SlideShare a Scribd company logo
Journal of Physical Security 4(2), 30‐34 (2010) 
30 
Viewpoint Paper 
Being Vulnerable to the Threat 
of Confusing Threats with Vulnerabilities* 
Roger G. Johnston 
Vulnerability Assessment Team 
Nuclear Engineering Division 
Argonne National Laboratory 
The following ideas are common, but I think quite wrong and thus myths: 
(1) A Threat without a mitigation is a Vulnerability. 
(2) A Threat Assessment (TA) is a Vulnerability Assessment (VA). 
(3) Threats are more important to understand than Vulnerabilities. 
(4) Many of the most common tools used for “Vulnerability Assessments” 
(whether true VAs or actually TAs) are good at finding Vulnerabilities. 
First some definitions. Most security professionals would probably more or 
less agree with the following definitions: 
Threat: Who might attack against what assets, using what resources, with 
what goal in mind, when/where/why, and with what probability. There might 
also be included some general aspect of the nature of the attack (e.g., car 
bombing, theft of equipment, etc.), but not details about the attack or the 
security measures that must be defeated and the Vulnerabilities to be exploited. 
Threat Assessment (TA): Attempting to predict the Threats. This may 
involve using intelligence data and information on past security incidents (at 
this building, facility, or infrastructure or ones like it.) To have proactive (not 
just reactive) security, however, a valid TA requires anticipating Threats that 
have not yet materialized. 
________________________________________________ 
*Editor’s Note: This paper was not peer-reviewed. This work was performed under the auspices of the 
United States Department of Energy (DOE) under contract DE-AC02-06CH11357. The views expressed 
here are those of the author and should not necessarily be ascribed to Argonne National Laboratory or 
DOE. Jon Warner provided useful suggestions.
Journal of Physical Security 4(2), 30‐34 (2010) 
31 
Vulnerability: a specific weakness in security (or a lack of security measures) 
that typically could be exploited by multiple adversaries having a range of 
motivations and interest in a lot of different assets. 
Vulnerability Assessment (VA): Attempting to discover (and perhaps 
demonstrate) security Vulnerabilities that could be exploited by an adversary. 
A good VA also often suggests practical countermeasures or improvements in 
security to eliminate or mitigate the Vulnerability, or to aid in resiliency and 
recovery after an attack. 
Risk Management: Attempting to minimize (security) hazards by deciding 
intelligently how to deploy, modify, or re-assign security resources. Involves the 
following inputs: TA results, VA results, assets to be protected, consequences 
of successful attacks, and the resources (time, funding, personnel) available to 
provide security. 
Attack: An attempt by an adversary to cause harm to valuable assets, usually 
by trying to exploit one or more Vulnerabilities. The harm may include theft, 
sabotage, destruction, espionage, tampering, or adulteration. 
Some examples of Threats and Vulnerabilities. 
Threat: Adversaries might install malware in the computers in our Personnel 
Department so they can steal social security numbers for purposes of identity 
theft. 
Vulnerability: The computers in the Personnel Department do not have up to 
date virus definitions for their anti-malware software. 
Threat: Thieves could break into our facility and steal our equipment. 
Vulnerability: The lock we are using on the building doors is easy to pick or 
bump. 
Threat: Nefarious insiders might release confidential information to adversaries. 
Vulnerability: Employees don’t currently have a good understanding of what 
information is sensitive/confidential and what is not, so they can’t do a good 
job of protecting it. 
Threat: Disgruntled employees could sabotage our facility. 
Vulnerability: The organization lacks effective Insider Threat countermeasures 
like background checks and disgruntlement mitigation (fair treatment of
Journal of Physical Security 4(2), 30‐34 (2010) 
32 
employees, legitimate complaint resolution processes, employee assistance 
programs, no tolerance for bully bosses, etc.) 
Threat: Extremists want to discredit our organization. 
Vulnerability: It is easy for them to dump hazardous chemicals on our property 
or pour them down our drains, and then fraudulently report us to the authorities 
as polluters. 
With these definitions, it should be clear that myth #1 above (“a Threat 
without a mitigation is a Vulnerability”) makes no sense because (a) a Threat is 
not a Vulnerability, (b) security is a continuum and 100% elimination of a 
Vulnerability is rarely possible, (c) adversaries may not automatically recognize 
a Vulnerability so mitigating it may be irrelevant for that specific Threat, and (d) 
Vulnerabilities don’t define Threats, i.e., terrorists don’t exist because buildings 
and people can be blown up. 
The commonly held myth #2 (TAs are VAs) is untrue because Threats are 
not the same thing as Vulnerabilities. Both TAs and VAs are needed, however, 
for good Risk Management, and they both depend on each other to some 
extent. Adversaries typically seek to exploit Vulnerabilities. Indeed, if there 
were no Vulnerabilities, the adversaries won’t succeed. And if there were no 
Threats, any existing security Vulnerabilities would be irrelevant. 
Note that Vulnerabilities don’t map one-to-one onto Threats. Many different 
kinds of adversaries with very different agendas can potentially exploit the same 
Vulnerability for very different reasons. Thus a lock that is easy to pick permits 
attacks involving theft, espionage, or vandalism. Computers lacking up to date 
virus checkers can be exploited for lots of different nefarious purposes. Of 
course, Threats don’t map one-to-one onto Vulnerabilities, either. An adversary 
can potentially pick and choose which Vulnerability or Vulnerabilities to exploit 
for any given goal. 
In thinking about Myth #3 (Threats are more important than Vulnerabilities) 
we need to consider that a TA involves mostly speculating about people who 
are not in front of us, and who might not even exist, but who have complex 
motivations, goals, mindsets, and resources if they do exist. Vulnerabilities are 
more concrete and right in front of us (if we’re clever and imaginative enough 
to see them). They are discovered by doing an analysis of actual infrastructure 
and its security—not speculating about people. Thus, getting Threats right is 
typically a lot harder than getting Vulnerabilities right. [Some people claim that
Journal of Physical Security 4(2), 30‐34 (2010) 
33 
past security incidents can tell us all we need to know about Threats, but that is 
just being reactive, not proactive, and misses rare but very catastrophic 
attacks.] 
I would go even further and argue that understanding Vulnerabilities is more 
powerful than understanding Threats—regardless of the relative difficulty of 
TAs vs. VAs. If you understand and take some reasonable effort to mitigate 
your security Vulnerabilities, you are probably in fairly good shape regardless of 
the Threats (which you are likely to get wrong anyway). On the other hand, if 
you understand the Threats but are ignorant of the Vulnerabilities, you are not 
likely to be very secure because the adversaries will have many different ways 
in. 
Myth #4 (existing tools are effective at finding Vulnerabilities) is quite 
prevalent, especially for infrastructure security. This is perhaps because there 
are such a staggering number of Vulnerabilities in any large, complex system 
(especially compared to Threats) that dealing with the Vulnerabilities is 
daunting. Also, finding Vulnerabilities takes a lot of careful thinking, on the 
ground investigation, hands-on analysis, and imagination/creativity. Threat 
Assessments, in contrast, often (unfortunately) involve relatively easy and 
simple-minded use of check lists, security surveys, compliance audits, 
guidelines, software programs, boilerplates, compliance requirements, databases 
of past security incidents, and “cookie cutter” approaches. There is, of course, 
no reason why a TA can’t or shouldn’t involve profound, critical, original, and 
creative thinking about security issues, it’s just that is so often does not. 
I break down the so-called “Vulnerability Assessment” methods into 4 general 
categories: 
1. Tools that can help find vulnerabilities but aren’t typically very good at it 
because they do not encourage thinking creatively like the bad guys about 
actual, local vulnerabilities and/or they make invalid assumptions: Security 
Surveys, Compliance Audits, boilerplate Software Programs, Tree Analysis, “Red 
Team” exercises. 
2. Tools that are good at finding Vulnerability Assessments: Adversarial 
Vulnerability Assessments (thinking about the security problem from the 
perspective of the bad guys, not the good guys and the existing security 
implementation), intrusion testing programs (for cyber security), critical 
security design reviews early in the design process for new security devices, 
systems, or programs.
Journal of Physical Security 4(2), 30‐34 (2010) 
34 
3. Misnamed “Vulnerability Assessment” tools that are really techniques for 
helping to decide how to allocate security resources, i.e., more like overall Risk 
Management than VAs per se: CARVER Method, Delphi Method. 
4. Tools that (despite the claims) are actually TA methods, not VA methods: 
Design Basis Threat, Compliance Audits, boilerplate Software Programs. 
One litmus test to tell if somebody claiming to do a Vulnerability Assessment 
is really doing a Threat Assessment is if they have identified a relatively small 
number of "Threats/vulnerabilities" (which they typically put in a table with 
made up rankings or probabilities), and if mitigating them is a major 
undertaking. If they are really doing a VA, they will have identified and maybe 
demonstrated dozens or hundreds of very specific vulnerabilities, and many of 
the countermeasures for mitigating them will be cheap and relatively painless, 
e.g., install anti-virus software in the Personnel Department computers that 
automatically updates virus definitions. 
Another sort of related problem commonly found in infrastructure security 
assessments is confusing features with vulnerabilities. Thus, a public road that 
travels close to the facility is often considered a Vulnerability. It is not, 
however; it is only an attribute. Only when coupled with an attack scenario 
(truck bomb, the road makes visual and electronic surveillance easier for 
espionage, assets can be thrown over the fence by insiders to the bad guy's 
parked truck, etc.) does a feature become a Vulnerability. The reason this is 
important is that different kinds of security countermeasures will typically be 
needed for different combinations of feature + attack. Without the context of 
attack scenarios, the only apparent countermeasure is to eliminate the feature; 
this may be expensive, impractical, and/or total overkill. 
Finally, we should not get confused about the purpose of a TA or VA. 
Neither a Threat Assessment or a Vulnerability Assessment is something we 
test against, some kind of “certification”, a standard, a metric for how good our 
security is, or a technique for finding out if our security mangers or frontline 
personnel are screwing up. The purpose of a VA is to improve security. The 
purpose of a TA is to help us decide (in conjunction with Risk Management) 
what and how much security we need. It doesn’t make any sense to talk about 
“passing” a TA or VA. This certainly cannot mean all Threats have been 
recognized or neutralized, or that there are zero Vulnerabilities or even that all 
Vulnerabilities are known and mitigated. Such things are not possible, and not 
provably true even if they were possible.

More Related Content

What's hot

Developing a Threat Modeling Mindset
Developing a Threat Modeling MindsetDeveloping a Threat Modeling Mindset
Developing a Threat Modeling Mindset
Robert Hurlbut
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meetingfcleary
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
Smart Assessment
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
Assessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk ForecastingAssessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk Forecasting
Jack Freund, PhD
 
Introducción al análisis de malware
Introducción al  análisis de malwareIntroducción al  análisis de malware
Introducción al análisis de malwareGustavo Martinez
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
IJCNCJournal
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
Rochester Security Summit
 
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
IJNSA Journal
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...franco_bb
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
EC-Council
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
EMC
 
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary ActivitiesTalking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
Shawn Riley
 
How secure are your systems
How secure are your systemsHow secure are your systems
How secure are your systems
City Unrulyversity
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...
Kelly Shortridge
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
ijcsa
 
Doten apt presentaiton (2)
Doten apt presentaiton (2)Doten apt presentaiton (2)
Doten apt presentaiton (2)
Jeff Green
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
IRJET Journal
 

What's hot (20)

Developing a Threat Modeling Mindset
Developing a Threat Modeling MindsetDeveloping a Threat Modeling Mindset
Developing a Threat Modeling Mindset
 
Massif cluster meeting
Massif cluster meetingMassif cluster meeting
Massif cluster meeting
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Assessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk ForecastingAssessing Quality in Cyber Risk Forecasting
Assessing Quality in Cyber Risk Forecasting
 
Introducción al análisis de malware
Introducción al  análisis de malwareIntroducción al  análisis de malware
Introducción al análisis de malware
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
GENERATING REPRESENTATIVE ATTACK TEST CASES FOR EVALUATING AND TESTING WIRELE...
 
The security mindset securing social media integrations and social learning...
The security mindset   securing social media integrations and social learning...The security mindset   securing social media integrations and social learning...
The security mindset securing social media integrations and social learning...
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
 
Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics Big data Propels SIEM into the era of Security Analytics
Big data Propels SIEM into the era of Security Analytics
 
APT - Project
APT - Project APT - Project
APT - Project
 
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary ActivitiesTalking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
Talking SoS with Shawn Riley - Cyber Resiliency Effects on Adversary Activities
 
How secure are your systems
How secure are your systemsHow secure are your systems
How secure are your systems
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...
 
Vulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application securityVulnerability scanners a proactive approach to assess web application security
Vulnerability scanners a proactive approach to assess web application security
 
Doten apt presentaiton (2)
Doten apt presentaiton (2)Doten apt presentaiton (2)
Doten apt presentaiton (2)
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 

Viewers also liked

Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
bhavanatmithun
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
Marcelo Silva
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
Manish Chaurasia
 
Earthquake and risk mitigation
Earthquake and risk mitigationEarthquake and risk mitigation
Earthquake and risk mitigation
Atiqa khan
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
Praveen Vackayil
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Security threats
Security threatsSecurity threats
Security threats
Qamar Farooq
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
ChromeInfo Technologies
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
Muhammad Faisal Naqvi, CISSP, CISA, AMBCI, ITIL, ISMS LA n Master
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (14)

Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Earthquake and risk mitigation
Earthquake and risk mitigationEarthquake and risk mitigation
Earthquake and risk mitigation
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Security threats
Security threatsSecurity threats
Security threats
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Threats vs. Vulnerabilities

Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
Roger Johnston
 
Adversarial Safety Analysis
Adversarial Safety AnalysisAdversarial Safety Analysis
Adversarial Safety Analysis
Roger Johnston
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloJohn Intindolo
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk judythornell
 
Explain the differences between a threat assessment- a vulnerability a.docx
Explain the differences between a threat assessment- a vulnerability a.docxExplain the differences between a threat assessment- a vulnerability a.docx
Explain the differences between a threat assessment- a vulnerability a.docx
james876543264
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
nathan816428
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
David Sweigert
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
lochanrajdahal
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdf
PercivalAdao7
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ZaiffiEhsan
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
Osama Salah
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
infosec train
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
JunSeok Seo
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Milind Agarwal
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environmentUltraUploader
 

Similar to Threats vs. Vulnerabilities (20)

Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Adversarial Safety Analysis
Adversarial Safety AnalysisAdversarial Safety Analysis
Adversarial Safety Analysis
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
Explain the differences between a threat assessment- a vulnerability a.docx
Explain the differences between a threat assessment- a vulnerability a.docxExplain the differences between a threat assessment- a vulnerability a.docx
Explain the differences between a threat assessment- a vulnerability a.docx
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdf
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Threat Hunters
Threat HuntersThreat Hunters
Threat Hunters
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
Beyond the Surface: Exploring the Depths of Vulnerability Assessment and Pene...
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
White hat march15 v2.2
White hat march15 v2.2White hat march15 v2.2
White hat march15 v2.2
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
An overview of computer viruses in a research environment
An overview of computer viruses in a research environmentAn overview of computer viruses in a research environment
An overview of computer viruses in a research environment
 

More from Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
Roger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
Roger Johnston
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
Roger Johnston
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
Roger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
Roger Johnston
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
Roger Johnston
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
Roger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
Roger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
Roger Johnston
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
Roger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
Roger Johnston
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
Roger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
Roger Johnston
 

More from Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 

Recently uploaded

MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
ILC- UK
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
Saeed Al Dhaheri
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
ehbuaw
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
Andrew Griffith
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
ahcitycouncil
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
JSchaus & Associates
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
JSchaus & Associates
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
850fcj96
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
oklahomajudicialproc1
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
ahcitycouncil
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
uptheratios
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
Antti Rautiainen
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
Paul Smith
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
850fcj96
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
ukyewh
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
Get Government Grants
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
ehbuaw
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
ahcitycouncil
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
GrantManagementInsti
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
RIDPRO11
 

Recently uploaded (20)

MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptxMHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
 
ZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdfZGB - The Role of Generative AI in Government transformation.pdf
ZGB - The Role of Generative AI in Government transformation.pdf
 
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
一比一原版(UOW毕业证)伍伦贡大学毕业证成绩单
 
Canadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key SlidesCanadian Immigration Tracker March 2024 - Key Slides
Canadian Immigration Tracker March 2024 - Key Slides
 
PPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933FPPT Item # 6 - 7001 Broadway ARB Case # 933F
PPT Item # 6 - 7001 Broadway ARB Case # 933F
 
2024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 362024: The FAR - Federal Acquisition Regulations, Part 36
2024: The FAR - Federal Acquisition Regulations, Part 36
 
2024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 372024: The FAR - Federal Acquisition Regulations, Part 37
2024: The FAR - Federal Acquisition Regulations, Part 37
 
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
快速制作(ocad毕业证书)加拿大安大略艺术设计学院毕业证本科学历雅思成绩单原版一模一样
 
The Role of a Process Server in real estate
The Role of a Process Server in real estateThe Role of a Process Server in real estate
The Role of a Process Server in real estate
 
PPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930FPPT Item # 5 - 5330 Broadway ARB Case # 930F
PPT Item # 5 - 5330 Broadway ARB Case # 930F
 
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our OrganizationUp the Ratios Bylaws - a Comprehensive Process of Our Organization
Up the Ratios Bylaws - a Comprehensive Process of Our Organization
 
Russian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale warRussian anarchist and anti-war movement in the third year of full-scale war
Russian anarchist and anti-war movement in the third year of full-scale war
 
What is the point of small housing associations.pptx
What is the point of small housing associations.pptxWhat is the point of small housing associations.pptx
What is the point of small housing associations.pptx
 
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
如何办理(uoit毕业证书)加拿大安大略理工大学毕业证文凭证书录取通知原版一模一样
 
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
一比一原版(QUT毕业证)昆士兰科技大学毕业证成绩单
 
Get Government Grants and Assistance Program
Get Government Grants and Assistance ProgramGet Government Grants and Assistance Program
Get Government Grants and Assistance Program
 
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
一比一原版(UQ毕业证)昆士兰大学毕业证成绩单
 
PPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way StopPPT Item # 8 - Tuxedo Columbine 3way Stop
PPT Item # 8 - Tuxedo Columbine 3way Stop
 
Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200Uniform Guidance 3.0 - The New 2 CFR 200
Uniform Guidance 3.0 - The New 2 CFR 200
 
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptxPD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
PD-1602-as-amended-by-RA-9287-Anti-Illegal-Gambling-Law.pptx
 

Threats vs. Vulnerabilities

  • 1. Journal of Physical Security 4(2), 30‐34 (2010) 30 Viewpoint Paper Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities* Roger G. Johnston Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory The following ideas are common, but I think quite wrong and thus myths: (1) A Threat without a mitigation is a Vulnerability. (2) A Threat Assessment (TA) is a Vulnerability Assessment (VA). (3) Threats are more important to understand than Vulnerabilities. (4) Many of the most common tools used for “Vulnerability Assessments” (whether true VAs or actually TAs) are good at finding Vulnerabilities. First some definitions. Most security professionals would probably more or less agree with the following definitions: Threat: Who might attack against what assets, using what resources, with what goal in mind, when/where/why, and with what probability. There might also be included some general aspect of the nature of the attack (e.g., car bombing, theft of equipment, etc.), but not details about the attack or the security measures that must be defeated and the Vulnerabilities to be exploited. Threat Assessment (TA): Attempting to predict the Threats. This may involve using intelligence data and information on past security incidents (at this building, facility, or infrastructure or ones like it.) To have proactive (not just reactive) security, however, a valid TA requires anticipating Threats that have not yet materialized. ________________________________________________ *Editor’s Note: This paper was not peer-reviewed. This work was performed under the auspices of the United States Department of Energy (DOE) under contract DE-AC02-06CH11357. The views expressed here are those of the author and should not necessarily be ascribed to Argonne National Laboratory or DOE. Jon Warner provided useful suggestions.
  • 2. Journal of Physical Security 4(2), 30‐34 (2010) 31 Vulnerability: a specific weakness in security (or a lack of security measures) that typically could be exploited by multiple adversaries having a range of motivations and interest in a lot of different assets. Vulnerability Assessment (VA): Attempting to discover (and perhaps demonstrate) security Vulnerabilities that could be exploited by an adversary. A good VA also often suggests practical countermeasures or improvements in security to eliminate or mitigate the Vulnerability, or to aid in resiliency and recovery after an attack. Risk Management: Attempting to minimize (security) hazards by deciding intelligently how to deploy, modify, or re-assign security resources. Involves the following inputs: TA results, VA results, assets to be protected, consequences of successful attacks, and the resources (time, funding, personnel) available to provide security. Attack: An attempt by an adversary to cause harm to valuable assets, usually by trying to exploit one or more Vulnerabilities. The harm may include theft, sabotage, destruction, espionage, tampering, or adulteration. Some examples of Threats and Vulnerabilities. Threat: Adversaries might install malware in the computers in our Personnel Department so they can steal social security numbers for purposes of identity theft. Vulnerability: The computers in the Personnel Department do not have up to date virus definitions for their anti-malware software. Threat: Thieves could break into our facility and steal our equipment. Vulnerability: The lock we are using on the building doors is easy to pick or bump. Threat: Nefarious insiders might release confidential information to adversaries. Vulnerability: Employees don’t currently have a good understanding of what information is sensitive/confidential and what is not, so they can’t do a good job of protecting it. Threat: Disgruntled employees could sabotage our facility. Vulnerability: The organization lacks effective Insider Threat countermeasures like background checks and disgruntlement mitigation (fair treatment of
  • 3. Journal of Physical Security 4(2), 30‐34 (2010) 32 employees, legitimate complaint resolution processes, employee assistance programs, no tolerance for bully bosses, etc.) Threat: Extremists want to discredit our organization. Vulnerability: It is easy for them to dump hazardous chemicals on our property or pour them down our drains, and then fraudulently report us to the authorities as polluters. With these definitions, it should be clear that myth #1 above (“a Threat without a mitigation is a Vulnerability”) makes no sense because (a) a Threat is not a Vulnerability, (b) security is a continuum and 100% elimination of a Vulnerability is rarely possible, (c) adversaries may not automatically recognize a Vulnerability so mitigating it may be irrelevant for that specific Threat, and (d) Vulnerabilities don’t define Threats, i.e., terrorists don’t exist because buildings and people can be blown up. The commonly held myth #2 (TAs are VAs) is untrue because Threats are not the same thing as Vulnerabilities. Both TAs and VAs are needed, however, for good Risk Management, and they both depend on each other to some extent. Adversaries typically seek to exploit Vulnerabilities. Indeed, if there were no Vulnerabilities, the adversaries won’t succeed. And if there were no Threats, any existing security Vulnerabilities would be irrelevant. Note that Vulnerabilities don’t map one-to-one onto Threats. Many different kinds of adversaries with very different agendas can potentially exploit the same Vulnerability for very different reasons. Thus a lock that is easy to pick permits attacks involving theft, espionage, or vandalism. Computers lacking up to date virus checkers can be exploited for lots of different nefarious purposes. Of course, Threats don’t map one-to-one onto Vulnerabilities, either. An adversary can potentially pick and choose which Vulnerability or Vulnerabilities to exploit for any given goal. In thinking about Myth #3 (Threats are more important than Vulnerabilities) we need to consider that a TA involves mostly speculating about people who are not in front of us, and who might not even exist, but who have complex motivations, goals, mindsets, and resources if they do exist. Vulnerabilities are more concrete and right in front of us (if we’re clever and imaginative enough to see them). They are discovered by doing an analysis of actual infrastructure and its security—not speculating about people. Thus, getting Threats right is typically a lot harder than getting Vulnerabilities right. [Some people claim that
  • 4. Journal of Physical Security 4(2), 30‐34 (2010) 33 past security incidents can tell us all we need to know about Threats, but that is just being reactive, not proactive, and misses rare but very catastrophic attacks.] I would go even further and argue that understanding Vulnerabilities is more powerful than understanding Threats—regardless of the relative difficulty of TAs vs. VAs. If you understand and take some reasonable effort to mitigate your security Vulnerabilities, you are probably in fairly good shape regardless of the Threats (which you are likely to get wrong anyway). On the other hand, if you understand the Threats but are ignorant of the Vulnerabilities, you are not likely to be very secure because the adversaries will have many different ways in. Myth #4 (existing tools are effective at finding Vulnerabilities) is quite prevalent, especially for infrastructure security. This is perhaps because there are such a staggering number of Vulnerabilities in any large, complex system (especially compared to Threats) that dealing with the Vulnerabilities is daunting. Also, finding Vulnerabilities takes a lot of careful thinking, on the ground investigation, hands-on analysis, and imagination/creativity. Threat Assessments, in contrast, often (unfortunately) involve relatively easy and simple-minded use of check lists, security surveys, compliance audits, guidelines, software programs, boilerplates, compliance requirements, databases of past security incidents, and “cookie cutter” approaches. There is, of course, no reason why a TA can’t or shouldn’t involve profound, critical, original, and creative thinking about security issues, it’s just that is so often does not. I break down the so-called “Vulnerability Assessment” methods into 4 general categories: 1. Tools that can help find vulnerabilities but aren’t typically very good at it because they do not encourage thinking creatively like the bad guys about actual, local vulnerabilities and/or they make invalid assumptions: Security Surveys, Compliance Audits, boilerplate Software Programs, Tree Analysis, “Red Team” exercises. 2. Tools that are good at finding Vulnerability Assessments: Adversarial Vulnerability Assessments (thinking about the security problem from the perspective of the bad guys, not the good guys and the existing security implementation), intrusion testing programs (for cyber security), critical security design reviews early in the design process for new security devices, systems, or programs.
  • 5. Journal of Physical Security 4(2), 30‐34 (2010) 34 3. Misnamed “Vulnerability Assessment” tools that are really techniques for helping to decide how to allocate security resources, i.e., more like overall Risk Management than VAs per se: CARVER Method, Delphi Method. 4. Tools that (despite the claims) are actually TA methods, not VA methods: Design Basis Threat, Compliance Audits, boilerplate Software Programs. One litmus test to tell if somebody claiming to do a Vulnerability Assessment is really doing a Threat Assessment is if they have identified a relatively small number of "Threats/vulnerabilities" (which they typically put in a table with made up rankings or probabilities), and if mitigating them is a major undertaking. If they are really doing a VA, they will have identified and maybe demonstrated dozens or hundreds of very specific vulnerabilities, and many of the countermeasures for mitigating them will be cheap and relatively painless, e.g., install anti-virus software in the Personnel Department computers that automatically updates virus definitions. Another sort of related problem commonly found in infrastructure security assessments is confusing features with vulnerabilities. Thus, a public road that travels close to the facility is often considered a Vulnerability. It is not, however; it is only an attribute. Only when coupled with an attack scenario (truck bomb, the road makes visual and electronic surveillance easier for espionage, assets can be thrown over the fence by insiders to the bad guy's parked truck, etc.) does a feature become a Vulnerability. The reason this is important is that different kinds of security countermeasures will typically be needed for different combinations of feature + attack. Without the context of attack scenarios, the only apparent countermeasure is to eliminate the feature; this may be expensive, impractical, and/or total overkill. Finally, we should not get confused about the purpose of a TA or VA. Neither a Threat Assessment or a Vulnerability Assessment is something we test against, some kind of “certification”, a standard, a metric for how good our security is, or a technique for finding out if our security mangers or frontline personnel are screwing up. The purpose of a VA is to improve security. The purpose of a TA is to help us decide (in conjunction with Risk Management) what and how much security we need. It doesn’t make any sense to talk about “passing” a TA or VA. This certainly cannot mean all Threats have been recognized or neutralized, or that there are zero Vulnerabilities or even that all Vulnerabilities are known and mitigated. Such things are not possible, and not provably true even if they were possible.