1 1
Colorado State University Yashwant K Malaiya CS559 Midterm Review
Quantitative Cyber-Security
CSU Cybersecurity Center Computer Science Dept
Quantitative Cyber-Security Colorado State University Yashwant K - - PowerPoint PPT Presentation
Quantitative Cyber-Security Colorado State University Yashwant K Malaiya CS559 Midterm Review CSU Cybersecurity Center Computer Science Dept 1 1 Midterm coming Tuesday Will use canvas. Will need proper laptop/pc with camera. Update: Both
1 1
CSU Cybersecurity Center Computer Science Dept
2
3
4
DMZ: “Demilitarized zone”, distributed firewalls, From Georgia Tech Note multiple levels of trust.
5
Access Control List (ACL): Every object has an ACL that identifies what operations subjects can perform. Each access to object is checked against object’s ACL. May be kept in a relational database. Access recorded in file metadata (inode).
6
7
8
9
10
11
12
13
13
– X is a random variable that is the height of a randomly chosen student – x is one specific value (say 5’9”)
= =
max min max min max min min
i i i i i x x i i i i x x i
Density function “Cumulative distribution function” (cdf) Expected value (mean)
Quantitative Security
14
Actual
Disease + Disease - Predicted Test +ve TP FP Test –ve FN TN
15
15
0.5% are drug users. If a person tests positive, what is the probability he is a drug user?
P{A|B} is the probability of A, given we know B has happened.
33.3%
Quantitative Security
16
17
18
19
vulnerability
discover bug
– Incredibly valuable for both attackers and defenders [1]
20
21
22
23
– Linear, quadratic, logarithmic, exponential.. – Involving 1, 2 or more parameters
– If not try something more complex
– Not necessary but will be good.
October 15, 2020
23
24
25
26
27
Windows 98
5 10 15 20 25 30 35 40 45 Jan-99 Mar-99 May-99 Jul-99 Sep -99 Nov-99 Jan-00 Mar-00 May-00 Jul-00 Sep -00 Nov-00 Jan-01 Mar-01 May-01 Jul-01 Sep -01 Nov-01 Jan-02 Mar-02 May-02 Jul-02 Sep -02
Vulnerabilities Fitted curve Total vulnerabilites
28
29
30
31
32
– Base (mandatory): intrinsic to the vulnerability – Temporal: time-dependent variation in risk – Environmental: risk component dependent on the organization’s environment
33
V 3.0 Severity Rating Base Score Range None Low 0.1-3.9 Medium 4.0-6.9 High 7.0-8.9 Critial 9.0 - 10.0
34
35
– CVSS Exploitability, Microsoft Exploitability metric, Presence of actual exploits: small or negative correlations
36
37