Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers (0596002173) and Secrets and Lies ( 0471253111)

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Information Warfare Theory of Information Warfare
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
EEC 688/788 Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Chapter 1 Introduction to Security
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
CPSC 6126 Computer Security Information Assurance.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
ISEC0511 Programming for Information System Security
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
G53SEC Computer Security Introduction to G53SEC 1.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Presented by: Dr. Munam Ali Shah
Honeypot and Intrusion Detection System
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Security Management Practices General overview of good security management processes. Introduces topics used in several other sections.
Security in Computer System 491 CS-G(172) By Manesh T
Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
12015/10/20 Muhammad Salman University of Indonesia.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Access Control Systems A means of ensuring a system’s C.I.A given the threats, vulnerabilities, & risks its infrastructure.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Chap1: Is there a Security Problem in Computing?.
Information Warfare Playgrounds to Battlegrounds.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Computer Security By Duncan Hall.
Web Security Introduction to Ethical Hacking, Ethics, and Legality.
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
CS457 Introduction to Information Security Systems
Information Security, Theory and Practice.
Secure Software Confidentiality Integrity Data Security Authentication
Chapter 5 Electronic Commerce | Security
Securing Information Systems
Chapter 5 Electronic Commerce | Security
SECURITY POLICIES, LAWS AND COMPUTER CRIMES (CCI410) PERTEMUAN 12
Module 4 System and Application Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )

―Systems ―Making completely secure servers ―Threats ―Risks ―Goals ―Motives ―Vulnerabilities ―Risk Analysis ―Attack Trees ―Defenses

Systems ―Complex ―Interact with other systems ―Have emergent properties that their designers did not intend ―Have bugs

Systems & Security ―Usual coping mechanism is to ignore the problem…WRONG ―Security is system within larger system ―Security theory vs security practice ̵ Real world systems do not lend themselves to theoretical solutions ―Must look at entire system & how security affects

The Landscape ―Secure from whom? ―Secure against what? ―Never black & white ―Context matters more than technology ―Secure is meaningless out of context

Completely Secure Servers ―Disconnect from Network ―Power Down ―Wipe & Degauss Memory & Harddrive ―Pulverize it to dust ―Threat Modeling ―Risk management

Threats ―Attacks are exceptions ―Digital Threats mirror Physical ―Will become more common, more widespread, harder to catch due to: ̵ Automation ̵ Action at a Distance ―Every two points are adjacent ̵ Technical Propagation

Threats ―All types of attackers ―All present some type of threat ―Impossible to anticipate ̵ all attacks or ̵ all types of attackers or ̵ all avenues of attack ―Point is not to prevent all but to “think about and analyze threats with greater depth and to take reasonable steps to prevent…”

Attacks ―Criminal ̵ Fraud-prolific on the Internet ̵ Destructive, Intellectual Property ̵ Identity Theft, Brand Theft ―Privacy: less and less available ̵ people do not own their own data ̵ Surveillance, Databases, Traffic Analysis ̵ Echelon, Carnivore ―Publicity & Denial of Service ―Legal

Risk Analysis “The identification and evaluation of the most likely permutation of assets, known and anticipated vulnerabilities, and known and anticipated types of attackers.”

Assets ―What are you trying to Protect ―Why is it being protected ―Risk for other systems on network ―Data ̵ Tampering vs. Stealing ̵ Liability

Security Goals #1 ―Privacy?, Anonymity? ―Authentication ―Data confidentiality ̵ End-user data ̵ Ramifications of disclosure ―Data Integrity ̵ Secure transmission (Vonnegut MIT) ̵ Secure servers (/etc) ̵ Software developer

Security Goals #2 ―System Integrity ̵ Is system being used as intended ̵ Trust relationships ̵ Executables (rootkit) ―System / Network availability ̵ Cyber-vandals ̵ DoS: All but impossible to prevent ―Security through obscurity?

Attackers ―Categorize by ̵ Objective, Access, Resources, Expertise, and Risk ―Hackers: ̵ Galileo, Marie Curie ―Lone Criminals, Insiders, Espionage, Press, Organized Crime, Terrorists

Motives Business competitors ―Same motives as “real-life” criminals ―Financial motives ̵ Credit cards ̵ The Cuckcoo’s Egg ―Political motives ―Personal / psychological motives

Motives ―Honeypot “to learn tools tactics and motives of blackhat community”Honeypot ―Script Kiddies ̵ Canned Exploits of Perl or Shell scripts ̵ Still major threat ―Knowing motives helps predict attack ―Degrees of motivation ̵ Automated tools ̵ Hardened systems vs Easy Kills

Steps in an Attack 1.Identify Target & collect Information 2.Find vulnerability in target 3.Gain appropriate access to target 4.Perform the attack 5.Complete attack, remove evidence, ensure future access

After you get root 1.Remove traces of root compromise 2.Gather information about system 3.Make sure you can get back in 4.Disable or patch vulnerability

Vulnerability Landscape ―Physical World ̵ Laptops ―Virtual World ―Trust Model ―System Life cycled

Vulnerabilities ―Only potential until someone figures out how to exploit ―Need to identify and address ̵ Those applicable & which must mitigated now ̵ Are likely to apply & must be planned against ̵ Seem unlikely and/or are easy to mitagate

Simple Risk Analysis: ALEs ―Correlate & quantify assets+vulnerabilites+attackers ―Annualized Loss Expectancy for each vulnerability associated with each asset ―Single loss Cost x Expected Annual Occurrence = ALE ―Compare against cost to prevent

ALE ―Strengths ̵ Simplicity (∆ PHB will like), flexibility ―Weakness ̵ Very subjective

Attack Trees (Bruce Schneier) ―Visual Representation of attacks against any given target ―Attack goal is root ―Attack subgoals are leaf nodes ̵ For each leaf determine subgoals necessary to achieve ̵ And cost to achieve penetration using different types of attackers

Attack Tree Example Steal Customer Data Obtain Backup Media Burfglarize Office (Cost $10,000) Intercept Bribe Admin at ISP ($5,000) Hack remote users home system ($1,000) Hack SMTP Gateway ($2000) Hack into Server

Defenses ―Three general means of mitigating attack risk ̵ Reducing asset value to attacker ̵ Mitigating specific vulnerabilities ―Software patches ―Defensive Coding ̵ Neutralizing or preventing attacks ―Access control mechanisms ―Distinguish between trusted & untrusted users

Security ―Security is a process not a Product ―Weakest link in the process ―Examples of Threat Modeling in Secrets & Lies chapter 19

References ―Cohen, Fred “A Preliminary Classification Scheme for Information Security Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on that Model.” Sandia National Laboratories, Sept 1998 ( effect.html) effect.html ―Bauer, Michael E. “Building Secure Servers with Linux.” O’Reilly, 2003