Download presentation
Presentation is loading. Please wait.
Published byGervase Ford Modified over 6 years ago
1
Threat and Risk Assessments in a Network Environment
Ted Reinhardt Course
2
Threat and Risk Assessment Overview An Evaluation of the Three Little Pigs Performance
4
Story Refresher Once upon a time there were three little pigs.
They went out into the world. There was a big bad wolf who wanted to eat the pigs. The first pig built a house out of straw. The wolf blew down the house and ate the pig. The second pig built a house out of sticks. The wolf blew down the house and ate the second pig. The third pig built a house out of bricks. The wolf tried to blow down the house and the third pig survived.
5
Asset Value Dwelling Confidentiality, Integrity, Availability and Value
6
Threat Threat agent Threat Class Wolf f Destruction 25 km/h
Blows House Down Threat Event
7
Threat Classes Destruction - Blows House Down
Removal - Steals house by moving it off foundation Disclosure - Listens in to conversations in the house Interruption - Keeps knocking on the door preventing owner from doing work Modification - Redecorates house (like Trading Spaces) DR DIM
8
Little Pig #1 - Straw House Threat and Risk Assessment
9
Pig #1 Straw House Performance Evaluation
One night the big bad wolf, who dearly loved to eat fat little piggies, came along and saw the first little pig in his house of straw. He said "Let me in, Let me in, little pig or I'll huff and I'll puff and I'll blow your house in!” "Not by the hair of my chinny chin chin", said the little pig. But of course the wolf did blow the house in and ate the first little pig. Threat Assessment was wrong. Likelihood was incorrectly assessed.
10
Little Pig #3 - Post Straw House Attack Threat Assessment
11
Safeguards Administrative, Procedural or Technical mechanism used to
mitigate a threat. Safeguards Cost to Implement House made of Sticks (wind loading 10 km/h) $2.00/bundle House made of Bricks (wind loading 70 km/h) $1000/pallet
12
Management Risk Decision
accept the risk mitigate the risk Risk Cost Balance is important
13
Re-evaluate Safeguards Periodically
14
Identify Threats Events
Destruction Removal Disclosure Interruption Modification NETSEC Threat Classes
15
Typical Threat Events Eavesdropping Traffic Flow Analysis Masquerading
Denial of service attacks Repudiation Replay Covert Channel
16
Select Safeguards Authentication Access Control Confidentiality
Integrity Non-repudiation Availability -- redundancy,recovery,disaster
17
Layer Safeguards Filtering Routers & 2 feeds Web Server using TLS
Hardened Server Firewall IPSEC VPN Gateway Firewall Server Network Filter Detection
18
How do you securely manage all these layers?
19
Security Continuum Protection Detection Response Recovery
20
Security Continuum Protection Detection Response Recovery Have a
contingency for when things fail!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.