Chapter 3 Lecture Topics
Chapter 3 Lecture Topics
Risks, Threats,
and
Vulnerabilities
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com.
Learning Objective(s) and Key Concepts
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Describe the principles of risk The principles of organizational risk
management, risk assessments, management
and issues related to threats and
Risks, threats, and vulnerabilities
vulnerabilities in an IT
infrastructure. IT and network infrastructures
Malicious attacks
Attack perpetrators and attack
vectors
The importance of
countermeasures
Risk Management and Information Security (1 of 2)
Seek a balance between the utility and cost of various risk management options
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Identify risks and apply risk management solutions to ensure that critical
business functions can continue to operate
Key risk management principles:
Do not spend more to protect an asset than it is worth.
Every countermeasure requires resources to implement and therefore should be
aligned with a specific risk.
Risk Management and Information Security (2 of 2)
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Create or maintain a business continuity plan (BCP)
Develop or maintain a disaster recovery plan (DRP)
Risk Terminology (1 of 2)
Risk
Likelihood that something bad will happen to an asset
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Threat
Something bad that might happen to an organization
Vulnerability
Any exposure that could allow a threat to be realized
Impact
The amount of risk or harm caused by a threat or vulnerability that is exploited by a
perpetrator
Risk Terminology (2 of 2)
Event
A measurable occurrence that has an impact on the business
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Incident
Any event that violates or threatens to violate your security policy
Control
Includes both safeguards and countermeasures
Safeguard
Addresses gaps or weaknesses in controls that could lead to a realized threat
Countermeasure
Counters or addresses a specific threat
Elements of Risk
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Vulnerabilities
Threats
Identify risks:
Before they lead to an incident
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
In time to enable a plan and begin risk-handling activities (controls and
countermeasures)
On a continuous basis across the life of the product, system, or project
Brainstorming
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Surveys
Interviews
Working groups
Checklists
Historical information
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Sample Risk Register
Risk Register Components
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
The expected impact if the
associated event occurs
The probability of the event’s
occurring
Steps to mitigate the risk
Steps to take should the event
occur
Rank of the risk
Assess and Prioritize Risks
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Attempts to describe risk in financial terms and put a dollar value on each risk
Qualitative risk assessment
The risk impact is examined by assigning a rating for each identified risk
Ranks risks based on their probability of occurrence and impact on business
operations
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Quantitative Versus Qualitative Risk Assessments
Quantitative Risk Assessment
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Calculate exposure factor (EF)
Calculate single loss expectancy (SLE)
Determine how often a loss is likely to occur every year
Determine annualized loss expectancy (ALE)
Determining Quantified Risk (1 of 2)
Calculation Formula
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Single loss expectancy (SLE) AV × EF = SLE
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Each computer with software and data = $1,500
Organization loses an average of six computers per year
SLE is $1,500
ARO is 6
ALE is $9,000 ($1,500 × 6)
Suggested countermeasure is to purchase hardware locks at a cost of $10 each to
reduce yearly losses from six to one
Cost of countermeasure is $1,000 ($10 × 100 computers)
New ARO is 1
New ALE is $1,500 ($1,500 × 1)
Qualitative Risk Analysis
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Probability or likelihood: Some
things, such as the malfunction of a
badge reader on the employee
entrance, will seldom happen, whereas
other things, such as employees
calling in sick, will almost certainly
happen.
Impact: Some things, such as a
workstation that fails to boot up, will
have a minor impact on productivity,
whereas other things, such as a
production system breaking down, will
have a major impact.
Plan a Risk Response Strategy
Negative risks
Reduce (reduction/mitigation)
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Transfer (transference/assignment)
Accept (acceptance)
Avoid (avoidance)
Positive risks
Exploit (exploitation)
Share (sharing)
Enhance (enhancement)
Accept (acceptance)
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Acceptable Range of Risk
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Total Risk and Residual Risk
Implement the Risk Response Plan
Administrative controls
Manage the activity phase of security—the things people do
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Activity phase controls
Either administrative or technical
Correspond to the life cycle of a security program
Detective controls
Preventive controls
Corrective controls
Deterrent controls
Compensating controls
Protecting Physical Security (1 of 3)
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Fire suppression
Electromagnetic interference (EMI) shielding
Lighting
Signs
Fencing
Barricades
Protecting Physical Security (2 of 3)
Guards
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Motion detectors
Video surveillance
Locks
Mantraps
Access lists
Proximity readers
Protecting Physical Security (3 of 3)
Biometrics
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Protected access (cabling)
Alarms
Escape plan
Escape routes
Drills
Control testing
Selecting Safeguards and Countermeasures
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Develop and enforce operational procedures and access controls
(data and system)
Provide encryption capability
Improve physical security
Disconnect unreliable networks
Pricing/Costing a Countermeasure
Product costs
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Implementation costs
Compatibility costs
Environmental costs
Testing costs
Productivity impact
Monitor and Control Risk Response
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Does this countermeasure solve this problem?
Countermeasures might pose new risk to the organization
Perform certification and accreditation of countermeasure programs
Follow best practices and exercise due diligence
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
IT and Network Infrastructure
Intellectual Property
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Drug formulas
Engineering plans
Sales and marketing plans
Scientific formulas
Recipes
Protecting intellectual property is a top-of-mind consideration for any
organization
Finances and Financial Data
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Loss of financial assets due to malicious attacks is a worst-case scenario for all
organizations
Represents significant physical loss
Can have long-term effects on a company’s reputation and brand image
Service Availability and Productivity
Critical services
Must be available for use when organizations need them
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Downtime
The time during which a service is not available due to failure or maintenance
Unintentional downtime
The result of technical failure, human error, or attack
Opportunity cost
The amount of money a company loses due to either intentional or unintentional
downtime
Reputation
Companies that suffer from security breaches and malicious attacks that
expose assets are likely to face serious negative consequences in the public
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
eye
Even if the company’s response were swift and solved the problem effectively
Black-hat hackers
Try to break IT security and gain access to systems with no authorization to prove
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
technical prowess or potentially steal sensitive data
White-hat (or ethical) hackers
Information systems security professionals who have authorization to identify
vulnerabilities and perform penetration testing
Gray-hat hackers
Hackers with average abilities who may one day become black-hat hackers but
could also choose to become white-hat hackers
Crackers
Have a hostile intent, possess sophisticated skills, may be interested in financial
gain, and represent the greatest threat to networks and information resources
Risks, Threats, and Vulnerabilities in an IT Infrastructure
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
and being held liable for a software vulnerability
Hackers continuously look for known software vulnerabilities as a means to find
an exploitable weakness
Vulnerability window
The gap in time between the announcement of a vulnerability and the application of
a patch
Zero day (in zero-day vulnerability)
A vulnerability window of zero days because there is no patch yet for a known
software vulnerability
The Most Common IT Infrastructure Threats
Malicious software
Hardware or software failure
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Internal attacker
Equipment theft
External attacker
Natural disaster
Industrial espionage
Terrorism
Threat Targets and Types
Threat Targets
Identify where in the seven domains of an IT infrastructure threats are likely to
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
occur
Threat Types
Disclosure threats
Alteration threats
Denial or destruction threats
What Is a Malicious Attack?
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Interceptions
Interruptions
Modifications
Types of Active Threats
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Brute-force password attacks Masquerading
Credential harvesting and stuffing Eavesdropping
Dictionary password attacks Social engineering
Internet Protocol (IP) address Phreaking
spoofing
Phishing
Hijacking
Pharming
Replay attacks
What Are Common Attack Vectors?
Attacks on availability
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Attacks on people
Attacks on IT assets
Social Engineering Attacks
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Consensus/social proof Smishing
Dumpster diving Tailgating
Familiarity/liking Trust
Hoaxes Trusted users
Impersonation Urgency
Intimidation Vishing
Scarcity Whaling
Wireless Network Attacks
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Bluesnarfing Replay attack
Evil twin Rogue access point
Initialization vector (IV) attack War chalking
Jamming/ interference War driving
Near field communication attack
Web Application Attacks
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Buffer overflow Lightweight Directory Access
Protocol (LDAP) injection
Client-side attack
Local shared objects (LSO)
Cookies and attachments
Malicious add-on
Cross-site scripting (XSS)
SQL injection
Cross-site request forgery (CSRF)
Watering hole attack
Directory traversal/command
injection XML injection
Header manipulation Zero day
The Importance of Countermeasures
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Best strategy is to identify vulnerabilities and reduce them to avoid attacks
Attack response should be as aggressive, proactive, and reactive as the attack
itself
Develop plans to rapidly restore computer and network resources, closing holes
in the organization’s defenses, and obtaining evidence for prosecution of
offenders
Responding to attacks involves planning, policy, and detective work
Summary
Copyright © 2023 by Jones & Bartlett Learning, LLC an Ascend Learning Company. www.jblearning.com
Risks, threats, and vulnerabilities
IT and network infrastructures
Malicious attacks
Attack perpetrators and attack vectors
The importance of countermeasures