SlideShare a Scribd company logo
1 of 84
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
1
Security Assessment
Introduction
Sanjay Goel
University at Albany, SUNY
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
2
Course Outline
> Unit 1: What is a Security Assessment?
– Definitions and Nomenclature
Unit 2: What kinds of threats exist?
– Malicious Threats (Viruses & Worms) and Unintentional Threats
Unit 3: What kinds of threats exist? (cont’d)
– Malicious Threats (Spoofing, Session Hijacking, Miscellaneous)
Unit 4: How to perform security assessment?
– Risk Analysis: Qualitative Risk Analysis
Unit 5: Remediation of risks?
– Risk Analysis: Quantitative Risk Analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
3
Module 1: What is a Security Assessment?
Module 2: Risk Analysis: Definitions and Nomenclature
Module 3: Risk Analysis: Methodology and Objectives
Module 4: Risk Analysis: Deliverables and Work Plan
Module 5: Risk Analysis: Tools and Usage
Security Assessment
Outline for this unit
Module 1
What is Security Assessment?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
5
• What is security assessment?
• What are the non-intrusive types?
• How do you choose between these types?
• What are the intrusive types?
• What are the types of risk reduction?
• What is effective security?
• What are the limitations to security assessment?
Security Assessment
Outline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
6
• Definition
– Security assessment identifies existing IT vulnerabilities and
recommends countermeasures for mitigating potential risks
• Goal
– Make the infrastructure more secure
– Identify risks and reduce them
• Consequences of Failure
– Loss of services
– Financial loss
– Loss of reputation
– Legal consequences
Security Assessment
Overview
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
7
• Non-Intrusive
1. Security Audit
2. Risk Assessment
3. Risk Analysis
• Intrusive
1. Vulnerability Scan
2. Penetration Testing / Ethical Hacking
• All have the goal of identifying vulnerabilities and
improving security
– Differ in rules of engagement and limited purpose of the
specific engagement (what is allowed, legal liability,
purpose of analysis, etc.).
Security Assessment
Types
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
8
• Security Audit- Independent review and examination of
system records & activities to determine adequacy of system
controls, ensure compliance of security policy & operational
procedures, detect breaches in security, and recommend
changes in these processes.1
• Features
– Formal Process
– Paper Oriented
• Review Policies for Compliance and Best Practices
– Review System Configurations
• Questionnaire, or console based
– Automated Scanning
– Checklists
1 http://www.atis.org/tg2k/_security_audit.html
Security Assessment: Non-Intrusive Types
1. Security Audit
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
9
• Risk Assessment (Vulnerability Assessment) is:
– determination of state of risk associated with a system based upon
thorough analysis
– includes recommendations to support subsequent security
controls/decisions.
– takes into account business, as well as legal constraints.
• Involves more testing than traditional paper audit
• Primarily required to identify weaknesses in the information
system
• Steps
– Identify security holes in the infrastructure
– Look but not intrude into the systems
– Focus on best practices (company policy is secondary)
Security Assessment: Non-Intrusive Types
2. Risk Assessment
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
10
• Risk Analysis is the identification or study of:
– an organization’s assets
– threats to these assets
– system’s vulnerability to the threats
• Risk Analysis is done in order to determine exposure
and potential loss.
• Computationally intensive and requires data to
– Compute probabilities of attack
– Valuation of assets
– Efficacy of the controls
• More cumbersome than audit or assessment and usually
requires an analytically trained person
Security Assessment: Non-Intrusive Types
3. Risk Analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
11
• Security audit, risk assessment and risk analysis have
similar goals.
Security Assessment
How to choose
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
12
Security Assessment
Assessment vs. Analysis vs. Audit
Assessment Analysis Audit
Objective Baseline Determine
Exposure and
Potential Loss
Measure against a
Standard
Method Various (including
use of tools)
Various (including
tools)
Audit Program/
Checklist
Deliverables Gaps and
Recommendations
Identification of
Assets, Threats &
Vulnerabilities
Audit Report
Performed by: Internal or External Internal or External Auditors
Value Focused
Improvement
Preparation for
Assessment
Compliance
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
13
• Definition
– Scan the network using automated tools to identify security
holes in the network
• Usually a highly automated process
– Fast and cheap
• Limitations
– False findings
– System disruptions (due to improperly run tools)
• Differences in regular scans can often identify new
vulnerabilities
Security Assessment: Intrusive Types
1. Vulnerability Scan
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
14
• Definition (Ethical Hacking)
– Simulated attacks on computer networks to identify
weaknesses in the network.
• Steps
– Find a vulnerability
– Exploit the vulnerability to get deeper access
– Explore the potential damage that the hacker can cause
• Example
– Scan web server: Exploit buffer overflow to get an account
– Scan database (from web server)
– Find weakness in database: Retrieve password
– Use password to compromise firewall
Security Assessment: Intrusive Types
2. Penetration Testing
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
15
There are three strategies for risk reduction:
• Avoiding the risk
– by changing requirements for security or other system
characteristics
• Transferring the risk
– by allocating the risk to other systems, people,
organizations assets or by buying insurance
• Assuming the risk
– by accepting it, controlling it with available resources
Security Assessment
Risk Reduction
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
16
• Effective security relies on several factors
– Security Assessments
– Policies & Procedures
– Education (of IT staff, users, & managers)
– Configuration Standards/Guidelines
• OS Hardening
• Network Design
• Firewall Configuration
• Router Configuration
• Web Server Configuration
– Security Coding Practices
Security Assessment
Effective Security
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
17
• Often locates previously known issues
– Provides false sense of security
• Just the first step
– Needs due diligence in applying the
recommendation of the assessment
• Becomes obsolete rapidly
– Needs to be repeated periodically
Security Assessment
Limitations
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
18
What is Security Assessment?
Questions 1, 2a, and 2b
1) What is a security assessment?
2a) Why should security assessments be performed?
2b) Why are security assessments integral to effective security?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
19
What is Security Assessment?
Questions 3a, 3b, and 3c
3a) List the non-intrusive types of security assessment:
a.
b.
c.
3b) List the intrusive types of security assessment:
a.
b.
3c) What is the difference between non-intrusive and intrusive
types? Why would one use non-intrusive instead of intrusive
and vice versa?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
20
What is Security Assessment?
Questions 4 and 5
4) What are some limitations of security assessment?
5) Of the three types of risk reduction (avoiding, transferring,
assuming), which would you prefer given your own person
experience? Why?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
21
What is Security Assessment?
Case
• Scenario to identify the suitable method
for application to the scenario
Module 2
Risk Analysis: Definitions and Nomenclature
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
23
• What is risk analysis?
• What terms are needed in risk analysis?
• What are assets?
• What are vulnerabilities?
• What are threats?
• What types of risk exist?
– Security Risk
– Physical Asset Risks
– Mission Risks
– Security Risks
Risk Analysis
Outline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
24
Risk Analysis
Concept Map
Source: Australian Standard Handbook of Information Security Risk Management – HB231-2000
• Threats exploit system vulnerabilities which expose system assets.
• Security controls protect against threats by meeting security
requirements established on the basis of asset values.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
25
• Assets- Something that the agency values and has to protect. Assets
include all information and supporting items that an agency requires to
conduct business.
• Vulnerability- A weak characteristic of an information asset or group of
assets which can be exploited by a threat.1 Consequence of weaknesses in
controls.
• Threat- Potential cause of an unwanted event that may result in harm to
the agency and its assets.1 A threat is a manifestation of vulnerability.
• Security Risk- is the probability that a specific threat will successfully
exploit a vulnerability causing a loss.
• Security Controls- Implementations to reduce overall risk and vulnerability.
1 http://www.oit.nsw.gov/au/pdf/4.4.16.IS1.pdf
Risk Analysis
Basic Definitions
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
26
• Assets: Something that the agency values and has to
protect. Assets include all information and supporting
items that an agency requires to conduct business.
• Data
– Breach of confidentiality
– Loss of data integrity
– Denial of service
– Corruption of Applications
– Disclosure of Data
Risk Analysis
Assets
• Organization
– Loss of trust
– Embarrassment
– Management failure
• Personnel
– Injury and death
– Sickness
– Loss of morale
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
27
• Infrastructure
– Electrical grid failure
– Loss of power
– Chemical leaks
– Facilities & equipment
– Communications
Risk Analysis
Assets Cont’d
• Legal
– Use or acceptance of
unlicensed software
– Disclosure of Client
Secrets
• Operational
– Interruption of services
– Loss/Delay in Orders
– Delay in Shipments
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
28
• Vulnerabilities are flaws within an asset, such as an operating
system, router, network, or application, which allows the
asset to be exploited by a threat.
• Examples
– Software design flaws
– Software implementation errors
– System misconfiguration (e.g. misconfigured firewalls)
– Inadequate security policies
– Poor system management
– Lack of physical protections
– Lack of employee training (e.g. passwords on post-it
notes in drawers or under keyboards)
Risk Analysis
Vulnerabilities
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
29
• Threats are potential causes of events which have a
negative impact.
– Threats exploit vulnerabilities causing impact to assets
• Examples
– Denial of Service (DOS) Attacks
– Spoofing and Masquerading
– Malicious Code
– Human Error
– Insider Attacks
– Intrusion
Risk Analysis
Threats
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
30
Risk Analysis
Sources of Threats
Source Examples of Reasons
External Hackers with Malicious Intent
• Espionage
• Intent to cause damage
• Terrorism
External Hackers Seeking Thrill • Popularity
Insiders with Malicious Intent
• Anger at company
• Competition with co-worker(s)
Accidental Deletion of Files and Data • User errors
Environmental Damage
• Floods
• Earthquakes
• Fires
Equipment and Hardware Failure • Hard disk crashes
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
31
• Risk is the probability that a specific threat will successfully
exploit a vulnerability causing a loss.
• Risks of an organization are evaluated by three distinguishing
characteristics:
– loss associated with an event, e.g., disclosure of confidential data, lost
time, and lost revenues.
– likelihood that event will occur, i.e. probability of event occurrence
– Degree that risk outcome can be influenced, i.e. controls that will
influence the event
• Various forms of threats exist
• Different stakeholders have various perception of risk
• Several sources of threats exist simultaneously
Risk Analysis
Security Risk
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
32
• Physical Asset Risks
– Relating to items with physical and tangible items
that have an associated financial value
Risk Analysis
Physical Asset Risks
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
33
• Mission Risks
– Relating to functions, jobs or tasks that need to be
performed
Risk Analysis
Mission Risks
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
34
• Security Risks
– Integrates with both asset and mission risks
Risk Analysis
Security Risks
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
35
1) From the concept map, fill in the blanks:
Vulnerabilities are exploited by________________.
________________ are used to diminish risk from threats.
To determine ________________ it is necessary to know the
values of assets as well as the ________________ to threats.
Knowledge of security ________________ is necessary before
deciding on controls to implement.
Risk Analysis: Definitions and Nomenclature
Question 1
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
36
2) Match the type of asset to the potential threat
Organization Stolen Credit Card Numbers
Operational Air Traffic Radar Failure
Data Loss of Orders
Legal System Administrator’s Death
Personnel Loss of Reputation
Infrastructure Denial of Service
Risk Analysis: Definitions and Nomenclature
Question 2
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
37
3) Threat or Vulnerability ? Place a T next to an example of a
threat and a V next to an example of a vulnerability
_______ Misconfigured firewall
_______ Denial of Service
_______ Unpatched operating system
_______ Theft
_______ Hard Drive Failure
_______ Unauthorized access to data
_______ Code within IE which allows for an attacker to execute malicious program
_______ Unlocked door
_______ Code Red Worm
_______ Weak passwords
Risk Analysis: Definitions and Nomenclature
Question 3
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
38
4) What is the definition of risk?
5) What are the three kinds of risk? Give an example
(other than the one provided within the lecture) for
each.
Risk Analysis: Definitions and Nomenclature
Questions 4 and 5
Module 3
Risk Analysis: Methodology and Objectives
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
40
• What are the key steps in risk analysis?
• When should risk analysis be performed?
• How to determine breadth and depth?
• How to determine a baseline?
• How to determine the scope?
– Strategic Context
– Organizational Context
– Risk Management Context
• What criteria should be used for risk evaluation?
• What standards should be considered?
Risk Analysis: Methodology and Objectives
Outline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
41
1. Define objectives
2. Define deliverables
3. Establish a work plan
4. Determine tools to assist with process
Risk Analysis: Methodology
Key Steps
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
42
• Periodically
– Often event-driven
– Typically year-over-year comparison
– Generally labor-intensive
– Most organizations start with periodic assessments
• Continuously
– Part of the normal workflow
– Provides “real-time” risk view
– Often supported by technology and analysis tools
– Integrated with other IT/business processes
Risk Assessment: Methodology
When to perform?
Module 3 cont’d
Risk Analysis: Define Objectives
The remainder of the module will focus on defining
objectives
Subsequent modules in this unit will elaborate on
defining deliverables, establishing a work plan,
and determining tools to assist with this process.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
44
• Breadth
– Organizational
– People
– Processes
– Technology
– Physical
• Depth of Analysis
– Comprehensive vs. Sampling
– Key Components vs. Individual Elements
Risk Analysis: Define Objectives
Breadth & Depth of Analysis
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
45
• Baseline
– Where is the organization today?
– What controls are in place?
• Evaluation of security control effectiveness
– Where should the security of the organization be?
– Where are the gaps?
– What are opportunities for improvement?
• Establish awareness of threats & vulnerabilities
• Lay foundation for development of security improvement plan
Risk Analysis: Define Objectives
Baseline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
46
• Defining the scope will set the framework for the
risks to be managed and will provide guidance
for future decisions. This avoids unnecessary
work and improves the quality of risk analysis.
• Components
– Establish strategic context
– Establish organizational context
– Establish risk management context
– Develop risk evaluation criteria
Risk Analysis: Define Objectives
Scope
Source: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
47
• ISO 17799
– Title: Information technology -- Code of practice for information
security management
– Starting point for developing policies
– http://www.iso.ch/iso/en/prods-services/popstds/.../en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=33441&ICS1=35
• ISO 13335
– Title: Information technology -- Guidelines for the management of
IT Security -- Part 1: Concepts and models for IT Security
– Assists with developing baseline security.
– http://www.iso.ch/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=21733&ICS1=35
• NIST SP 800-xx
– Different standards for various applications
– http://csrc.nist.gov/publications/nistpubs/
• Center for Internet Security
– Configuration Standards (benchmarks)
– http://www.cisecurity.org/
Risk Analysis: Define Objectives
Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
48
• This is based on the environment in which the
agency operates.
• The agency should understand:
– Strengths, weaknesses, opportunities, & threats
– Internal and external stakeholders (objectives and
perceptions)
– Financial, operational, competitive, political, social,
client, cultural and legal aspects of agency’s functions.
• Risk analysis should be related to agency’s
mission or strategic objectives
• Cross-organizational issues should be taken into
consideration when applicable
Risk Analysis: Define Objectives
Strategic Context
Source: Information Security Guidelines for NSW Government Agencies
Part 1 Information Security Risk Management
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
49
• Organizational Context requires
– Understanding of agency
– How it is organized
– Capabilities, goals, objectives, and strategies
– Knowledge of assets and values
• This assists in:
– Defining criteria to determine risk acceptability
– Forms the basis of controls and risk treatment
options
Risk Analysis: Define Objectives
Organizational Context
Source: Information Security Guidelines for NSW Government Agencies
Part 1 Information Security Risk Management
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
50
• Define review project and establish goals and
objectives
– Will review cover whole organization or just a single
project, individual assets or groups of assets?
• Define timeframe and location of review
– What is budgeted time for review?
– Where will the review take place? (one site or group
of sites)
Risk Analysis: Define Objectives
Risk Management Context
Source: Information Security Guidelines for NSW Government Agencies
Part 1 Information Security Risk Management
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
51
• Identify resources required to conduct review
– Use to identify sources of risk, common vulnerabilities, threat
types and areas of impact
– Is assessment done internally or through an outside consultant?
– How many people will be involved?
– Who are the best people to involve?
– What tools are going to be used?
• Define extent of risk analysis
– What are the functions of the parts of organization participating
in managing risk?
– What is the relationship between the risk assessment and other
projects within other parts of the agency?
Risk Analysis: Define Objectives
Risk Management Context, cont’d.
Source: Information Security Guidelines for NSW Government Agencies
Part 1 Information Security Risk Management
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
52
• Qualitative or Quantitative methods
• Level of acceptable risk should be considered
• Baseline
– a collection of policies, standards, processes and
technologies that establish a defined security level.
• Risk criteria is influenced by:
– Agency’s internal policy, goals and objectives
– Expectations of stakeholders and customers
– Legal requirements
Risk Analysis: Define Objectives
Risk Evaluation Criteria
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
53
Risk Analysis: Methodology and Objectives
Question
1) What are the four key steps to risk analysis?
a.
b.
c.
d.
2) Where would you start if you wanted to
define the objectives of a risk analysis for
your own organization?
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
54
Risk Analysis: Methodology and Objectives
Case
Scenario in which objectives can be
determined (scope, baseline, etc.)
Module 4
Risk Analysis: Deliverables and Work Plan
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
56
• Who is the intended audience for risk analysis?
• Who should take part in risk analysis?
• How is a work plan created?
– Planning
– Preparation
– Threat Assessment
– Risk Assessment
– Recommendations
Risk Analysis: Deliverables and Work Plan
Outline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
57
• Executives
– Upward communication
– Brief and concise
• Operational
– What needs to be done for implementation of
controls
• Internal Employees
– Awareness
– Training
• External Parties
Risk Analysis: Deliverables
Intended Audience
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
58
• Business
– Security Officer (planning, budgeting and management of security staff)
– Security Manager (policy negotiation, data classification, risk assessment, role
analysis)
• Technical
– Security Operations (vulnerability assessment, patch management, intrusion
detection, scanning, forensics, response management, security technology
research)
– Security Architect (technology implementation, implementation options)
– Security Administrator (user administration, server security configuration,
desktop security)
– Resource Owner (own any residual risk after controls are implemented)
– Resource Custodian (implements/monitors controls)
• Communications
– Security Communications (marketing, awareness)
Risk Analysis: Work Plan
Putting the Team Together
Source: CSCIC & Meta Group, Inc.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
59
1. Planning Stage
– Aim and scope
– Identification of security baselines
– Schedule and methodology
– Acknowledgement of responsibility
2. Preparation
– Asset and value listings
3. Threat Assessment
– Threats, sources, and impact
Risk Analysis: Work Plan
Creation
Source: http://collection.nlc-bnc.ca/100/200/301/cse-cst/generic_state-e/mg11b_e.pdf
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
60
4. Risk Assessment
– Evaluation of existing controls
– Vulnerabilities and exploit probability
– Analysis of risk
5. Recommendations
– Addition of new controls
– Modification of existing controls
– Removal of obsolete/inadequate controls
Risk Analysis: Work Plan
Creation cont’d
Source: http://collection.nlc-bnc.ca/100/200/301/cse-cst/generic_state-e/mg11b_e.pdf
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
61
Risk Analysis: Deliverables and Work Plan
Assignment
• Create a work plan for an organization.
Module 5
Risk Analysis: Tools and Usage
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
63
• What are asset inventory tools?
• What are software usage tools?
• What are vulnerability assessment tools?
• What are configuration validation tools?
• What are penetration testing tools?
• What are password auditing tools?
• What are documentation tools?
Risk Analysis: Tools and Usage
Outline
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
64
• Tools can speed up the security assessment and help in
automation of the risk analysis process.
• Several categories of tools exist:
– Asset Inventory
– Software Usage
– Vulnerability Assessment
– Configuration Validation
– Penetration Testing
– Password Auditing
– Documentation
Risk Analysis: Tools and Usage
Types
Source: http://techrepublic.com.com/5100-6262-5060605-2.html
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
65
• Inventory process includes physical inventory and automated tools
• Physical inventory of IT assets that are not attached to the network
– e.g. in storage closets or locally attached and that are thus not discoverable.
• Autodiscovery tools collect physical data on an enterprise's IT assets and
record history of changes made to the asset from the last scan
– e.g. memory, processor, and software version
• Inventory tools can either:
– install an agent on the hardware device, which lets the inventory run even if
the device is not attached to the network,
– or be agentless, which can send information only when it is attached to the
network.
• In environments with mobile set of assets that are sporadically
connected (e.g. once a month), agentless technology requires alternatives
way to capture the inventory
– e.g. such as an e-mail that kicks off the scan.
• The assets that need to be discovered include
– PDAs, PCs, networking equipment, and servers.
Risk Analysis: Tools and Usage
Asset inventory Source: http://techrepublic.com.com/5100-6262-5060605-2.html
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
66
Risk Analysis: Tools and Usage
Asset Inventory Tools
Name Description
Asset
Tracker
for
Networks
Inventory software tool intended to audit software and hardware
components installed on computers over a network. It collects network
inventory information, provides detailed comprehensive reports and
allows export of assets details to external storages, such as SQL
database or web site. http://www.alchemy-lab.com/products/atn/
Asset
Center
Peregrine Autodiscovery/inventory tool which maintains “an evolving
snapshot of IT infrastructure” and provides: what hardware and
software is available, asset connection to other assets, location of assets,
access to assets, as well as financial and contractual information on
assets. http://www.peregrine.com/products/assetcenter.asp
Unicenter
Access
Managem
ent
Computer Associates International asset management tool. It features:
“automated discovery, hardware inventory, network inventory, software
inventory, configuration management, software usage monitoring,
license management and extensive cross-platform reporting.”
http://www3.ca.com/Solutions/Product.asp?ID=194
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
67
Tools
Asset Inventory Tools, cont’d.
Name Description
Tally
Systems
Tally Systems offers three tools which can be used for IT asset
inventory. These are: TS Census Asset Inventory, WebCensus and
PowerCensus. These products provide unparalleled IT asset inventory
and tracking, hosted PC inventory and reporting, and enhanced
inventory for Microsoft SMS respectively.
http://www.tallysystems.com/products/itassettracking.html
Isogon
Isogon offers multiple tools. SoftAudit gathers software inventory and
usage data from your z/OS, OS/390, or UNIX server. Asset insight
offers PC, PDA, & network device auto-discovery software & captures
data. Vista manages and organizes details from contracts, contract
addenda/attachments, and maintenance
agreements. http://www.isogon.com/SAM%20Solutions.htm
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
68
• Software usage tools monitor the use of software
applications in an organization
• Several uses of such tools
– Track usage patterns and report on trends to assist with server load balancing
and license negotiation to prevent costly overbuying or risk-laden under
buying.
– Used to monitor and control the use of unauthorized applications (for
example, video games and screen savers).
– Important for vendor auditing the customers especially for monitoring clients
for subscription-based pricing
Risk Analysis: Tools and Usage
Software Usage
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
69
Risk Analysis: Tools and Usage
Software Usage Tools
Name Description
Software Audit
Tool (GASP)
Designed to help detect and identify pirated software through
tracking licenses. It is a suite of tools used by the Business
Software Alliance and is freely available at:
http://global.bsa.org/uk/antipiracy/tools/gasp.phtml
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
70
• Vulnerability Assessment helps determine vulnerabilities in
computer networks at any specific moment in time.
• Deliverables:
– List of exploits and threats to which systems and networks are
vulnerable. (Ranked according to risk levels)
– Specific information about exploits and threats listed. (name of
exploit or threat, how the threat/exploit works)
– Recommendations for mitigating risk from these threats and exploits.
• Tools used can be:
– Commercial or open source (decide based on staff skills)
– Perform analysis such as:
– Host-based or network-based
Risk Analysis: Tools and Usage
Vulnerability Assessment
Sources: http://techrepublic.com.com/5100-6296-5194734-2.html
http://www.intranetjournal.com/articles/200207/pse_07_14_02a.html
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
71
Risk Analysis: Tools and Usage
Vulnerability Assessment (Host or Network Based)
Source: http://www.nwfusion.com/news/2004/0405specialfocus.html
Host-based Tools Network-Based Tools
Pros Pros
Can provide rich security information,
such as by checking user access logs.
Once deployed, have limited impact on
network traffic.
Can give a quick look at what weaknesses
hackers and worms can exploit.
Available as software, appliances and
managed services.
Cons Cons
Costs can add up when deploying agents
across many desktops and servers.
Deployment can be time-consuming.
Requires careful planning to avoid
conflict with security systems.
Generates considerable network traffic.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
72
Risk Analysis: Tools and Usage
Vulnerability Assessment
Name Description
Cerberus Internet
Scanner
Windows web server vulnerability tester designed to help administrators locate and fix
security holes in their computer systems
http://www.cerberus-infosec.co.uk/cis.shtml
Cgichk
This is a web vulnerability scanner which searches interesting directories and files on a site.
Looks for interesting and hidden directories such as logs, scripts, restricted code, etc.
http://sourceforge.net/projects/cgichk/
Nessus
Server and client software vulnerability assessment tool which provides remote and local
security checking.
http://www.nessus.org/download.html
SAINT
SAINT (Security Administrator's Integrated Network Tool) is a security assessment tool. It
scans through a firewall updated security checks from CERT & CIAC bulletins. Also, it
features 4 levels of severity (red, yellow, brown, & green) through an HTML interface. Based
on SATAN model.
http://www.saintcorporation.com/products/saint_engine.html
SARA
SARA (Security Auditor's Research Assistant) Third generation UNIX-based security analysis
tool. It contains: SANS/ISTS Certified, CVE standards support, an enterprise search
module, standalone or daemon mode, user extension support and is based on the SATAN
model
http://www.www-arc.com/sara/
Nikto
A web server scanner which performs comprehensive tests against web servers for multiple
items, including over 2200 potentially dangerous files/CGIs, versions on over 140 servers,
and problems on over 210 servers http://www.cirt.net/code/nikto.shtml
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
73
• Configuration Validation
– is the process in which the current configuration of a
specific system, software, or hardware tool is tested
against configuration guidelines.
Risk Analysis: Tools and Usage
Configuration Validation
Source: http://nww1.com/news/2004/0216specialfocus.html
•Human error is shown to be the 2nd
largest reason for network downtime.
•Using configuration validation tools
will help correct for human error
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
74
Risk Analysis: Tools and Usage
Configuration Validation
• Depending on focus, especially with network and OS
configurations, configuration validation can utilize the same
tools as vulnerability assessment & penetration testing
• However, there are more specialized tools for validating
specific software applications and hardware.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
75
Risk Analysis: Tools and Usage
Configuration Validation
Name Description
Microsoft
Baseline
Security
Analyzer
Method of identifying common security misconfigurations among
Microsoft Windows NT 4.0, 2000, XP, 2003, IIS, SQL Server, Exchange
Server, Media Player, Data Access Components (MDAC), Virtual
Machine, Commerce Server, Content Management Server, BizTalk
Server, Host Integration Server & Office.
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
CISCO Router
and Security
Device Manager
This offers advanced configuration support for LAN and WAN
interfaces, NAT, Stateful Firewall Policy, Inline Intrusion Prevention and
IPSec virtual private network (VPN) features. It also provides a 1-click
router lockdown and ability to check and recommend changes to router
configuration based on ICSA Labs, and Cisco TAC recommendations.”
http://www.cisco.com/en/US/products/sw/secursw/ps5318/
Linux
Configuration
and Diagnostic
Tools
This site provides a listing of various Linux configuration tools for
system and network configuration, X configuration, library and kernel
dependency management, and general diagnostics.
http://www.comptechdoc.org/os/linux/usersguide/linux_ugdiag.html
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
76
• Penetration Testing is the evaluation of a system for weaknesses through
attempting to exploit vulnerabilities.
• Can be done in-house or by a neutral 3rd party
• “Black-box” (no knowledge) or “White-box” (complete knowledge)
• Steps
– Define scope (External: servers, infrastructure, underlying software; Internal:
network access points; Application: proprietary applications and/or systems;
Wireless/Remote Access; Telephone/Voice Technologies; Social Engineering)
– Find correct tools (freeware or commercial software)
– Properly configure tools to specific system
– Gather information/data to narrow focus (“white-box”)
– Scan using proper tools
• Penetration Testing tools can include:
– Network exploration (ping, port scanning, OS fingerprinting)
– Password cracking
– IDS, Firewall, Router, Trusted System, DOS, Containment Measures Testing
– Application Testing and Code Review
Risk Analysis: Tools and Usage
Penetration Testing
Source: http://www.penetration-testing.com
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
77
Risk Analysis: Tools and Usage
Penetration Testing
Name Description
Whois
Domain name lookup to find administrative, technical, and billing
contacts. It also provides name servers for the domain.
http://www.allwhois.com
Nmap
Utility for network exploration or security auditing. Can scan large
networks or single hosts. It uses raw IP packets to determine hosts
available on network, services those hosts are running, OS and OS version
they are running, type of packet filters/firewalls being used, etc.
http://www.insecure.org/nmap/nmap_download.html
MingSweeper
Network Reconnaissance Tool. Supports various TCP port & filter scans,
UDP scans, OS detection (NMAP and ICMP style), Banner grabbing etc.
http://www.hoobie.net/mingsweeper/
Cheops
Network mapping tool with graphical user interface (GUI).
http://www.marko.net/cheops/
QueSO
Remote OS detector. Sends obscure TCP packets to determine remote
OS.
http://www.antiserver.it/Unix/scanner/Unix-Scanner/
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
78
• Used for testing passwords for weaknesses which lead to vulnerable
systems
• Reasons for password weakness
– Poor encryption
– Social engineering (e.g. password is spouse’s, pet’s or child’s name)
– Passwords less than 6 characters
– Passwords do not contain special characters and numbers in addition to lower
and uppercase letters.
– Passwords from any dictionary
• Software tools might perform these tasks:
– Extracting hashed passwords / encrypted passwords
– Dictionary attack (cracks passwords by trying entries in a pre-installed
dictionary)
– Brute force attack (cracks passwords by trying all possible combinations of
characters)
• Deliverables
– Recommendations for future password policies
Risk Analysis: Tools and Usage
Password Auditing
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
79
Risk Analysis: Tools and Usage
Password Auditing
Name Description OS
John the
Ripper
Detects weak UNIX passwords. “Uses highly optimized modules to decrypt
different ciphertext formats and architectures” Can be modified to crack LM
hashes in Windows. http://www.openwall.com/john/
All
platforms
Brutus Remote password cracker. http://www.hoobie.net/brutus/ Windows
Magic Key
Audits the AppleTalk users file for weak passwords using brute force methods.
http://freaky.staticusers.net/security/auditing/MK3.2.3a.sit
Macintosh
L0phtcrack
Assesses, recovers, and remediates Windows and Unix account passwords from
multiple domains and systems. http://www.atstake.com/products/lc/
Windows
& UNIX
SAMInside
Extracts information about users from SAM-files and performs brute force
attack of Windows NT/2000/XP. Breaks defense of Syskey.
http://www.topshareware.com/SAMInside-download-5188.htm
Windows
GetPass!
Cracks weakly encrypted Cisco IOS type 7 passwords once encrypted password
file is obtained.
http://www.networkingfiles.com/Network/downloads/bosongetpassdownload.htm
Cisco
Router IOS
wwwhack
Brute force utility that will try to crack web authentication. Can use a word file
or try all possible combinations, and by trial-and-error, will attempt to find a
correct username/password combination.
http://www.securityfocus.com/tools/1785
Windows
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
80
• Documentation contains data from the risk analysis
• These documents should contain deliverables from other
parts of the process (asset inventory, vulnerability
assessment, etc.).
– These can be provided automatically from specialized software or
through compiled reports.
• Documentation critical for legal cases where it can be used as
evidence to justify expense on controls.
• Documentation might include:
– Focus of analysis
– Current system vulnerabilities
– Cost benefit analysis
– Recommended controls
Risk Analysis: Tools and Usage
Documentation
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
81
Risk Analysis: Tools and Usage
Case
Scenario(s) to determine proper tools necessary.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
82
Appendix
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
83
Security Assessment
Summary
• Security Assessment is critical to build a measured defense
against intrusions
• Risk Analysis involves:
– Asset Valuation
– Vulnerability Analysis
– Threat Identification
– Evaluation and Recommendation of Controls
• Several levels of risk analysis can be performed:
– Audit (checklists and rules)
– Non-Intrusive Vulnerability Assessment
– Penetration Testing
Sanjay Goel, School of Business/Center for Information Forensics and Assurance
University at Albany Proprietary Information
84
Acknowledgements
Grants & Personnel
• Support for this work has been provided through the
following grants
– NSF 0210379
– FIPSE P116B020477
• Damira Pon, from the Center of Information Forensics and
Assurance contributed extensively by reviewing and editing
the material
• Robert Bangert-Drowns from the School of Education
provided extensive review of the material from a pedagogical
view.

More Related Content

Similar to assessment.ppt

MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
Chris Baldwin
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 

Similar to assessment.ppt (20)

Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
AN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTINGAN OVERVIEW OF PENETRATION TESTING
AN OVERVIEW OF PENETRATION TESTING
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
 
PACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment ToolsPACE-IT, Security+3.7: Overview of Security Assessment Tools
PACE-IT, Security+3.7: Overview of Security Assessment Tools
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Information System Audit and Control
Information System Audit and ControlInformation System Audit and Control
Information System Audit and Control
 
SDET UNIT 5.pptx
SDET UNIT 5.pptxSDET UNIT 5.pptx
SDET UNIT 5.pptx
 
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session SummaryTechnology Executives Club Roundtable SIG - Nov 6 Session Summary
Technology Executives Club Roundtable SIG - Nov 6 Session Summary
 
Bcu msc cg week 4 risk management
Bcu msc cg week 4 risk managementBcu msc cg week 4 risk management
Bcu msc cg week 4 risk management
 
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security EnhancementDemystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
Demystifying Penetration Testing: A Comprehensive Guide for Security Enhancement
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 

Recently uploaded

call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
vikas rana
 

Recently uploaded (15)

Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
 
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptx
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 

assessment.ppt

  • 1. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Security Assessment Introduction Sanjay Goel University at Albany, SUNY
  • 2. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 2 Course Outline > Unit 1: What is a Security Assessment? – Definitions and Nomenclature Unit 2: What kinds of threats exist? – Malicious Threats (Viruses & Worms) and Unintentional Threats Unit 3: What kinds of threats exist? (cont’d) – Malicious Threats (Spoofing, Session Hijacking, Miscellaneous) Unit 4: How to perform security assessment? – Risk Analysis: Qualitative Risk Analysis Unit 5: Remediation of risks? – Risk Analysis: Quantitative Risk Analysis
  • 3. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 3 Module 1: What is a Security Assessment? Module 2: Risk Analysis: Definitions and Nomenclature Module 3: Risk Analysis: Methodology and Objectives Module 4: Risk Analysis: Deliverables and Work Plan Module 5: Risk Analysis: Tools and Usage Security Assessment Outline for this unit
  • 4. Module 1 What is Security Assessment?
  • 5. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 5 • What is security assessment? • What are the non-intrusive types? • How do you choose between these types? • What are the intrusive types? • What are the types of risk reduction? • What is effective security? • What are the limitations to security assessment? Security Assessment Outline
  • 6. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 6 • Definition – Security assessment identifies existing IT vulnerabilities and recommends countermeasures for mitigating potential risks • Goal – Make the infrastructure more secure – Identify risks and reduce them • Consequences of Failure – Loss of services – Financial loss – Loss of reputation – Legal consequences Security Assessment Overview
  • 7. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 7 • Non-Intrusive 1. Security Audit 2. Risk Assessment 3. Risk Analysis • Intrusive 1. Vulnerability Scan 2. Penetration Testing / Ethical Hacking • All have the goal of identifying vulnerabilities and improving security – Differ in rules of engagement and limited purpose of the specific engagement (what is allowed, legal liability, purpose of analysis, etc.). Security Assessment Types
  • 8. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 8 • Security Audit- Independent review and examination of system records & activities to determine adequacy of system controls, ensure compliance of security policy & operational procedures, detect breaches in security, and recommend changes in these processes.1 • Features – Formal Process – Paper Oriented • Review Policies for Compliance and Best Practices – Review System Configurations • Questionnaire, or console based – Automated Scanning – Checklists 1 http://www.atis.org/tg2k/_security_audit.html Security Assessment: Non-Intrusive Types 1. Security Audit
  • 9. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 9 • Risk Assessment (Vulnerability Assessment) is: – determination of state of risk associated with a system based upon thorough analysis – includes recommendations to support subsequent security controls/decisions. – takes into account business, as well as legal constraints. • Involves more testing than traditional paper audit • Primarily required to identify weaknesses in the information system • Steps – Identify security holes in the infrastructure – Look but not intrude into the systems – Focus on best practices (company policy is secondary) Security Assessment: Non-Intrusive Types 2. Risk Assessment
  • 10. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 10 • Risk Analysis is the identification or study of: – an organization’s assets – threats to these assets – system’s vulnerability to the threats • Risk Analysis is done in order to determine exposure and potential loss. • Computationally intensive and requires data to – Compute probabilities of attack – Valuation of assets – Efficacy of the controls • More cumbersome than audit or assessment and usually requires an analytically trained person Security Assessment: Non-Intrusive Types 3. Risk Analysis
  • 11. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 11 • Security audit, risk assessment and risk analysis have similar goals. Security Assessment How to choose
  • 12. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 12 Security Assessment Assessment vs. Analysis vs. Audit Assessment Analysis Audit Objective Baseline Determine Exposure and Potential Loss Measure against a Standard Method Various (including use of tools) Various (including tools) Audit Program/ Checklist Deliverables Gaps and Recommendations Identification of Assets, Threats & Vulnerabilities Audit Report Performed by: Internal or External Internal or External Auditors Value Focused Improvement Preparation for Assessment Compliance
  • 13. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 13 • Definition – Scan the network using automated tools to identify security holes in the network • Usually a highly automated process – Fast and cheap • Limitations – False findings – System disruptions (due to improperly run tools) • Differences in regular scans can often identify new vulnerabilities Security Assessment: Intrusive Types 1. Vulnerability Scan
  • 14. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 14 • Definition (Ethical Hacking) – Simulated attacks on computer networks to identify weaknesses in the network. • Steps – Find a vulnerability – Exploit the vulnerability to get deeper access – Explore the potential damage that the hacker can cause • Example – Scan web server: Exploit buffer overflow to get an account – Scan database (from web server) – Find weakness in database: Retrieve password – Use password to compromise firewall Security Assessment: Intrusive Types 2. Penetration Testing
  • 15. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 15 There are three strategies for risk reduction: • Avoiding the risk – by changing requirements for security or other system characteristics • Transferring the risk – by allocating the risk to other systems, people, organizations assets or by buying insurance • Assuming the risk – by accepting it, controlling it with available resources Security Assessment Risk Reduction
  • 16. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 16 • Effective security relies on several factors – Security Assessments – Policies & Procedures – Education (of IT staff, users, & managers) – Configuration Standards/Guidelines • OS Hardening • Network Design • Firewall Configuration • Router Configuration • Web Server Configuration – Security Coding Practices Security Assessment Effective Security
  • 17. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 17 • Often locates previously known issues – Provides false sense of security • Just the first step – Needs due diligence in applying the recommendation of the assessment • Becomes obsolete rapidly – Needs to be repeated periodically Security Assessment Limitations
  • 18. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 18 What is Security Assessment? Questions 1, 2a, and 2b 1) What is a security assessment? 2a) Why should security assessments be performed? 2b) Why are security assessments integral to effective security?
  • 19. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 19 What is Security Assessment? Questions 3a, 3b, and 3c 3a) List the non-intrusive types of security assessment: a. b. c. 3b) List the intrusive types of security assessment: a. b. 3c) What is the difference between non-intrusive and intrusive types? Why would one use non-intrusive instead of intrusive and vice versa?
  • 20. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 20 What is Security Assessment? Questions 4 and 5 4) What are some limitations of security assessment? 5) Of the three types of risk reduction (avoiding, transferring, assuming), which would you prefer given your own person experience? Why?
  • 21. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 21 What is Security Assessment? Case • Scenario to identify the suitable method for application to the scenario
  • 22. Module 2 Risk Analysis: Definitions and Nomenclature
  • 23. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 23 • What is risk analysis? • What terms are needed in risk analysis? • What are assets? • What are vulnerabilities? • What are threats? • What types of risk exist? – Security Risk – Physical Asset Risks – Mission Risks – Security Risks Risk Analysis Outline
  • 24. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 24 Risk Analysis Concept Map Source: Australian Standard Handbook of Information Security Risk Management – HB231-2000 • Threats exploit system vulnerabilities which expose system assets. • Security controls protect against threats by meeting security requirements established on the basis of asset values.
  • 25. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 25 • Assets- Something that the agency values and has to protect. Assets include all information and supporting items that an agency requires to conduct business. • Vulnerability- A weak characteristic of an information asset or group of assets which can be exploited by a threat.1 Consequence of weaknesses in controls. • Threat- Potential cause of an unwanted event that may result in harm to the agency and its assets.1 A threat is a manifestation of vulnerability. • Security Risk- is the probability that a specific threat will successfully exploit a vulnerability causing a loss. • Security Controls- Implementations to reduce overall risk and vulnerability. 1 http://www.oit.nsw.gov/au/pdf/4.4.16.IS1.pdf Risk Analysis Basic Definitions
  • 26. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 26 • Assets: Something that the agency values and has to protect. Assets include all information and supporting items that an agency requires to conduct business. • Data – Breach of confidentiality – Loss of data integrity – Denial of service – Corruption of Applications – Disclosure of Data Risk Analysis Assets • Organization – Loss of trust – Embarrassment – Management failure • Personnel – Injury and death – Sickness – Loss of morale
  • 27. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 27 • Infrastructure – Electrical grid failure – Loss of power – Chemical leaks – Facilities & equipment – Communications Risk Analysis Assets Cont’d • Legal – Use or acceptance of unlicensed software – Disclosure of Client Secrets • Operational – Interruption of services – Loss/Delay in Orders – Delay in Shipments
  • 28. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 28 • Vulnerabilities are flaws within an asset, such as an operating system, router, network, or application, which allows the asset to be exploited by a threat. • Examples – Software design flaws – Software implementation errors – System misconfiguration (e.g. misconfigured firewalls) – Inadequate security policies – Poor system management – Lack of physical protections – Lack of employee training (e.g. passwords on post-it notes in drawers or under keyboards) Risk Analysis Vulnerabilities
  • 29. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 29 • Threats are potential causes of events which have a negative impact. – Threats exploit vulnerabilities causing impact to assets • Examples – Denial of Service (DOS) Attacks – Spoofing and Masquerading – Malicious Code – Human Error – Insider Attacks – Intrusion Risk Analysis Threats
  • 30. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 30 Risk Analysis Sources of Threats Source Examples of Reasons External Hackers with Malicious Intent • Espionage • Intent to cause damage • Terrorism External Hackers Seeking Thrill • Popularity Insiders with Malicious Intent • Anger at company • Competition with co-worker(s) Accidental Deletion of Files and Data • User errors Environmental Damage • Floods • Earthquakes • Fires Equipment and Hardware Failure • Hard disk crashes
  • 31. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 31 • Risk is the probability that a specific threat will successfully exploit a vulnerability causing a loss. • Risks of an organization are evaluated by three distinguishing characteristics: – loss associated with an event, e.g., disclosure of confidential data, lost time, and lost revenues. – likelihood that event will occur, i.e. probability of event occurrence – Degree that risk outcome can be influenced, i.e. controls that will influence the event • Various forms of threats exist • Different stakeholders have various perception of risk • Several sources of threats exist simultaneously Risk Analysis Security Risk
  • 32. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 32 • Physical Asset Risks – Relating to items with physical and tangible items that have an associated financial value Risk Analysis Physical Asset Risks
  • 33. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 33 • Mission Risks – Relating to functions, jobs or tasks that need to be performed Risk Analysis Mission Risks
  • 34. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 34 • Security Risks – Integrates with both asset and mission risks Risk Analysis Security Risks
  • 35. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 35 1) From the concept map, fill in the blanks: Vulnerabilities are exploited by________________. ________________ are used to diminish risk from threats. To determine ________________ it is necessary to know the values of assets as well as the ________________ to threats. Knowledge of security ________________ is necessary before deciding on controls to implement. Risk Analysis: Definitions and Nomenclature Question 1
  • 36. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 36 2) Match the type of asset to the potential threat Organization Stolen Credit Card Numbers Operational Air Traffic Radar Failure Data Loss of Orders Legal System Administrator’s Death Personnel Loss of Reputation Infrastructure Denial of Service Risk Analysis: Definitions and Nomenclature Question 2
  • 37. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 37 3) Threat or Vulnerability ? Place a T next to an example of a threat and a V next to an example of a vulnerability _______ Misconfigured firewall _______ Denial of Service _______ Unpatched operating system _______ Theft _______ Hard Drive Failure _______ Unauthorized access to data _______ Code within IE which allows for an attacker to execute malicious program _______ Unlocked door _______ Code Red Worm _______ Weak passwords Risk Analysis: Definitions and Nomenclature Question 3
  • 38. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 38 4) What is the definition of risk? 5) What are the three kinds of risk? Give an example (other than the one provided within the lecture) for each. Risk Analysis: Definitions and Nomenclature Questions 4 and 5
  • 39. Module 3 Risk Analysis: Methodology and Objectives
  • 40. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 40 • What are the key steps in risk analysis? • When should risk analysis be performed? • How to determine breadth and depth? • How to determine a baseline? • How to determine the scope? – Strategic Context – Organizational Context – Risk Management Context • What criteria should be used for risk evaluation? • What standards should be considered? Risk Analysis: Methodology and Objectives Outline
  • 41. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 41 1. Define objectives 2. Define deliverables 3. Establish a work plan 4. Determine tools to assist with process Risk Analysis: Methodology Key Steps
  • 42. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 42 • Periodically – Often event-driven – Typically year-over-year comparison – Generally labor-intensive – Most organizations start with periodic assessments • Continuously – Part of the normal workflow – Provides “real-time” risk view – Often supported by technology and analysis tools – Integrated with other IT/business processes Risk Assessment: Methodology When to perform?
  • 43. Module 3 cont’d Risk Analysis: Define Objectives The remainder of the module will focus on defining objectives Subsequent modules in this unit will elaborate on defining deliverables, establishing a work plan, and determining tools to assist with this process.
  • 44. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 44 • Breadth – Organizational – People – Processes – Technology – Physical • Depth of Analysis – Comprehensive vs. Sampling – Key Components vs. Individual Elements Risk Analysis: Define Objectives Breadth & Depth of Analysis
  • 45. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 45 • Baseline – Where is the organization today? – What controls are in place? • Evaluation of security control effectiveness – Where should the security of the organization be? – Where are the gaps? – What are opportunities for improvement? • Establish awareness of threats & vulnerabilities • Lay foundation for development of security improvement plan Risk Analysis: Define Objectives Baseline
  • 46. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 46 • Defining the scope will set the framework for the risks to be managed and will provide guidance for future decisions. This avoids unnecessary work and improves the quality of risk analysis. • Components – Establish strategic context – Establish organizational context – Establish risk management context – Develop risk evaluation criteria Risk Analysis: Define Objectives Scope Source: http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf
  • 47. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 47 • ISO 17799 – Title: Information technology -- Code of practice for information security management – Starting point for developing policies – http://www.iso.ch/iso/en/prods-services/popstds/.../en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=33441&ICS1=35 • ISO 13335 – Title: Information technology -- Guidelines for the management of IT Security -- Part 1: Concepts and models for IT Security – Assists with developing baseline security. – http://www.iso.ch/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=21733&ICS1=35 • NIST SP 800-xx – Different standards for various applications – http://csrc.nist.gov/publications/nistpubs/ • Center for Internet Security – Configuration Standards (benchmarks) – http://www.cisecurity.org/ Risk Analysis: Define Objectives Standards
  • 48. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 48 • This is based on the environment in which the agency operates. • The agency should understand: – Strengths, weaknesses, opportunities, & threats – Internal and external stakeholders (objectives and perceptions) – Financial, operational, competitive, political, social, client, cultural and legal aspects of agency’s functions. • Risk analysis should be related to agency’s mission or strategic objectives • Cross-organizational issues should be taken into consideration when applicable Risk Analysis: Define Objectives Strategic Context Source: Information Security Guidelines for NSW Government Agencies Part 1 Information Security Risk Management
  • 49. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 49 • Organizational Context requires – Understanding of agency – How it is organized – Capabilities, goals, objectives, and strategies – Knowledge of assets and values • This assists in: – Defining criteria to determine risk acceptability – Forms the basis of controls and risk treatment options Risk Analysis: Define Objectives Organizational Context Source: Information Security Guidelines for NSW Government Agencies Part 1 Information Security Risk Management
  • 50. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 50 • Define review project and establish goals and objectives – Will review cover whole organization or just a single project, individual assets or groups of assets? • Define timeframe and location of review – What is budgeted time for review? – Where will the review take place? (one site or group of sites) Risk Analysis: Define Objectives Risk Management Context Source: Information Security Guidelines for NSW Government Agencies Part 1 Information Security Risk Management
  • 51. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 51 • Identify resources required to conduct review – Use to identify sources of risk, common vulnerabilities, threat types and areas of impact – Is assessment done internally or through an outside consultant? – How many people will be involved? – Who are the best people to involve? – What tools are going to be used? • Define extent of risk analysis – What are the functions of the parts of organization participating in managing risk? – What is the relationship between the risk assessment and other projects within other parts of the agency? Risk Analysis: Define Objectives Risk Management Context, cont’d. Source: Information Security Guidelines for NSW Government Agencies Part 1 Information Security Risk Management
  • 52. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 52 • Qualitative or Quantitative methods • Level of acceptable risk should be considered • Baseline – a collection of policies, standards, processes and technologies that establish a defined security level. • Risk criteria is influenced by: – Agency’s internal policy, goals and objectives – Expectations of stakeholders and customers – Legal requirements Risk Analysis: Define Objectives Risk Evaluation Criteria
  • 53. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 53 Risk Analysis: Methodology and Objectives Question 1) What are the four key steps to risk analysis? a. b. c. d. 2) Where would you start if you wanted to define the objectives of a risk analysis for your own organization?
  • 54. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 54 Risk Analysis: Methodology and Objectives Case Scenario in which objectives can be determined (scope, baseline, etc.)
  • 55. Module 4 Risk Analysis: Deliverables and Work Plan
  • 56. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 56 • Who is the intended audience for risk analysis? • Who should take part in risk analysis? • How is a work plan created? – Planning – Preparation – Threat Assessment – Risk Assessment – Recommendations Risk Analysis: Deliverables and Work Plan Outline
  • 57. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 57 • Executives – Upward communication – Brief and concise • Operational – What needs to be done for implementation of controls • Internal Employees – Awareness – Training • External Parties Risk Analysis: Deliverables Intended Audience
  • 58. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 58 • Business – Security Officer (planning, budgeting and management of security staff) – Security Manager (policy negotiation, data classification, risk assessment, role analysis) • Technical – Security Operations (vulnerability assessment, patch management, intrusion detection, scanning, forensics, response management, security technology research) – Security Architect (technology implementation, implementation options) – Security Administrator (user administration, server security configuration, desktop security) – Resource Owner (own any residual risk after controls are implemented) – Resource Custodian (implements/monitors controls) • Communications – Security Communications (marketing, awareness) Risk Analysis: Work Plan Putting the Team Together Source: CSCIC & Meta Group, Inc.
  • 59. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 59 1. Planning Stage – Aim and scope – Identification of security baselines – Schedule and methodology – Acknowledgement of responsibility 2. Preparation – Asset and value listings 3. Threat Assessment – Threats, sources, and impact Risk Analysis: Work Plan Creation Source: http://collection.nlc-bnc.ca/100/200/301/cse-cst/generic_state-e/mg11b_e.pdf
  • 60. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 60 4. Risk Assessment – Evaluation of existing controls – Vulnerabilities and exploit probability – Analysis of risk 5. Recommendations – Addition of new controls – Modification of existing controls – Removal of obsolete/inadequate controls Risk Analysis: Work Plan Creation cont’d Source: http://collection.nlc-bnc.ca/100/200/301/cse-cst/generic_state-e/mg11b_e.pdf
  • 61. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 61 Risk Analysis: Deliverables and Work Plan Assignment • Create a work plan for an organization.
  • 62. Module 5 Risk Analysis: Tools and Usage
  • 63. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 63 • What are asset inventory tools? • What are software usage tools? • What are vulnerability assessment tools? • What are configuration validation tools? • What are penetration testing tools? • What are password auditing tools? • What are documentation tools? Risk Analysis: Tools and Usage Outline
  • 64. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 64 • Tools can speed up the security assessment and help in automation of the risk analysis process. • Several categories of tools exist: – Asset Inventory – Software Usage – Vulnerability Assessment – Configuration Validation – Penetration Testing – Password Auditing – Documentation Risk Analysis: Tools and Usage Types Source: http://techrepublic.com.com/5100-6262-5060605-2.html
  • 65. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 65 • Inventory process includes physical inventory and automated tools • Physical inventory of IT assets that are not attached to the network – e.g. in storage closets or locally attached and that are thus not discoverable. • Autodiscovery tools collect physical data on an enterprise's IT assets and record history of changes made to the asset from the last scan – e.g. memory, processor, and software version • Inventory tools can either: – install an agent on the hardware device, which lets the inventory run even if the device is not attached to the network, – or be agentless, which can send information only when it is attached to the network. • In environments with mobile set of assets that are sporadically connected (e.g. once a month), agentless technology requires alternatives way to capture the inventory – e.g. such as an e-mail that kicks off the scan. • The assets that need to be discovered include – PDAs, PCs, networking equipment, and servers. Risk Analysis: Tools and Usage Asset inventory Source: http://techrepublic.com.com/5100-6262-5060605-2.html
  • 66. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 66 Risk Analysis: Tools and Usage Asset Inventory Tools Name Description Asset Tracker for Networks Inventory software tool intended to audit software and hardware components installed on computers over a network. It collects network inventory information, provides detailed comprehensive reports and allows export of assets details to external storages, such as SQL database or web site. http://www.alchemy-lab.com/products/atn/ Asset Center Peregrine Autodiscovery/inventory tool which maintains “an evolving snapshot of IT infrastructure” and provides: what hardware and software is available, asset connection to other assets, location of assets, access to assets, as well as financial and contractual information on assets. http://www.peregrine.com/products/assetcenter.asp Unicenter Access Managem ent Computer Associates International asset management tool. It features: “automated discovery, hardware inventory, network inventory, software inventory, configuration management, software usage monitoring, license management and extensive cross-platform reporting.” http://www3.ca.com/Solutions/Product.asp?ID=194
  • 67. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 67 Tools Asset Inventory Tools, cont’d. Name Description Tally Systems Tally Systems offers three tools which can be used for IT asset inventory. These are: TS Census Asset Inventory, WebCensus and PowerCensus. These products provide unparalleled IT asset inventory and tracking, hosted PC inventory and reporting, and enhanced inventory for Microsoft SMS respectively. http://www.tallysystems.com/products/itassettracking.html Isogon Isogon offers multiple tools. SoftAudit gathers software inventory and usage data from your z/OS, OS/390, or UNIX server. Asset insight offers PC, PDA, & network device auto-discovery software & captures data. Vista manages and organizes details from contracts, contract addenda/attachments, and maintenance agreements. http://www.isogon.com/SAM%20Solutions.htm
  • 68. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 68 • Software usage tools monitor the use of software applications in an organization • Several uses of such tools – Track usage patterns and report on trends to assist with server load balancing and license negotiation to prevent costly overbuying or risk-laden under buying. – Used to monitor and control the use of unauthorized applications (for example, video games and screen savers). – Important for vendor auditing the customers especially for monitoring clients for subscription-based pricing Risk Analysis: Tools and Usage Software Usage
  • 69. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 69 Risk Analysis: Tools and Usage Software Usage Tools Name Description Software Audit Tool (GASP) Designed to help detect and identify pirated software through tracking licenses. It is a suite of tools used by the Business Software Alliance and is freely available at: http://global.bsa.org/uk/antipiracy/tools/gasp.phtml
  • 70. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 70 • Vulnerability Assessment helps determine vulnerabilities in computer networks at any specific moment in time. • Deliverables: – List of exploits and threats to which systems and networks are vulnerable. (Ranked according to risk levels) – Specific information about exploits and threats listed. (name of exploit or threat, how the threat/exploit works) – Recommendations for mitigating risk from these threats and exploits. • Tools used can be: – Commercial or open source (decide based on staff skills) – Perform analysis such as: – Host-based or network-based Risk Analysis: Tools and Usage Vulnerability Assessment Sources: http://techrepublic.com.com/5100-6296-5194734-2.html http://www.intranetjournal.com/articles/200207/pse_07_14_02a.html
  • 71. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 71 Risk Analysis: Tools and Usage Vulnerability Assessment (Host or Network Based) Source: http://www.nwfusion.com/news/2004/0405specialfocus.html Host-based Tools Network-Based Tools Pros Pros Can provide rich security information, such as by checking user access logs. Once deployed, have limited impact on network traffic. Can give a quick look at what weaknesses hackers and worms can exploit. Available as software, appliances and managed services. Cons Cons Costs can add up when deploying agents across many desktops and servers. Deployment can be time-consuming. Requires careful planning to avoid conflict with security systems. Generates considerable network traffic.
  • 72. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 72 Risk Analysis: Tools and Usage Vulnerability Assessment Name Description Cerberus Internet Scanner Windows web server vulnerability tester designed to help administrators locate and fix security holes in their computer systems http://www.cerberus-infosec.co.uk/cis.shtml Cgichk This is a web vulnerability scanner which searches interesting directories and files on a site. Looks for interesting and hidden directories such as logs, scripts, restricted code, etc. http://sourceforge.net/projects/cgichk/ Nessus Server and client software vulnerability assessment tool which provides remote and local security checking. http://www.nessus.org/download.html SAINT SAINT (Security Administrator's Integrated Network Tool) is a security assessment tool. It scans through a firewall updated security checks from CERT & CIAC bulletins. Also, it features 4 levels of severity (red, yellow, brown, & green) through an HTML interface. Based on SATAN model. http://www.saintcorporation.com/products/saint_engine.html SARA SARA (Security Auditor's Research Assistant) Third generation UNIX-based security analysis tool. It contains: SANS/ISTS Certified, CVE standards support, an enterprise search module, standalone or daemon mode, user extension support and is based on the SATAN model http://www.www-arc.com/sara/ Nikto A web server scanner which performs comprehensive tests against web servers for multiple items, including over 2200 potentially dangerous files/CGIs, versions on over 140 servers, and problems on over 210 servers http://www.cirt.net/code/nikto.shtml
  • 73. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 73 • Configuration Validation – is the process in which the current configuration of a specific system, software, or hardware tool is tested against configuration guidelines. Risk Analysis: Tools and Usage Configuration Validation Source: http://nww1.com/news/2004/0216specialfocus.html •Human error is shown to be the 2nd largest reason for network downtime. •Using configuration validation tools will help correct for human error
  • 74. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 74 Risk Analysis: Tools and Usage Configuration Validation • Depending on focus, especially with network and OS configurations, configuration validation can utilize the same tools as vulnerability assessment & penetration testing • However, there are more specialized tools for validating specific software applications and hardware.
  • 75. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 75 Risk Analysis: Tools and Usage Configuration Validation Name Description Microsoft Baseline Security Analyzer Method of identifying common security misconfigurations among Microsoft Windows NT 4.0, 2000, XP, 2003, IIS, SQL Server, Exchange Server, Media Player, Data Access Components (MDAC), Virtual Machine, Commerce Server, Content Management Server, BizTalk Server, Host Integration Server & Office. http://www.microsoft.com/technet/security/tools/mbsahome.mspx CISCO Router and Security Device Manager This offers advanced configuration support for LAN and WAN interfaces, NAT, Stateful Firewall Policy, Inline Intrusion Prevention and IPSec virtual private network (VPN) features. It also provides a 1-click router lockdown and ability to check and recommend changes to router configuration based on ICSA Labs, and Cisco TAC recommendations.” http://www.cisco.com/en/US/products/sw/secursw/ps5318/ Linux Configuration and Diagnostic Tools This site provides a listing of various Linux configuration tools for system and network configuration, X configuration, library and kernel dependency management, and general diagnostics. http://www.comptechdoc.org/os/linux/usersguide/linux_ugdiag.html
  • 76. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 76 • Penetration Testing is the evaluation of a system for weaknesses through attempting to exploit vulnerabilities. • Can be done in-house or by a neutral 3rd party • “Black-box” (no knowledge) or “White-box” (complete knowledge) • Steps – Define scope (External: servers, infrastructure, underlying software; Internal: network access points; Application: proprietary applications and/or systems; Wireless/Remote Access; Telephone/Voice Technologies; Social Engineering) – Find correct tools (freeware or commercial software) – Properly configure tools to specific system – Gather information/data to narrow focus (“white-box”) – Scan using proper tools • Penetration Testing tools can include: – Network exploration (ping, port scanning, OS fingerprinting) – Password cracking – IDS, Firewall, Router, Trusted System, DOS, Containment Measures Testing – Application Testing and Code Review Risk Analysis: Tools and Usage Penetration Testing Source: http://www.penetration-testing.com
  • 77. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 77 Risk Analysis: Tools and Usage Penetration Testing Name Description Whois Domain name lookup to find administrative, technical, and billing contacts. It also provides name servers for the domain. http://www.allwhois.com Nmap Utility for network exploration or security auditing. Can scan large networks or single hosts. It uses raw IP packets to determine hosts available on network, services those hosts are running, OS and OS version they are running, type of packet filters/firewalls being used, etc. http://www.insecure.org/nmap/nmap_download.html MingSweeper Network Reconnaissance Tool. Supports various TCP port & filter scans, UDP scans, OS detection (NMAP and ICMP style), Banner grabbing etc. http://www.hoobie.net/mingsweeper/ Cheops Network mapping tool with graphical user interface (GUI). http://www.marko.net/cheops/ QueSO Remote OS detector. Sends obscure TCP packets to determine remote OS. http://www.antiserver.it/Unix/scanner/Unix-Scanner/
  • 78. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 78 • Used for testing passwords for weaknesses which lead to vulnerable systems • Reasons for password weakness – Poor encryption – Social engineering (e.g. password is spouse’s, pet’s or child’s name) – Passwords less than 6 characters – Passwords do not contain special characters and numbers in addition to lower and uppercase letters. – Passwords from any dictionary • Software tools might perform these tasks: – Extracting hashed passwords / encrypted passwords – Dictionary attack (cracks passwords by trying entries in a pre-installed dictionary) – Brute force attack (cracks passwords by trying all possible combinations of characters) • Deliverables – Recommendations for future password policies Risk Analysis: Tools and Usage Password Auditing
  • 79. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 79 Risk Analysis: Tools and Usage Password Auditing Name Description OS John the Ripper Detects weak UNIX passwords. “Uses highly optimized modules to decrypt different ciphertext formats and architectures” Can be modified to crack LM hashes in Windows. http://www.openwall.com/john/ All platforms Brutus Remote password cracker. http://www.hoobie.net/brutus/ Windows Magic Key Audits the AppleTalk users file for weak passwords using brute force methods. http://freaky.staticusers.net/security/auditing/MK3.2.3a.sit Macintosh L0phtcrack Assesses, recovers, and remediates Windows and Unix account passwords from multiple domains and systems. http://www.atstake.com/products/lc/ Windows & UNIX SAMInside Extracts information about users from SAM-files and performs brute force attack of Windows NT/2000/XP. Breaks defense of Syskey. http://www.topshareware.com/SAMInside-download-5188.htm Windows GetPass! Cracks weakly encrypted Cisco IOS type 7 passwords once encrypted password file is obtained. http://www.networkingfiles.com/Network/downloads/bosongetpassdownload.htm Cisco Router IOS wwwhack Brute force utility that will try to crack web authentication. Can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a correct username/password combination. http://www.securityfocus.com/tools/1785 Windows
  • 80. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 80 • Documentation contains data from the risk analysis • These documents should contain deliverables from other parts of the process (asset inventory, vulnerability assessment, etc.). – These can be provided automatically from specialized software or through compiled reports. • Documentation critical for legal cases where it can be used as evidence to justify expense on controls. • Documentation might include: – Focus of analysis – Current system vulnerabilities – Cost benefit analysis – Recommended controls Risk Analysis: Tools and Usage Documentation
  • 81. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 81 Risk Analysis: Tools and Usage Case Scenario(s) to determine proper tools necessary.
  • 82. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 82 Appendix
  • 83. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 83 Security Assessment Summary • Security Assessment is critical to build a measured defense against intrusions • Risk Analysis involves: – Asset Valuation – Vulnerability Analysis – Threat Identification – Evaluation and Recommendation of Controls • Several levels of risk analysis can be performed: – Audit (checklists and rules) – Non-Intrusive Vulnerability Assessment – Penetration Testing
  • 84. Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 84 Acknowledgements Grants & Personnel • Support for this work has been provided through the following grants – NSF 0210379 – FIPSE P116B020477 • Damira Pon, from the Center of Information Forensics and Assurance contributed extensively by reviewing and editing the material • Robert Bangert-Drowns from the School of Education provided extensive review of the material from a pedagogical view.