"information risk management in cybersecurity" Lecture 2
1.
Risk Assessment
Threat assessment
2)Threat assessment:
â–Ş identify the possible causes or sources of threats.
â–Ş A threat is the potential for some damage or trouble to the IT
environment.
â–Ş Sources:
â–Ş malicious attacks (automated malicious software)
â–Ş (Viruses, worms, Daniel of services, logic bomb)
â–Ş human threats are typically the most worrisome
â–Ş Internal
â–Ş External attacker
â–Ş also natural, ex:
â–Ş bad weather, floods,
â–Ş earthquakes, tornadoes, etc.
â–Ş factors in the environment, such as power failures.
18
2.
Risk Assessment
Threat assessment
â–ŞMalicious human attackers are hard to categorize
because their motivations and actions could vary widely.
20
• is a dissatisfied employee seeking revenge against
the organization or
• a dissatisfied employee snooping for proprietary
information or personal information belonging to
other employees.
internal
attacker
• must penetrate an organization’s defenses (such as
firewalls) to gain access, and then would likely have
difficulty gaining access with root or admin
privileges.
external
attackers
3.
Risk Assessment
Threat assessment
â–ŞNot all human threats have a malicious intention; for
example, a threat might arise from negligence (such as
forgetting to change a default computer account) or
accident (perhaps misconfiguring a firewall to allow
unwanted traffic, or unknowingly downloading malicious
software).
21
4.
Risk Assessment
Threat assessment
â–ŞIn a way, internal attackers are the most worrisome
because they presumably have direct access to an
organization’s valuable assets and perhaps have
computer accounts with high user privileges (e.g., Unix
root or Windows admin).
22
5.
Risk Assessment
Threat assessment
â–ŞExternal attackers might include:
▪ amateur “hackers” motivated by curiosity or ego,
â–Ş professional criminals looking for profit or theft,
â–Ş terrorists seeking destruction or extortion,
â–Ş military agents motivated by national interests, or
â–Ş industrial spies attempting to steal proprietary information
for profit.
23
6.
Risk Assessment
Threat assessment
â–ŞExternal threats might even include automated malicious
software, namely viruses and worms, that spread by
themselves through the internet.
â–Ş It might be feasible to identify major external threats, but
a possibility always exists for a new unknown external
threat.
24
7.
Risk Assessment
Vulnerability analysis
â–Ş3) Vulnerability analysis:
â–Ş A vulnerability is a weakness in a system, person, or
organization that could be taken advantage of by someone with
malicious intent.
25
vulnerabilities
Technical
system operations
security management
8.
Risk Assessment
Vulnerability analysis
â–Ş3) Vulnerability analysis:
â–Ş Technical vulnerabilities are perhaps the easiest to
identify by:
1. Vendors of computing and networking equipment
2. Web sites such as Bugtraq
3. automated vulnerability scanning tools
4. penetration testing
26
9.
Risk Assessment
Vulnerability analysis
â–ŞVendors of computing and networking equipment usually
publish bulletins of bugs and vulnerabilities, along with patches, for
their products.
â–Ş several Web sites maintain lists of security advisories about known
vulnerabilities. such as
â–Ş Bugtraq (http://www.securityfocus.com/archive/1)
â–Ş CERT (http://www.cert.org/advisories)
â–Ş automated vulnerability scanning tools to assess an operational
system. These scanners essentially contain a database of known
vulnerabilities and test a system for these vulnerabilities by probing.
such as
â–Ş Satan, SARA, SAINT, and Nessus.
â–Ş penetration testing which simulates the actions of an attacker
(NIST, 2003). (That active attacks will help to reveal weaknesses in
system defenses.) 27
10.
Risk Assessment
Vulnerability analysis
â–ŞVulnerabilities might arise from security management.
â–Ş For example,
â–Ş human resources might be insufficient to cover all important
security responsibilities, or
â–Ş personnel might be insufficiently trained.
â–Ş Security policies may be incomplete, exposing the
system to possible compromise.
â–Ş Other vulnerabilities might be related to system
operations.
â–Ş For example,
â–Ş suppose old data CDs are disposed in trash that is publicly
accessible.
â–Ş It would be easy for anyone to retrieve discarded data.
29
11.
Risk Assessment
Impact analysis
30
4)Impact analysis:
â–Ş Estimates the impact of each threat on the organization,
that depends on some uncertain factors:
â–Ş the likelihood of the threat occurring;
â–Ş the loss from a successful threat; and
â–Ş the frequency of recurrence of the threat.
â–Ş In practice, these factors may be difficult to estimate, and
there are various ways to estimate and combine them in
an impact analysis.