusted by the interviewees, even the largest
value coming out of the calculation might be in practice
considered at “low risk”. The risk classification should be
carried out in e.g. a group meeting.</p>
        <p>8) Do questionnaire-based interviews: Some security
related issues fall outside the scope of the architecture-based
approach. Examples are password and clean desk policies,
employee screening, and so on. Furthermore, some specific
issues might be required to assess because of sector-specific
regulations, such as the NEN 7510 in the Dutch healthcare
system. A questionnaire based on local needs and legal
requirements should be created, and then used for interviews
with employees.</p>
        <p>The interviews could reveal vulnerabilities that were not
found using the earlier steps. One example is the handling of
user data; although the group members could in theory give
a low score to the business value and/or the confidentiality of
user data, often a legal liability exists.</p>
      </sec>
      <sec id="sec-3-2">
        <title>9) Analyse high-risk IT components and problem areas:</title>
        <p>IT components cause high risk because, for example, they are
not trusted or they store or process valuable or confidential
information. Such high-risk components are identified in the
earlier steps and they should now be further investigated. Also
important vulnerabilities that emerged from the
questionnairebased interviews should likewise be given extra attention.</p>
        <p>The goal in this step is to create a list of specific, concrete
security problems that can be contained or fixed by specified
actions. A good way to discuss and investigate the high-risk IT
components and vulnerabilities is to organise a group meeting.</p>
        <p>10) Write an integrated risk assessment report: A risk
assessment report should be written to document the methods
and results and to serve as a starting point for actions directed
to mitigate risk. The report should include an overview of
the organisation that was assessed and the general approach
that was being used, present the results for each step, and
summarise the main security risks and their causes. This report
should also contain a ranked list of information assets that are
under risk.</p>
      </sec>
      <sec id="sec-3-3">
        <title>B. Calculations</title>
        <p>MISRAM first limits its goal to finding a relative ranking
of risks. We estimate risk using the value of an information
asset multiplied with the vulnerability of the IT components
concerning two factors, intentional attacks and unintentional
errors. A weighted average can be used to give more emphasis
to one or the other. For example, a reason to give more
emphasis to unintentional errors could be that one expects
that the group members are better at scoring the risk of
unintentional errors than scoring the risk of intentional attacks.</p>
        <p>The vulnerability score</p>
        <p>is calculated as follows:
= 2
(( )
attacks + (1
)
errors)
with 2 [0:0; 1:0] representing the weight given to the
risk of attacks relative to errors estimated by the experts. With
= 0:5, the formula simply becomes:</p>
        <p>= attacks + errors</p>
      </sec>
      <sec id="sec-3-4">
        <title>C. Example of a calculation in MISRAM</title>
        <p>We will use a simple example to clarify the method of
calculation. See fig. 3 to understand the following example.
We are going to calculate the risk of losing business value
riskfvg. Note that riskfvg must be calculated separately from
the risk of losing confidentiality riskfcg. The latter will not
be calculated in this example.</p>
        <p>Each component has a vulnerability score that consists
of a vulnerability to intentional attacks and a chance of
unintended errors. For the server, the equation would be:
server = attacks + errors = 3 + 1 = 4</p>
        <p>The information asset workflows has business value 2. It
is stored and processed using a web client (vulnerability score
for intentional attacks = 1 and for unintentional errors = 2)
with webclient = 1 + 2, on a laptop with laptop = 4 + 4.
Also, all workflows are processed by a database server with
db = 2 + 1, which runs on the physical server with server
(see above).</p>
        <p>The total risk for the business value riskfvg of workflows
is calculated as the value of workflows (as estimated with a
Doing this for all information assets will create a list of all
business value risks and will show which information assets are
web client</p>
        <p>~
attacks = 1
errors = 2</p>
        <p>~
sum{v} = 6
sum{c} = 12
laptop</p>
        <p>~
attacks = 4
errors = 4</p>
        <p>~
sum{v} = 16
sum{c} = 32
Fig. 3: Example of an DCRA IT&amp;I risk calculation in our
modified and simplified fashion. Three layers can be recognised:
the boxes on top represent information assets (information
layer), the ellipses in the middle represent software
applications (application layer), and the bottom ellipses represent
system-level software and hardware (technology layer). ‘Value’
is business value, ‘conf.’ is confidentiality, ‘riskfvg’ is the
risk of losing business value for that information asset, and
‘riskfcg’ is the risk of losing confidentiality. See the main text
on how the calculations are done.
survey), multiplied with the summed vulnerability scores of
the IT components that process or store workflows:
riskfvgworkf lows
= 2
most at risk. The same method can be used for confidentiality
risk (not shown here).
and (intentional) attacks associated with the IT components in
the application and technology layers.</p>
        <p>To calculate how much risk for business value a component
causes, one needs to sum all the partial risks that it causes
for all the information assets that it stores or processes (is
connected to). In the example, server has a sumfvg = 8,
because it is connected to one information asset workflows
with value 2 and server itself has a vulnerability of 3+1 = 4.</p>
        <p>III.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>CASE STUDY: MISRAM APPLIED TO THE</title>
      <p>E-BIOINFRA GATEWAY</p>
      <p>
        We tested MISRAM at the e-BioScience group at the
AMC, from now on simply referred to as ‘group’. With the
cooperation of the group members, who were regarded as
experts and were being surveyed, we assessed the information
security risks for the whole infrastructure for which the group
is responsible, including a science gateway. The first author
of this paper was responsible for carrying out the assessment
and also participated in the group as an IT administrator at the
time. The group members participated in the various meetings,
interviews and surveys described below. The full report on this
case study [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] is not public for security reasons, but details
might be requested by contacting the authors.
      </p>
      <sec id="sec-4-1">
        <title>A. Creating an inventory and a model</title>
        <p>A meeting was held to determine the enterprise
architecture, including business services. The proposed enterprise
architecture model was later modified based on individual
interviews with developers. Finally, agreement was reached on
the main IT components and connections between them.</p>
        <p>The technology layer of the e-BioInfra is split in a ‘physical
and system’ layers and an external ‘grid’ layer. Grid resources
include computing elements and storage elements. The whole
model appears as having four layers, with an additional
separate grid layer, which better represents the separation of the
grid services from the technical and organisational aspects of
the e-BioInfra.</p>
        <p>Another group meeting was held to identify the information
assets, during which the concept of information assets was
explained and discussed. Later, in private interviews, suggestions
were made by some group members to add information assets
or to add more detail by splitting up some assets. One group
member commented on the generic nature of one information
asset, arguing for more detail. Such discussions should be
closed before the information asset survey starts. Otherwise,
the list of information assets might change after the survey,
and the survey needs to be repeated. A meeting or a group
manager decision can help to determine a final list.</p>
        <p>The enterprise architecture (modelled using ArchiMate)
was combined with the information assets to create an
information architecture, modelled using IT&amp;I. Most group members
understood the IT&amp;I without much explanation. The IT&amp;I
diagram was created using Archi (http://archi.cetis.ac.uk/).</p>
        <p>Then, a survey was carried out to assign business values
and confidentiality values to the information assets. Most group
members (5) participated in the survey.</p>
        <p>Another survey asked the group members to give their
opinion on the risk or vulnerability of (unintentional) errors</p>
      </sec>
      <sec id="sec-4-2">
        <title>B. Identifying risks</title>
        <p>A simple C++ program was developed to calculate the risks
from the IT&amp;I relations, the survey data about the business
value and confidentiality of the information assets and the
vulnerability to errors and attacks of the IT components.
Trimmed means were used to compensate for outliers. From
the ranked list of calculated risks, it became clear that three
IT components have the highest cumulative risk:
1)
2)
3)</p>
        <p>The server that hosts the science gateway software
and other e-BioInfra applications, including a
workflow engine.</p>
        <p>The external computations done on the grid.</p>
        <p>The workflow system itself.</p>
        <p>The server itself scored very reasonably on the vulnerability
survey, as the group experts showed trust in its security. Still,
the server ended up as one of the main causes of risk because
of all the applications it hosts.</p>
        <p>A generic questionnaire based on NEN 7510 was also
applied. It helped to identify a number of additional security
issues, mostly related to behaviour and to organisational
policies, such as account management and desktop policies. A few
major problems became clear from the generic questionnaire,
which could be solved by these concrete actions:</p>
        <p>All group members should lock their screens when
they leave their desk. Controls and incentives should
be put in place to enforce this.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>All mobile devices should use encrypted storage. Let those not on payroll and apprentices sign an non-disclosure agreement. Note that this is standard procedure for AMC employees.</title>
      <p>When an employee leaves, accounts should be
promptly revoked.</p>
      <p>There should be a reporting and logging facility for
security incidents.</p>
    </sec>
    <sec id="sec-6">
      <title>Web applications should use SSL (HTTPS).</title>
      <p>Although these actions seem quite obvious, they sometimes
are not carried out in academic settings, where mutual trust and
intellectual curiosity characterise the culture on the workplace.</p>
      <p>The results of the risk calculation and the questionnaire
were discussed during a meeting. The group members agreed
that the three identified high-risk IT components were
important, and voiced their trust in the method used to identify the
components and formalise the implicit knowledge in the group.
A few actionable measures were proposed, but also a small
generic discussion on information security started. The meeting
helped to raise awareness and to identify the most important
practical tasks.</p>
      <p>DISCUSSION</p>
      <p>The proposed MISRAM method has been successfully
applied at the e-Science group at the AMC to assess the risks
of the e-BioInfra platform and its science gateway. The group
was satisfied with the insights delivered by MISRAM, which
indicated practical measures to better address the security
regulations for digital processing of medical data. Although
we are encouraged by this first result, MISRAM needs to be
tested with other groups and other types of scientific gateways
for a more conclusive evaluation. Below we present a reflection
of aspects that influence the method’s performance.</p>
      <sec id="sec-6-1">
        <title>A. Usage of expertise in e-Science groups</title>
        <p>MISRAM makes use of the (implicit) knowledge of the
people that develop, administer and support the e-BioInfra
science gateway. Information assets and component vulnerabilies
can be determined by interviewing or surveying these group
members.</p>
        <p>Typical e-Science groups do their own development and
systems administration, and employ a team of experts on
the IT components of their own architecture. These experts
build the (software) infrastructure that stores and processes
the information. Such information includes both assets of
the group itself and information assets from external parties
(users).</p>
        <p>The expertise of the developers of a science gateway on
the local security situation might exceed the expertise of an
external security expert. Their knowledge on errors within the
technical infrastructure is based on their day-to-day experience,
so the infrastructure experts can be trusted to have a good
feeling for the vulnerability to unintentional errors for such
a component. On the other hand, they are not per se security
experts. Their knowledge on specific attack routes and security
vulnerabilities (e.g., SQL injection attacks) might be limited.
Therefore, an internal expert’s judgement of the vulnerability
to intentional attacks might be less dependable.</p>
      </sec>
      <sec id="sec-6-2">
        <title>B. Risk for whom?</title>
        <p>In the case of the e-BioInfra, only the experts have been
interviewed, which could indicate a bias towards internal
information assets of the system.</p>
        <p>The emphasis given to group members focuses the risk
assessment on the internal stakeholders. MISRAM mainly
measures the risk as perceived by the group and the group
members. It does not take into account the risk for external
parties such as users and, for example, patients. However, these
kinds of risk are not at odds with each other. A low-risk science
gateway is very likely to pose low risk for external parties as
well.</p>
      </sec>
      <sec id="sec-6-3">
        <title>C. Simplifications</title>
        <p>MISRAM leaves out the percentage-based mapping of
information assets used in the original DCRA. An information
asset is linked to an IT component, or it is not. MISRAM
also leaves out the propagation likelihood of worms and other
attack vectors between nodes. Both simplifications come at a
cost: our model is less precise than DCRA. The advantages
are those of simple models: MISRAM is easy to work with
and the reasoning and results are easy to communicate.</p>
        <p>Note that MISRAM can easily be extended to include the
full DCRA model, which could be benefitial to assess more
complex systems or environments.</p>
      </sec>
      <sec id="sec-6-4">
        <title>D. Connectivity</title>
        <p>A component that is linked to many information assets will
cause much risk because it is a hub; all information assets are
in danger when such a hub is compromised. So, even a well
administered server might cause quite some risk because so
much depends on it. This could be called the “hub effect”. This
begs for the question of whether MISRAM measures risk or
just measures the connectivity of a component. Is it reasonable
to assign much risk to a hub, even if such a hub is well secured
and shows little vulnerabilities?</p>
        <p>One way to reduce the influence of this hub effect is to
compensate a component for having many relations
(connections) with information assets or with IT components. As an
extreme example, one could divide the total risk caused by
a component by the number of information assets to which
the component is connected, resulting in the average risk per
information asset caused by the component. A high average
generated risk indicates that the component itself is vulnerable,
regardless of the number of information assets to which it is
connected.</p>
        <p>Still we argue that IT components that are connected to
many information assets are nearly always for a good reason
on the priority list to harden against security problems. Such
connected components are critical to the organisation. If the
average risk per information asset caused by a component is
low, but the total risk caused by the same component is high,
then it means that the component has a very central function in
the infrastructure. In such cases one should question whether
the functions of the component could be split up among
multiple components in order to isolate components and information
flows.</p>
      </sec>
      <sec id="sec-6-5">
        <title>E. CIA vs. business value and confidentiality</title>
        <p>
          We have used the business value and confidentiality
dimensions of the UK National Archives (UKNA) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. The UKNA
model is easy to explain to non-experts and is also intuitive –
factors that make it also easy to do a stakeholder survey on
the information assets and to communicate the outcomes.
        </p>
        <p>Another, very often used, way to describe security
dimensions of an information asset is the “CIA” method, which
stands for “confidentiality, integrity, and availability”. The CIA
approach is often used to describe the three main
characteristics of information that can have value; they are also called
the three main security categories [21, p. 5].</p>
        <p>A mapping of the CIA to the UKNA model is possible. The
‘C’ from CIA is directly mapped to UKNA’s confidentiality,
while both ‘I’ and ‘A’ from CIA are mapped to UKNA’s
business value. Information with much business value should
normally have good availability and integrity.</p>
        <p>We chose to focus on integrity. The e-BioInfra is used
to carry out scientific research, so the integrity of the data
processed is of paramount importance. High availability is
currently not a major concern for us5. In other words, the
correctness of the data processing is more important than the
timeliness. For our approach, availability was out of scope,
although it could easily be incorporated in MISRAM if needed.</p>
      </sec>
      <sec id="sec-6-6">
        <title>F. Future work</title>
        <p>We consider it questionable to compare different MISRAM
risk assessments in different organisations because so many
variables differ (such as the surveyed people and other
social factors, external influences such as news and technical
developments, and so on). Whether different organisations are
comparable using MISRAM or an extension to our method
could be determined by a follow-up project.</p>
        <p>The right balance between stressing the importance of
wellconnected hubs and compensating for the hub effect is also a
worthy subject of future research.</p>
        <p>V.</p>
        <p>ACKNOWLEDGEMENT</p>
        <p>We thank the members of the e-Science group for their time
and valuable suggestions during the development and
application of this RA method. This work is partially supported by the
COMMIT project “e-Biobanking with imaging for healthcare”
funded by the Nederlandse Organisatie voor Wetenschappelijk
Onderzoek (Netherlands Organisation for Scientific Research,
NWO).
5It is not a major problem if the e-BioInfra is offline for one or two days.
The same seems to be the case of many peer research groups we know.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shahand</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Santcroos</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. C. van Kampen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. D.</given-names>
            <surname>Olabarriaga</surname>
          </string-name>
          , “
          <article-title>A grid-enabled gateway for biomedical data analysis</article-title>
          ,” pp.
          <fpage>725</fpage>
          -
          <lpage>742</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>E.</given-names>
            <surname>Deelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gannon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Shields</surname>
          </string-name>
          ,
          <string-name>
            <surname>and I. Taylor</surname>
          </string-name>
          , “
          <article-title>Workflows and e-science: An overview of workflow system features and capabilities,” Future Generation Computer Systems</article-title>
          , vol.
          <volume>25</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>528</fpage>
          -
          <lpage>540</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mouw</surname>
          </string-name>
          , G. van 't
          <string-name>
            <surname>Noordende</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. H. van Kampen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Louter</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Santcroos</surname>
            , and
            <given-names>S. D.</given-names>
          </string-name>
          <string-name>
            <surname>Olabarriaga</surname>
          </string-name>
          , “
          <article-title>Legal constraints on genetic data processing in European grids,” in HealthGrid Applications and Technologies Meet Science Gateways for Life Sciences</article-title>
          ,
          <year>2012</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>58</lpage>
          . [Online]. Available: http://www.booksonline.iospress.nl/ Content/View.aspx?piid=
          <fpage>30469</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>ISACA</given-names>
            ,
            <surname>CISA Review Manual 2006 (CISA - Certified Information</surname>
          </string-name>
          Systems Auditor).
          <source>Information Systems Audit and Control Association</source>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>E.</given-names>
            <surname>Zambon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Etalle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Wieringa</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. H.</given-names>
            <surname>Hartel</surname>
          </string-name>
          , “
          <article-title>Modelbased qualitative risk assessment for availability of IT infrastructures</article-title>
          ,”
          <source>Software and Systems Modeling</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>553</fpage>
          -
          <lpage>580</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>I. Postelnik</surname>
          </string-name>
          , “
          <article-title>Chess: A valuable teaching tool for risk managers</article-title>
          ?” pp.
          <fpage>40</fpage>
          -
          <lpage>42</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>T. N. A. J. Riley)</surname>
          </string-name>
          , “
          <article-title>What is an information asset?” 2011, factsheet</article-title>
          . [Online]. Available: http://www.nationalarchives.gov.uk/
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Stoneburner</surname>
          </string-name>
          , “
          <article-title>NIST special publication 800-33 - underlying technical models for information technology security,” National Institute of Standards and Technology</article-title>
          , Computer Security Division,
          <source>Tech. Rep.</source>
          ,
          <year>2001</year>
          . [Online]. Available: http://csrc.nist.gov/publications/ nistpubs/800-33/sp800-
          <fpage>33</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Cisco</surname>
          </string-name>
          , “
          <article-title>Data sheet technology application support - internal security posture assessment</article-title>
          ,”
          <year>2004</year>
          . [Online]. Available: http://www.cisco.com/application/pdf/en/us/guest/products/ ps5619/c1262/cdccont 0900aecd800ce53a.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Zambon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Etalle</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. L.</given-names>
            <surname>Overbeek</surname>
          </string-name>
          , “
          <article-title>IT confidentiality risk assessment for an architecture-based approach</article-title>
          ,” in 3rd IEEE/IFIP International Workshop on Business-driven
          <source>IT Management</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>40</lpage>
          . [Online]. Available: https://ieeexplore.ieee.org/xpl/freeabs all.
          <source>jsp?arnumber=4540072</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>J. yvind Aagedal</surname>
            , F. den Braber, T. Dimitrakos,
            <given-names>B. A.</given-names>
          </string-name>
          <string-name>
            <surname>Gran</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Raptis</surname>
            , and
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Stlen</surname>
          </string-name>
          , “
          <article-title>Model-based risk assessment to improve enterprise security,” in EDOC '02</article-title>
          .
          <string-name>
            <surname>Proceedings</surname>
          </string-name>
          . Sixth International Enterprise Distributed Object Computing Conference,
          <year>2002</year>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Strecker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Heise</surname>
          </string-name>
          , and U. Frank, “
          <article-title>RiskM: A multi-perspective modeling method for IT risk assessment</article-title>
          ,
          <source>” Information Systems Frontiers</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>4</issue>
          ,
          <year>2011</year>
          . [Online]. Available: http://www. springerlink.com/content/j52k6071g4164q82/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morali</surname>
          </string-name>
          , “
          <article-title>IT architecture-based confidentiality risk assessment in networks of organizations</article-title>
          ,” Enschede,
          <year>2011</year>
          , IPA dissertation series; 2011-
          <fpage>06</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mouw</surname>
          </string-name>
          , “
          <article-title>Data protection and privacy in escience</article-title>
          ,”
          <year>2012</year>
          . [Online]. Available: http://www.scriptiesonline.
          <source>uba.uva.nl/425083</source>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Lankhorst and the ArchiMate team, “ArchiMate language primer</article-title>
          ,”
          <year>2004</year>
          . [Online]. Available: https://doc.novay.nl/dsweb/Get/ Document-43839/
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>U.</given-names>
            <surname>Frank</surname>
          </string-name>
          ,
          <article-title>“Multi-perspective enterprise modeling (MEMO) conceptual framework and modeling languages,” in HICSS</article-title>
          .
          <source>Proceedings of the 35th Annual Hawaii International Conference on System Sciences</source>
          ,
          <year>2002</year>
          , pp.
          <fpage>1258</fpage>
          -
          <lpage>1267</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Likert</surname>
          </string-name>
          , “
          <article-title>A technique for the measurement of attitudes,”</article-title>
          <source>Archives of Psychology</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>140</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>55</lpage>
          ,
          <year>1932</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>H. L.</given-names>
            <surname>Dreyfus</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. E.</given-names>
            <surname>Dreyfus</surname>
          </string-name>
          ,
          <article-title>Mind over machine: The power of human intuition and expertise in the era of the computer</article-title>
          . Free Press,
          <year>1986</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Schempp</surname>
          </string-name>
          , “
          <article-title>The stages of expertise</article-title>
          ,”
          <year>2011</year>
          . [Online]. Available: http://www.performancemattersinc.com/posts/stages-of-expertise/
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>E.</given-names>
            <surname>Mouw</surname>
          </string-name>
          , “
          <article-title>Internal report: Information security risk assessment of the eBioScience infrastructure at the AMC</article-title>
          ,” eBioScience group, biolab, KEBB, Acedemic Medical Centre, University of Amsterdam, Tech. Rep.,
          <year>2012</year>
          , available on request.
          <source>Contact the corresponding author.</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Division</surname>
          </string-name>
          , “NIST special publication 800-53 rev. 3
          <article-title>- recommended security controls for federal information systems and organizations,” National Institute for Standards and Technology</article-title>
          ,
          <source>Tech. Rep.</source>
          ,
          <year>2010</year>
          . [Online]. Available: http://csrc.nist.gov/publications/nistpubs/ 800-53-
          <issue>Rev3</issue>
          /
          <fpage>sp800</fpage>
          -53
          <string-name>
            <surname>-</surname>
          </string-name>
          rev3-final
          <source>updated-errata 05-01-2010</source>
          .pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>