Vulnerability Analysis

Slides:



Advertisements
Similar presentations
Vulnerability Analysis. Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design.
Advertisements

Auditing Concepts.
Service Design – Section 4.5 Service Continuity Management.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Project Risk Management
COMP8130 and COMP4130 Adrian Marshall Verification and Validation Risk Management Adrian Marshall.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
The Australian/New Zealand Standard on Risk Management
Proprietary and confidential. © 2006 Perot Systems. All rights reserved. All registered trademarks are the property of their respective owners.
By: Ashwin Vignesh Madhu
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
Managing Project Risk.
Managing Risk to Reduce Construction Claims (And Improve Project Success) Presented by Laurie Dennis, PE, CVS-Life, FSAVE.
Vulnerability Assessments
Session 3 – Information Security Policies
Sam Cook April 18, Overview What is penetration testing? Performing a penetration test Styles of penetration testing Tools of the trade.
SEC835 Database and Web application security Information Security Architecture.
PRM 702 Project Risk Management Lecture #28
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
Network Vulnerability Assessment Methodology Lesson 6.
Chapter 11: Project Risk Management
Basics of OHSAS Occupational Health & Safety Management System
Information Systems Security Computer System Life Cycle Security.
Windows 2000 Security Policies & Practices: How to build your plan Mandy Andress, CISSP President ArcSec Technologies.
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
Quick Recap Monitoring and Controlling. Phases of Quality Assurance Acceptance sampling Process control Continuous improvement Inspection before/after.
IT Project Management, Third Edition Chapter 11 1 Chapter 6: Project Risk Management.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Question Four: Project Risk Management PMBOK definition of Project Risk Project risk management is the art and science of identifying, analyzing, and responding.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
SOFTWARE PROJECT MANAGEMENT
IT Risks and Controls Revised on Content Internal Control  What is internal control?  Objectives of internal controls  Types of internal controls.
Project Risk Management Planning Stage
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Introduction to Project Management Chapter 9 Managing Project Risk
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Project Risk Management Sections of this presentation were adapted from A Guide to the Project Management Body of Knowledge 3 rd Edition, Project Management.
Computer Security By Duncan Hall.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 16 – IT Security.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Chapter 11: Project Risk Management Information Technology Project Management, Fifth Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Risk Assessment: A Practical Guide to Assessing Operational Risk
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
CS457 Introduction to Information Security Systems
Auditing Concepts.
Topic 5 Penetration Testing 滲透測試
Information Security, Theory and Practice.
INDULGENCE There is no need for oversight or management direction. All staff members are superstars and act in the best interest of the company.
Chap 20. Vulnerability Analysis
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Compliance with hardening standards
CHAPTER11 Project Risk Management
Project Risk Management
I have many checklists: how do I get started with cyber security?
The Importance of Project Risk Management
Chapter 19: Building Systems with Assurance
IS4680 Security Auditing for Compliance
Presentation transcript:

Vulnerability Analysis

Vulnerability Analysis Formal verification Formally (mathematically) prove certain characteristics Proves the absence of flaws in a program or design but not in a system Penetration testing Attempt to violate specific constrains stated in a policy Cannot prove correctness but absence of a vulnerability Review

Penetration Testing Goals Layering of tests Prove the existence/absence of a previously defined flaw Find vulnerabilities under given restrictions (time, resources, ...) Layering of tests External attacker with no knowledge of the system External attacker with knowledge of the system Internal attacker with knowledge of the system

Penetration Testing Procedure Information gathering Find problem areas in the specification Flaw hypothesis Derive possible flaws from the information gathered Flaw testing Verify the possible flaws (exploiting, testing) – but no harming! Flaw generalization Generalize the obtained insights Flaw elimination proposal Flaws need to be fixed but sometimes this takes time and than the tester can suggest ways to prevent the exploit

Vulnerability Scanners Automated tools to test if the network or host is vulnerable to known attacks Run in batch mode against the system Process A set of system attributes are sampled and stored The results are compared to a reference set and the deviation derived

Nessus The Nessus Security Scanner is a security auditing tool made up of two parts: The server, nessusd is in charge of the attacks The client nessus provides an interface to the user Nessusd inspect the remote hosts and attempts to list all the vulnerabilities and common misconfigurations that affects them. Nessus can be set up to use other tools such as Nmap and Hydra. New plug-ins can be downloaded or written in the nasl scripting language.

ISS Internet scanner is a commercial security analysis tool similar to Nessus. It also consists of two parts a console and a sensor that is the client and server part of ISS. Runs exclusively on Windows systems. New pluggins can be downloaded or written as programs in C or Perl and added through the FlexCheck system. ISS and Nessus are the most popular security analysis tools

Network Based Analysis Probing the system actively by Looking for weaknesses Derive information from system responses Two different techniques Testing by exploit – really doing the attack Interference Methods – monitoring the system for vulnerable applications

Host Based Analysis Assessing system data sources (file contents, configuration setting, status information) to determine vulnerabilities Passive assessment where the tool has legitimated access which mostly involves privilege escalation attacks Targets are password files, SUID, access permissions, anonymous ftp ...

Advantage/Disadvantage + - Host based are tightly bound to the environment Network based can harm the system and are more prone to false alarms Can misguide a running IDS system May violate legal prescriptions (privacy, others sphere of influence ...) Helping to document the security state of a system Regular application can spot system changes which could lead to problems A way to double-check any changes made to the system

Risk analysis

Terms - Risk Risk constitutes from the expected likelihood of a hazardous event and the expected damage of the event. DIN, VDE Norm 31000, Risks are a function of the values of the assets at risk, the likelihood of threats occurring to cause the potential adverse business impacts, the ease of exploitation of the vulnerabilities by the identified threats, and any existing or planned safeguards which might reduce the risk. ISO 13335 – Guidelines for the management of IT Security (GMITS)

Terms - Risk Analysis The total process to identify, control, and manage the impact of uncertain harmful events, commensurate with the value of the protected assets. National Information Systems Security Glossary

Risk Analysis Approaches Bottom up The risk is an aggregate of lower level risks e.g. The risk that a phone break is a aggregation of the risk of the consiting parts Mainly used in technical risk analysis Top down The risk is detailed to derive more clarity Mainly use in organizational risk analysis

Risk Analysis Approaches Baseline Approach Do not analysis but apply baseline security Informal Approach Pragmatic risk analysis Detailed Risk Analysis In-depth valuation of assets, threat assessment and vulnerability assessment Combined Approach Initial high level approach where important systems are further analysis with a detailed approach ISO 13335 – Guidelines for the management of IT Security (GMITS)

Risk Identification Checklists/Best practices Mathematical Approaches RA Tools (e.g. CRAMM, COBRA …) Standards ISO 17799, ISO 13335, Common criteria Basic Protection Manual (Grundschutzhandbuch) ... Mathematical Approaches Trend Analysis, Regression Analysis ... Creative approaches Brainstorming, Delphi Method ..

Risk Assessment Assess the values for a risk (per asset) How likely is it ? How harmful is it? Assessment Approaches Mathematical/Statistical Methods Time line analysis (Trend Analysis) Regression analysis Simulation Monte Carlo Simulation Expert guesses

Risk Assessment Severity Analysis Qualitative Methods Calculate the risk; r = p * e Qualitative Methods Abstract values for ranking (high – low effect, high – low likelihood) Quantitative Methods Specific values indicating severity (p=0.32, e = 1000 or e = 0.43)

Risk countermeasures Avoidance Reduction A measurement is chosen (respectively not chosen) so that the risk can not emerge. Reduction of threat the cause of the risk is tried to be reduce. of vulnerability reducing the vulnerability of impact reduce the effects

Risk countermeasures Detection Recovery Transfer Acceptance identified when the risk is emerging – eliminating the risk source Recovery establish a recovery strategy Transfer transfer the risk to a third party Acceptance Preconditions set by the management Residual Risk - The maximal acceptable risk Final decision made by the management

AS/NZS: 4360 RM Process Identify Context Identify Risks Analyze Risks Define the organizational context Identify Risks What can happen and how Analyze Risks Determine Likelihood and consequences Evaluate Risk Compare against criteria and set priorities Treat Risk Identify treatment options and decide for one

Process after ISO 17799 Asset Identification Threat Assessment Vulnerability Assessment Safeguard Assessment Risk Assessment

Approaches OCTAVE CORAS CRAMM ... Software Engineering Institute approach CORAS European Research group approach Software Tool free available CRAMM British Software Tool ...

Security Policy

Policy - Terms and definitions As security policy is a formal statement of the rules by which people who are given access to an organization’s technology and information assets must abide. Security Policy (Site Security Handbook, B. Fraser)

Policy classification Language Formal languages (mathematics, state engines, constrain languages Natural language (normative languages, free speech) Target Product (mostly a technical system) Overall (mostly an organization or humans)

Information Security Policy Hierarchy

Overall Policy Expresses policy at the highest level of abstraction A statement about the importance of information resources Management and employee responsibility Critical and subsequent security requirements As a subdocument acceptable risks and budgets

Requirements to a policy Policies need to set a high enough level to guide for longer time periods Demonstrate organizational commitment to security Position of responsibility to owners, partners and public Hierarchy of policies Concordant with organizational culture and norms

Target Policies Tactical regulation instrument Can have operational guidelines Specific in a target area but not to detailed

Product policy Requirements to the product Additional Security Relaxing other policies Formulating special target policies for products Privacy Confidentiality statements Reliability statements ...

Questions ?