Risk Assessment
Threat assessment
2) Threat assessment:
â–Ş identify the possible causes or sources of threats.
â–Ş A threat is the potential for some damage or trouble to the IT
environment.
â–Ş Sources:
â–Ş malicious attacks (automated malicious software)
â–Ş (Viruses, worms, Daniel of services, logic bomb)
â–Ş human threats are typically the most worrisome
â–Ş Internal
â–Ş External attacker
â–Ş also natural, ex:
â–Ş bad weather, floods,
â–Ş earthquakes, tornadoes, etc.
â–Ş factors in the environment, such as power failures.
18
Risk Assessment
Threat assessment
â–Ş Malicious human attackers are hard to categorize
because their motivations and actions could vary widely.
20
• is a dissatisfied employee seeking revenge against
the organization or
• a dissatisfied employee snooping for proprietary
information or personal information belonging to
other employees.
internal
attacker
• must penetrate an organization’s defenses (such as
firewalls) to gain access, and then would likely have
difficulty gaining access with root or admin
privileges.
external
attackers
Risk Assessment
Threat assessment
â–Ş Not all human threats have a malicious intention; for
example, a threat might arise from negligence (such as
forgetting to change a default computer account) or
accident (perhaps misconfiguring a firewall to allow
unwanted traffic, or unknowingly downloading malicious
software).
21
Risk Assessment
Threat assessment
â–Ş In a way, internal attackers are the most worrisome
because they presumably have direct access to an
organization’s valuable assets and perhaps have
computer accounts with high user privileges (e.g., Unix
root or Windows admin).
22
Risk Assessment
Threat assessment
â–Ş External attackers might include:
▪ amateur “hackers” motivated by curiosity or ego,
â–Ş professional criminals looking for profit or theft,
â–Ş terrorists seeking destruction or extortion,
â–Ş military agents motivated by national interests, or
â–Ş industrial spies attempting to steal proprietary information
for profit.
23
Risk Assessment
Threat assessment
â–Ş External threats might even include automated malicious
software, namely viruses and worms, that spread by
themselves through the internet.
â–Ş It might be feasible to identify major external threats, but
a possibility always exists for a new unknown external
threat.
24
Risk Assessment
Vulnerability analysis
â–Ş 3) Vulnerability analysis:
â–Ş A vulnerability is a weakness in a system, person, or
organization that could be taken advantage of by someone with
malicious intent.
25
vulnerabilities
Technical
system operations
security management
Risk Assessment
Vulnerability analysis
â–Ş 3) Vulnerability analysis:
â–Ş Technical vulnerabilities are perhaps the easiest to
identify by:
1. Vendors of computing and networking equipment
2. Web sites such as Bugtraq
3. automated vulnerability scanning tools
4. penetration testing
26
Risk Assessment
Vulnerability analysis
â–Ş Vendors of computing and networking equipment usually
publish bulletins of bugs and vulnerabilities, along with patches, for
their products.
â–Ş several Web sites maintain lists of security advisories about known
vulnerabilities. such as
â–Ş Bugtraq (http://www.securityfocus.com/archive/1)
â–Ş CERT (http://www.cert.org/advisories)
â–Ş automated vulnerability scanning tools to assess an operational
system. These scanners essentially contain a database of known
vulnerabilities and test a system for these vulnerabilities by probing.
such as
â–Ş Satan, SARA, SAINT, and Nessus.
â–Ş penetration testing which simulates the actions of an attacker
(NIST, 2003). (That active attacks will help to reveal weaknesses in
system defenses.) 27
Risk Assessment
Vulnerability analysis
â–Ş Vulnerabilities might arise from security management.
â–Ş For example,
â–Ş human resources might be insufficient to cover all important
security responsibilities, or
â–Ş personnel might be insufficiently trained.
â–Ş Security policies may be incomplete, exposing the
system to possible compromise.
â–Ş Other vulnerabilities might be related to system
operations.
â–Ş For example,
â–Ş suppose old data CDs are disposed in trash that is publicly
accessible.
â–Ş It would be easy for anyone to retrieve discarded data.
29
Risk Assessment
Impact analysis
30
4) Impact analysis:
â–Ş Estimates the impact of each threat on the organization,
that depends on some uncertain factors:
â–Ş the likelihood of the threat occurring;
â–Ş the loss from a successful threat; and
â–Ş the frequency of recurrence of the threat.
â–Ş In practice, these factors may be difficult to estimate, and
there are various ways to estimate and combine them in
an impact analysis.
Risk Assessment
Impact analysis
31
The impact analysis can range from:
Qualitative (descriptive)
anything
between.
Quantitative (mathematical)
End of Lecture 2
32

"information risk management in cybersecurity" Lecture 2

  • 1.
    Risk Assessment Threat assessment 2)Threat assessment: â–Ş identify the possible causes or sources of threats. â–Ş A threat is the potential for some damage or trouble to the IT environment. â–Ş Sources: â–Ş malicious attacks (automated malicious software) â–Ş (Viruses, worms, Daniel of services, logic bomb) â–Ş human threats are typically the most worrisome â–Ş Internal â–Ş External attacker â–Ş also natural, ex: â–Ş bad weather, floods, â–Ş earthquakes, tornadoes, etc. â–Ş factors in the environment, such as power failures. 18
  • 2.
    Risk Assessment Threat assessment ▪Malicious human attackers are hard to categorize because their motivations and actions could vary widely. 20 • is a dissatisfied employee seeking revenge against the organization or • a dissatisfied employee snooping for proprietary information or personal information belonging to other employees. internal attacker • must penetrate an organization’s defenses (such as firewalls) to gain access, and then would likely have difficulty gaining access with root or admin privileges. external attackers
  • 3.
    Risk Assessment Threat assessment â–ŞNot all human threats have a malicious intention; for example, a threat might arise from negligence (such as forgetting to change a default computer account) or accident (perhaps misconfiguring a firewall to allow unwanted traffic, or unknowingly downloading malicious software). 21
  • 4.
    Risk Assessment Threat assessment ▪In a way, internal attackers are the most worrisome because they presumably have direct access to an organization’s valuable assets and perhaps have computer accounts with high user privileges (e.g., Unix root or Windows admin). 22
  • 5.
    Risk Assessment Threat assessment ▪External attackers might include: ▪ amateur “hackers” motivated by curiosity or ego, ▪ professional criminals looking for profit or theft, ▪ terrorists seeking destruction or extortion, ▪ military agents motivated by national interests, or ▪ industrial spies attempting to steal proprietary information for profit. 23
  • 6.
    Risk Assessment Threat assessment â–ŞExternal threats might even include automated malicious software, namely viruses and worms, that spread by themselves through the internet. â–Ş It might be feasible to identify major external threats, but a possibility always exists for a new unknown external threat. 24
  • 7.
    Risk Assessment Vulnerability analysis â–Ş3) Vulnerability analysis: â–Ş A vulnerability is a weakness in a system, person, or organization that could be taken advantage of by someone with malicious intent. 25 vulnerabilities Technical system operations security management
  • 8.
    Risk Assessment Vulnerability analysis â–Ş3) Vulnerability analysis: â–Ş Technical vulnerabilities are perhaps the easiest to identify by: 1. Vendors of computing and networking equipment 2. Web sites such as Bugtraq 3. automated vulnerability scanning tools 4. penetration testing 26
  • 9.
    Risk Assessment Vulnerability analysis â–ŞVendors of computing and networking equipment usually publish bulletins of bugs and vulnerabilities, along with patches, for their products. â–Ş several Web sites maintain lists of security advisories about known vulnerabilities. such as â–Ş Bugtraq (http://www.securityfocus.com/archive/1) â–Ş CERT (http://www.cert.org/advisories) â–Ş automated vulnerability scanning tools to assess an operational system. These scanners essentially contain a database of known vulnerabilities and test a system for these vulnerabilities by probing. such as â–Ş Satan, SARA, SAINT, and Nessus. â–Ş penetration testing which simulates the actions of an attacker (NIST, 2003). (That active attacks will help to reveal weaknesses in system defenses.) 27
  • 10.
    Risk Assessment Vulnerability analysis â–ŞVulnerabilities might arise from security management. â–Ş For example, â–Ş human resources might be insufficient to cover all important security responsibilities, or â–Ş personnel might be insufficiently trained. â–Ş Security policies may be incomplete, exposing the system to possible compromise. â–Ş Other vulnerabilities might be related to system operations. â–Ş For example, â–Ş suppose old data CDs are disposed in trash that is publicly accessible. â–Ş It would be easy for anyone to retrieve discarded data. 29
  • 11.
    Risk Assessment Impact analysis 30 4)Impact analysis: â–Ş Estimates the impact of each threat on the organization, that depends on some uncertain factors: â–Ş the likelihood of the threat occurring; â–Ş the loss from a successful threat; and â–Ş the frequency of recurrence of the threat. â–Ş In practice, these factors may be difficult to estimate, and there are various ways to estimate and combine them in an impact analysis.
  • 12.
    Risk Assessment Impact analysis 31 Theimpact analysis can range from: Qualitative (descriptive) anything between. Quantitative (mathematical)
  • 13.