Threat Identification Approach Brain Storm from all Directions Use different approaches and thought processes to cover as many threats as possible. Who are your enemies? what do they want to do? what can they do? (penetration testing) What has happened in the past? to yourself to others What is your great fears? how could it come about? What could happen? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 14 / 46
Threat Identification Approach Brain Storm from all Directions Use different approaches and thought processes to cover as many threats as possible. Who are your enemies? what do they want to do? what can they do? (penetration testing) What has happened in the past? to yourself to others What is your great fears? how could it come about? What could happen? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 14 / 46
Threat Identification Approach Brain Storm from all Directions Use different approaches and thought processes to cover as many threats as possible. Who are your enemies? what do they want to do? what can they do? (penetration testing) What has happened in the past? to yourself to others What is your great fears? how could it come about? What could happen? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 14 / 46
Threat Identification Approach Brain Storm from all Directions Use different approaches and thought processes to cover as many threats as possible. Who are your enemies? what do they want to do? what can they do? (penetration testing) What has happened in the past? to yourself to others What is your great fears? how could it come about? What could happen? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 14 / 46
Threat Identification Approach Brain Storm from all Directions Use different approaches and thought processes to cover as many threats as possible. Who are your enemies? what do they want to do? what can they do? (penetration testing) What has happened in the past? to yourself to others What is your great fears? how could it come about? What could happen? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 14 / 46
Threat Identification Approach Qualitative and Quantitative Approaches Quantitiative approaches (e.g. FAIR) measure and quantify issues prioritise mathematically Detail required to measure Qualititative approaches (e.g. ISO 27005) identify all problems no accurate assessment of severity If you start the quantitative approaches to early many threats will slip through Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 15 / 46
Threat Identification Approach Qualitative and Quantitative Approaches Quantitiative approaches (e.g. FAIR) measure and quantify issues prioritise mathematically Detail required to measure Qualititative approaches (e.g. ISO 27005) identify all problems no accurate assessment of severity If you start the quantitative approaches to early many threats will slip through Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 15 / 46
Threat Identification Approach Qualitative and Quantitative Approaches Quantitiative approaches (e.g. FAIR) measure and quantify issues prioritise mathematically Detail required to measure Qualititative approaches (e.g. ISO 27005) identify all problems no accurate assessment of severity If you start the quantitative approaches to early many threats will slip through Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 15 / 46
Threat Identification Approach Qualitative and Quantitative Approaches Quantitiative approaches (e.g. FAIR) measure and quantify issues prioritise mathematically Detail required to measure Qualititative approaches (e.g. ISO 27005) identify all problems no accurate assessment of severity If you start the quantitative approaches to early many threats will slip through Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 15 / 46
Threat Sources Outline Threat Identification 1 Threat Sources 2 WikiLeaks from Afghanistan The Stuxnet Worm The Seven Cybercriminal Families Vulnerability Identification 3 Closure 4 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 16 / 46
Threat Sources What is a threat source? Recap Threat source or threat agent An entity with an intention and capability to cause impact Sentient adversaries — potential attackers Honest users — making mistakes Nature and random events There is a reason behind incidents Enemies with an objective of their own Nature and its random events Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 17 / 46
Threat Sources Why do we identify threat sources? Why do we need to identify the threat sources? When is the threat realised? how often Understand the nature of the threat resourceful attackers or amateurs? How will a preliminary attack be exploited? blackmail? slander? further attacks? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 18 / 46
Threat Sources Why do we identify threat sources? Why do we need to identify the threat sources? When is the threat realised? how often Understand the nature of the threat resourceful attackers or amateurs? How will a preliminary attack be exploited? blackmail? slander? further attacks? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 18 / 46
Threat Sources Why do we identify threat sources? Why do we need to identify the threat sources? When is the threat realised? how often Understand the nature of the threat resourceful attackers or amateurs? How will a preliminary attack be exploited? blackmail? slander? further attacks? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 18 / 46
Threat Sources Why do we identify threat sources? Why do we need to identify the threat sources? When is the threat realised? how often Understand the nature of the threat resourceful attackers or amateurs? How will a preliminary attack be exploited? blackmail? slander? further attacks? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 18 / 46
Threat Sources WikiLeaks from Afghanistan Outline Threat Identification 1 Threat Sources 2 WikiLeaks from Afghanistan The Stuxnet Worm The Seven Cybercriminal Families Vulnerability Identification 3 Closure 4 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 19 / 46
Threat Sources WikiLeaks from Afghanistan WikiLeaks http://www.wikileaks.org/ 77 000 military, classified documents on the war in Afghanistan late July 2010 lifted from the US military leaks from Iraq October 2010 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 20 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Assets Confidential information former informants potential targets of retribution future operations allowing counter-operations previous operations leading to impact on goodwill and reputation Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 21 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Relevant Threat Sources Taliban and other insurgent organisation military use of the information Freedom of Information Movements champions of the public right to information Anti-War Movements aiming to swing the public opinion about the war Other military and political enemies of the state damage the state’s military capability Who is the actual threat source? Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 22 / 46
Threat Sources WikiLeaks from Afghanistan Vulnerabilities Staff with an agenda Extensive records in compact format walk out with an encyclopedia on a keyring Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 23 / 46
Threat Sources WikiLeaks from Afghanistan Vulnerabilities Staff with an agenda Extensive records in compact format walk out with an encyclopedia on a keyring Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 23 / 46
Threat Sources WikiLeaks from Afghanistan Vulnerabilities Staff with an agenda Extensive records in compact format walk out with an encyclopedia on a keyring Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 23 / 46
Threat Sources The Stuxnet Worm Outline Threat Identification 1 Threat Sources 2 WikiLeaks from Afghanistan The Stuxnet Worm The Seven Cybercriminal Families Vulnerability Identification 3 Closure 4 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 24 / 46
Threat Sources The Stuxnet Worm The Stuxnet Worm Targets industrial control systems specific types of computers from Siemens Malware, able to override the controls Chemical plants Power plants Power grids Exploits four previously unknown vulnerabilities Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 25 / 46
Threat Sources The Stuxnet Worm What is a worm? Malware — Malicious Software Standalone programs do not modify other programs (as viruses do) Usually spreads over the network network congestion is a common impact Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 26 / 46
Threat Sources The Stuxnet Worm The attack on Iran 60% of infections in Iran The Nuclear Plant in Bushehr compromised Iran will not reveal the extent of damage seems to have delayed the opening of the plant Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 27 / 46
Threat Sources The Stuxnet Worm Who is the attack source? This would require a lot of resources on the level of a nation state. Gadi Evron, Israeli cybersecurity strategist The known enemies — preventing nuclear development USA and Israel China — as a testrun of new cyberwarfare technology Are there private organisations with the capability? We do not know what the source is Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 28 / 46
Threat Sources The Stuxnet Worm Who is the attack source? This would require a lot of resources on the level of a nation state. Gadi Evron, Israeli cybersecurity strategist The known enemies — preventing nuclear development USA and Israel China — as a testrun of new cyberwarfare technology Are there private organisations with the capability? We do not know what the source is Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 28 / 46
Threat Sources The Stuxnet Worm Who is the attack source? This would require a lot of resources on the level of a nation state. Gadi Evron, Israeli cybersecurity strategist The known enemies — preventing nuclear development USA and Israel China — as a testrun of new cyberwarfare technology Are there private organisations with the capability? We do not know what the source is Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 28 / 46
Threat Sources The Stuxnet Worm Who is the attack source? This would require a lot of resources on the level of a nation state. Gadi Evron, Israeli cybersecurity strategist The known enemies — preventing nuclear development USA and Israel China — as a testrun of new cyberwarfare technology Are there private organisations with the capability? We do not know what the source is Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 28 / 46
Threat Sources The Stuxnet Worm Who is the attack source? This would require a lot of resources on the level of a nation state. Gadi Evron, Israeli cybersecurity strategist The known enemies — preventing nuclear development USA and Israel China — as a testrun of new cyberwarfare technology Are there private organisations with the capability? We do not know what the source is Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 28 / 46
Threat Sources The Seven Cybercriminal Families Outline Threat Identification 1 Threat Sources 2 WikiLeaks from Afghanistan The Stuxnet Worm The Seven Cybercriminal Families Vulnerability Identification 3 Closure 4 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 29 / 46
Threat Sources The Seven Cybercriminal Families A viewpoint from Law Enforcement Dr. David Benichou at WIFS’09 in London French juge investigatoire Special advisor to the Minstry of Justice PhD in Computer Sciences Model based on field experience more than 1000 cases Qualitative rather than quantitative Real-life, rather than academic view Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 30 / 46
Threat Sources The Seven Cybercriminal Families The seven families of cybercrime Seven classes of threat sources (graphics c � David Bénichou) Empirical distribution of attack profiles 100 50 0 kiddies hackers avengers LP cyberterro bandits spies population dangerousness Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 31 / 46
Threat Sources The Seven Cybercriminal Families The seven families of cybercrime Adolescent amateurs script kiddies hackers Amateurs with a goal avengers legal persons Resourceful professionals Organised crime Terrorists Spies Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 32 / 46
Threat Sources The Seven Cybercriminal Families The big majority Script Kiddies Clueless amateurs Use scripts created by others Trying hacks for fun No understanding of the techniques used Hackers Technically adept Obscure motivations challenge, learning, experience Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 33 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Masked Avengers Grown up individuals with a score to settle Obvious motivation relatively easy to unmask e.g. a disgruntled employee with a desire to punish the company e.g. Mr/Mrs average dragging an ex-lover down in the mud Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 34 / 46
Threat Sources The Seven Cybercriminal Families Legal Persons Financial motives unfair competition trade secrets Highly skilled Easy to identify — the motive is a give-away Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 35 / 46
Threat Sources The Seven Cybercriminal Families The big and resourceful Spies, organised crime, and terrorists Different motivations political (spies) financial (organised crime) ideological (terrorists) All are resourceful, with solid backing few have resources on this scale the resources make serious impact possible Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 36 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families The rare and serious agents Terrorists Spies Organised Crime Backed with considerable resources money, manpower, information, backup Different objectives Ideology — Terrorists Politics — Spies Money — Organised Crime Similar dedication professionalism and clear objectives Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 37 / 46
Threat Sources The Seven Cybercriminal Families Risk Analysis How does each family affect your risk analysis? Script Kiddies Hackers Avengers Legal Persons Terrorists Spies Organised Crime Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 38 / 46
Vulnerability Identification Outline Threat Identification 1 Threat Sources 2 Vulnerability Identification 3 Closure 4 Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 39 / 46
Vulnerability Identification Vulnerability Identification ISO 27005:2008 Input lists of known threats assets existing controls Output a list of vulnerabilities in relation to assets, threats, and controls a list of vulnerabilities not related to any identified threat Action Identify vulnerabilities that could be exploited by the threats Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 40 / 46
Vulnerability Identification Areas of vulnerabilities ISO 27005:2008 Organisation Processes and procedures Management routines Personnel Physical environment Information system configuration Hardware, software or communications equipment Dependence on external parties Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 41 / 46
Vulnerability Identification Vulnerabilities and Known Threats For each threat identified Which assets are under threat? What vulnerabilities can it exploit How? What could be the attack What controls do we have? Resort the list, listing each vulnerability with all its associated threats Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 42 / 46
Vulnerability Identification Vulnerabilities and Known Threats For each threat identified Which assets are under threat? What vulnerabilities can it exploit How? What could be the attack What controls do we have? Resort the list, listing each vulnerability with all its associated threats Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 42 / 46
Vulnerability Identification Vulnerabilities and Known Threats For each threat identified Which assets are under threat? What vulnerabilities can it exploit How? What could be the attack What controls do we have? Resort the list, listing each vulnerability with all its associated threats Dr Hans Georg Schaathun Threats, Threat Agents, and Vulnerabilities Autumn 2010 – Week 5 42 / 46
Recommend
More recommend