Threat Modeling and Data Sensitivity Classification for Information Security Risk Analysis Secure Electronic Elections – Case Study Conference on Data.

Slides:



Advertisements
Similar presentations
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Advertisements

Network Security Introduction Security technologies protect mission-critical networks from corruption and intrusion. Network security enables new business.
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Engineering Secure Software. Uses of Risk Thus Far  Start with the functionality Use cases  abuse/misuse cases p(exploit), p(vulnerability)  Start.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Copyright © Microsoft Corp 2006 Introduction to Threat Modeling Michael Howard, CISSP Senior Security Program Manager Security Engineering and Communication.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 Telstra in Confidence Managing Security for our Mobile Technology.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Introducing Computer and Network Security
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Lecture 11 Reliability and Security in IT infrastructure.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
Security.NET Chapter 1. How Do Attacks Occur? Stages of attack Examples of attacker actions 1. FootprintRuns a port scan on the firewall 2. PenetrationExploits.
Architecting secure software systems
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Introducing Computer and Network Security. Computer Security Basics What is computer security? –Answer depends on the perspective of the person you’re.
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
SEC835 Practical aspects of security implementation Part 1.
Information Security Antipatterns in Software Requriements Engineering Miroslav Kis Presented by Liping Cai.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Hands-On Threat Modeling with Trike v1. Generating Threats.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Module 11: Designing Security for Network Perimeters.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Practical Threat Modeling for Software Architects & System Developers
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 2: Designing Network Security
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Computer Security By Duncan Hall.
Chapter 1: Security Governance Through Principles and Policies
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Module 7: Designing Security for Accounts and Services.
Presented by Mike Sues, Ethical Hack Specialist Threat Modeling.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Threat Modeling: Employing the 5 Ws Security Series, December 13, 2013 Jeff Minelli Penn State ITS
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Threat Modeling for Cloud Computing
ISSeG Integrated Site Security for Grids WP2 - Methodology
Threat Modeling - An Overview All Your Data is Mine
Critical Security Controls
Evaluating Existing Systems
Evaluating Existing Systems
How to Mitigate the Consequences What are the Countermeasures?
Engineering Secure Software
Engineering Secure Software
6. Application Software Security
Presentation transcript:

Threat Modeling and Data Sensitivity Classification for Information Security Risk Analysis Secure Electronic Elections – Case Study Conference on Data Protection December 2003 Belgrade, Serbia and Montenegro Goran Obradović Director of Technology Chief Information Security Officer

Agenda  Problem Statement  Anti Patterns in Info Security Practice  Info Security Risk Analysis – The Journey  Threat Modeling with examples in Electronic Voting Systems  Current state-of-the-art electronic election systems  Conclusions  Q & A

Problem Statement To secure an application or a system without spending excessive time and effort we are tempted to blindly apply security controls that have already been extensively used in practice However, without understanding security requirements common security controls can not provide adequate protection within the specific context We have to understand:  the real value of information resources that we need to protect  if an attacker has an interest to compromise our system  what are the events and causes that will have an unwelcome consequence upon our system  what will be risk mitigation techniques that will maximize our ROSI index and minimize overall threat probability or risk to an acceptable level It is not acceptable that only technical part of the team defines security requirements. Business stakeholder must be involved. Events = Threats Causes = Vulnerabilities ROSI = Return on Security Investment

Info Security Anti Patterns Some Common Security Patterns: - Use firewalls - Use SSL/TSL to encrypt everything - Use X.509 Certificate authentication - Customer does not know what security he needs - We will use the latest version of the security product XYZ N-Tier Enterprise Information System - Example Users tier – external (known/unknown) and internal users Interaction tier – Web Servers and presentation logic Application tier – Application Servers, Web Services and Business Logic Back-end tiers – DBMS, Legacy Mainframes, EA applications

Info Security Anti Patterns N-Tier Enterprise Information System Dental Patient Record Original Patient Record Built-in Data Integrity Protection Built-in Data Confidentiality Protection

Info Security Risk Analysis – The Journey Three ingredients must be present for an attack to occur: 1.Threats 2.Vulnerabilities 3.Assets Take one of them away, and there will be no attack Analogy – heat, oxygen and fuel are needed for fire

The Process of Threat Modeling DFD – Data Flow Diagram DFDs focus on flow of data between processes, while UML Activity Diagrams focus on flow of control between processes.

Decompose Application Sample Application – Electronic Voting System System Components: - Various DBs - eVote Suite Applications - eVote Internet - CF105 – Voter Tracking and Registration - CF200 – Electronic Voting Machines - CF2000 – High-speed Central Count Voting Machines - Communication Infrastructures

Decompose Application – Cont. High-level Diagram for Internet Voting (small portion of it) - This is Level-0 DFD Diagram Interactors are: - Voters – external - Administrators - Application Developers - Auditors At this stage we only have high-level view of the system functionality

Decompose Application – Cont. More Detailed Diagram for Internet Voting -This is Level-1 DFD Diagram - We have better picture of processes, data flows and data stores at this view - We should stop in decomposing the system when we determine exact usage scenarios of the system and how interactors use the system - Be careful not to get into analysis paralysis

Information Resources Identified Resources: Server Computers – Web Server, Application Server, DB Servers Workstations and PCs – Voter PC and Developer Workstation Data Stores – Authentication DB, Results DB, source code store for Web pages and Web Services Communication Links – Internet links (wireline and wireless) Communication Links – Intranet links – LAN Classification Example:  Authentication DB:  Type – Highly-sensitive Information  Integrity – High  Confidentiality – High  Availability - High Resources can be: - Permanent or temporary data stores - Computers - Communication links and equipment

Determine Threats Use STRIDE (Microsoft) methodology to categorize threats: - S – Spoofing Identity – allow an attacker to pose as another user or allow a rogue server to pose as a valid server – user or server authentication - T – Tampering with Data – involves malicious modification of data – data integrity - R – Repudiation – prevents denial of action - I – Information Disclosure – involves the exposure of information to individuals who are not supposed to have access to it – data confidentiality - D – Denial of Service – deny system or service access to valid user – service or system availability - E – Elevation of Privilege – occurs when an unprivileged user gains privileged access to the system – user authorization Other methods: -OCTAVE “Operationally Critical Threat, Asset and Vulnerability Evaluation“ Carnegie Mellon University Threat TypeProcessesData StoresInteractorsData Flows SYNYN TYYNY RNYYY IYYNY DYYNY EYNNN

Threat Tree – Example 1 Threat - Attacker gains voter authentication credentials This is an example with multiple threat targets Explanations: -Dotted line represents paths toward less likely scenarios - Green circles denote possible mitigation technique - Red boxes are scenarios with no obvious mitigation

Threat Tree – Example 2 Threat - Attacker uses DoS or DDoS attacks to reduce availability of the system Another multiple threat target example Explanations: - Sometimes two or more events must happen (multiple vulnerabilities exploited) for an attack to be successful - Helps in threat tree pruning if one scenario is mitigated

Rank Threats Try to calculate threat probability – risk A simple way: Risk = Criticality x Likelihood of Occurrence At DVS we use the following:  Cyclomatic software complexity measurements  Number of Affected Users  Damage Potential  Level of skill needed  Cost of attack  Reproducibility  Discoverability Assign values from 1 to 10 to each category (except software complexity) Quantitative risk value will be average of the above values Threat probability or risk in info security systems has lot of common with classical game theory – multiple players, each with his/her own motives and strategies

Rank Threats – Example 1 Threat - Attacker gains voter authentication credentials Threat TargetIn this example we will consider front end process for voter requests processing Threat CategoryInformation Disclosure -> Spoofing of Identity Software Complexity Factor 17 Risks Number of Affected Users: 10 Damage Potential: 10 Level of skill needed: 6 Cost of attack: 9 Reproducibility: 9 Discoverability: 10 Total Risk 9 Possible Mitigation Use regular expression to filter user input Use SSL/TSL to protect data traffic Consider user certificates for authentication Software complexity factor calculates number of possible execution paths of a software module. We want this factor to be below 10.

Rank Threats – Example 2 Threat - Attacker uses DoS or DDoS attacks to reduce availability of the system Threat TargetIn this example we will consider the whole electronic voting system and specifically Web Server as a threat target Threat CategoryDenial of Service Software Complexity Factor NA Risks Number of Affected Users: 10 Damage Potential: 6 Level of skill needed: 6 Cost of attack: 8 Reproducibility: 8 Discoverability: 10 Total Risk 8 Possible Mitigation Use a firewall to drop certain IP packets Restrict resources used by anonymous users DDoS program called Tribe Flood Network (TFN) was so potent that even one daemon attacking a Unix workstation disabled it to the point where it had to be rebooted Communication equipment DoS issues - Majority of routers are very sensitive on fragmented TCP/IP packets

Threat Mitigation Techniques Partial list of Threat Mitigation Techniques Spoofing IdentityAppropriate authentication Protect secret data Don’t store secrets Tampering with DataAppropriate authorization Hashes Digital Signatures RepudiationDigital Signatures Timestamps Audit trails Information Disclosure Authorization Encryption Denial of Service Appropriate authentication and authorization Filtering, throttling Quality of Service Elevation of Privilege Run with least privilege Some mitigation technologies are more secure than others, but also can be more expensive than others. Always map mitigation technology to the corresponding threat based on information resource categorization and threat probability There is no point of using strong encryption for publicly known information – phone numbers are one example.

Internet Voting Big Security Problems Much easier to protect server side of the system, than home computers to be used for voting Malicious code is virtually limitless in the damage it can cause on a voting client – for example it can change the voter’s vote regardless of encryption or authentication used Examples: Backorfice 2000 – admin toolkit with full source code that runs in stealth mode. Can be used for remote administration with full control of the user’s machine CIH virus – time-bomb that can damage BIOS Tampering with Proxy server configuration in web browsers There are several delivery mechanisms for malicious code – (virus Bubbleboy activates in client preview mode), operating systems and applications with security flaws, … Other problems: - Vote selling – the opportunity for voters to sell their vote - Vote solicitation – the danger that outside of public polling station, it is much more difficult to control vote solicitation by political parties at the time of voting

Where are we now?

Conclusions Before any decision on what security controls should be used for protection of information assets or system infrastructure, thorough risk analysis must be performed. Data sensitivity classification and threat modeling are two of the fundamental prerequisite steps needed for risk analysis, which in turn provide security basis of requirements engineering process. Try to avoid Clausewitz syndrome (Carl von Clausewitz - German theoretician of war). We have to recognize and implement in everyday development practice that application security is not just about firewalls and passwords. Application security is much more about the business context within which the application is implemented

Questions and Answers Goran Obradović Director of Technology Chief Information Security Officer