Download presentation
Presentation is loading. Please wait.
Published byRoland Bates Modified over 9 years ago
1
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers (0596002173) and Secrets and Lies ( 0471253111)
2
―Systems ―Making completely secure servers ―Threats ―Risks ―Goals ―Motives ―Vulnerabilities ―Risk Analysis ―Attack Trees ―Defenses
3
Systems ―Complex ―Interact with other systems ―Have emergent properties that their designers did not intend ―Have bugs
4
Systems & Security ―Usual coping mechanism is to ignore the problem…WRONG ―Security is system within larger system ―Security theory vs security practice ̵ Real world systems do not lend themselves to theoretical solutions ―Must look at entire system & how security affects
5
The Landscape ―Secure from whom? ―Secure against what? ―Never black & white ―Context matters more than technology ―Secure is meaningless out of context
6
Completely Secure Servers ―Disconnect from Network ―Power Down ―Wipe & Degauss Memory & Harddrive ―Pulverize it to dust ―Threat Modeling ―Risk management
7
Threats ―Attacks are exceptions ―Digital Threats mirror Physical ―Will become more common, more widespread, harder to catch due to: ̵ Automation ̵ Action at a Distance ―Every two points are adjacent ̵ Technical Propagation
8
Threats ―All types of attackers ―All present some type of threat ―Impossible to anticipate ̵ all attacks or ̵ all types of attackers or ̵ all avenues of attack ―Point is not to prevent all but to “think about and analyze threats with greater depth and to take reasonable steps to prevent…”
9
Attacks ―Criminal ̵ Fraud-prolific on the Internet ̵ Destructive, Intellectual Property ̵ Identity Theft, Brand Theft ―Privacy: less and less available ̵ people do not own their own data ̵ Surveillance, Databases, Traffic Analysis ̵ Echelon, Carnivore ―Publicity & Denial of Service ―Legal
10
Risk Analysis “The identification and evaluation of the most likely permutation of assets, known and anticipated vulnerabilities, and known and anticipated types of attackers.”
11
Assets ―What are you trying to Protect ―Why is it being protected ―Risk for other systems on network ―Data ̵ Tampering vs. Stealing ̵ Liability
12
Security Goals #1 ―Privacy?, Anonymity? ―Authentication ―Data confidentiality ̵ End-user data ̵ Ramifications of disclosure ―Data Integrity ̵ Secure transmission (Vonnegut MIT) ̵ Secure servers (/etc) ̵ Software developer
13
Security Goals #2 ―System Integrity ̵ Is system being used as intended ̵ Trust relationships ̵ Executables (rootkit) ―System / Network availability ̵ Cyber-vandals ̵ DoS: All but impossible to prevent ―Security through obscurity?
14
Attackers ―Categorize by ̵ Objective, Access, Resources, Expertise, and Risk ―Hackers: ̵ Galileo, Marie Curie ―Lone Criminals, Insiders, Espionage, Press, Organized Crime, Terrorists
15
Motives Business competitors ―Same motives as “real-life” criminals ―Financial motives ̵ Credit cards ̵ The Cuckcoo’s Egg ―Political motives ―Personal / psychological motives
16
Motives ―Honeypot “to learn tools tactics and motives of blackhat community”Honeypot ―Script Kiddies ̵ Canned Exploits of Perl or Shell scripts ̵ Still major threat ―Knowing motives helps predict attack ―Degrees of motivation ̵ Automated tools ̵ Hardened systems vs Easy Kills
17
Steps in an Attack 1.Identify Target & collect Information 2.Find vulnerability in target 3.Gain appropriate access to target 4.Perform the attack 5.Complete attack, remove evidence, ensure future access
18
After you get root 1.Remove traces of root compromise 2.Gather information about system 3.Make sure you can get back in 4.Disable or patch vulnerability
19
Vulnerability Landscape ―Physical World ̵ Laptops ―Virtual World ―Trust Model ―System Life cycled
20
Vulnerabilities ―Only potential until someone figures out how to exploit ―Need to identify and address ̵ Those applicable & which must mitigated now ̵ Are likely to apply & must be planned against ̵ Seem unlikely and/or are easy to mitagate
21
Simple Risk Analysis: ALEs ―Correlate & quantify assets+vulnerabilites+attackers ―Annualized Loss Expectancy for each vulnerability associated with each asset ―Single loss Cost x Expected Annual Occurrence = ALE ―Compare against cost to prevent
22
ALE ―Strengths ̵ Simplicity (∆ PHB will like), flexibility ―Weakness ̵ Very subjective
23
Attack Trees (Bruce Schneier) ―Visual Representation of attacks against any given target ―Attack goal is root ―Attack subgoals are leaf nodes ̵ For each leaf determine subgoals necessary to achieve ̵ And cost to achieve penetration using different types of attackers
24
Attack Tree Example Steal Customer Data Obtain Backup Media Burfglarize Office (Cost $10,000) Intercept eMail Bribe Admin at ISP ($5,000) Hack remote users home system ($1,000) Hack SMTP Gateway ($2000) Hack into Server
25
Defenses ―Three general means of mitigating attack risk ̵ Reducing asset value to attacker ̵ Mitigating specific vulnerabilities ―Software patches ―Defensive Coding ̵ Neutralizing or preventing attacks ―Access control mechanisms ―Distinguish between trusted & untrusted users
26
Security ―Security is a process not a Product ―Weakest link in the process ―Examples of Threat Modeling in Secrets & Lies chapter 19
27
References ―Cohen, Fred “A Preliminary Classification Scheme for Information Security Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Based on that Model.” Sandia National Laboratories, Sept 1998 (www.all.net/journal/ntb/cause-and- effect.html)www.all.net/journal/ntb/cause-and- effect.html ―Bauer, Michael E. “Building Secure Servers with Linux.” O’Reilly, 2003
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.