Transcript Chapter 3

Chapter 3
Threats, Vulnerabilities, and Risk
Exposure
Introduction
 In Security planning an organization must first
know what it needs to protect against
 Companies must be aware of type and severity of
threats and vulnerabilities
 Vulnerability: Exposure to a risk or threat – see
def on pg. 209
– Could be a weakness in HW, SW, or people
– Could be IP protocol exposing a computer or user to an
exploit or malware threat
– What is an exploit?
– Look at Cyberbrief on pg. 34 (top)
Classification of Computer
Threats and Vulnerabilities




The taxonomy of threats and viruses is abbreviated (TTV)
Intrusion: any type of intrusion, attack, or exploit
Vulnerabilities exist b/c of human error
Vulnerabilities exist b/c of complexity of sw that can result
in misconfiguration, programming errors, flaws
 Most intrusions will fit into multiple categories
– Hacker (external intruder) can send infected pgm
(malware) in an e-mail to an employee (internal
intermediary) who opens it b/c of enticing subject line
(social engineering) which installs a backdoor
(malware) to gain access to records (deliberate attack)
for financial gain (economic motive)
Uses of TTV
 The TTV is a guide to help understand an
organizations risk exposure resulting from
weaknesses in cyber defenses
 Can assist in estimating expected damages
 Intrusion Detection Systems introduced – when
properly deployed can provide warnings
indicating that system is under attack
– Can look at all traffic in and out of network with IDS to
stop internal and external intrusions
 An intrusion not detected and which persist for a
long period of time can have higher expected cost
that those detected early
TTV (2)
 Direct attacks or targeted attacks will also have
higher expected costs
 B/C there is such a diverse range of threats the
design of defenses should include education,
training, strict acceptable use policies, extensive
auditing, and access controls
 Look at the TTV chart on pg. 35
 How would you use it to assess a virus attack on
campus?
 Look too at the end of the TTV on pg. 36?
 What can you think to do with this TTV if you
work in an organization?
Origin of the Intrusion or Threat
 External Threats and Vulnerabilities
– You should read this section closely all terms may be
on test
– We’ve already discussed much of this section
– Hackers, buffer overflow
– Sophisticated Hackers, root access, sniffers, log file
cleaners
– Script Kiddies
– Malware – Viruses, Worms, Trojan Horses, Backdoors,
Web Hoaxes, and other ruses
 Internal threats and vulnerabilities
– People, Current and former managers and ex employees
– Look at numbers in this section on pg. 41
Problems in Dealing w/ Internal
Threats
 Problems in dealing w/ internal threats (read parts
of this paragraph)
 Internal Threats stemming from employees or
other insiders
 Read through this list
– Class, provide an example (or two) of each of these
from what you know of or have heard in real life
– The list continues onto pg. 43
 Briefly look at Insider threats on pg. 43
Wireless Threats and
Vulnerabilities
 Pg. 44 read last two paragraphs (especially)
External Threats with Internal
Intervention
 Social Engineering
– A network intrusion technique based on
trickery
 Look at 2nd paragraph
Internet Protocol Vulnerabilities
and Threats
 IP address forgery
– The IP provides for two functions
– A datagram that can be routed through the
Internet, and provides a means for fragmenting
those datagrams into packets for transport
across the Internet and then reassemble them
into the original datagrams at the destination
computer
 Look at last paragraph of pg. 45
How can IP Address Forgery Be
Used
 A method of deception
 To Conceal - identity
 To Camouflage – make a site appear to be
another to convince victim attack is from a
legitimate site
 To Deceive – trick victim into believing that
an intrusion is somewhere else
– Misdirect victimized organization into wasting
limited resources
Success of Hackers and Malware
 Read Complexity of Software and
Configurations
 Review bulleted list on Why Hack Attacks
Succeed so often pg. 47
Threats, Vulnerabilities, and
First-Party and Third-Party Risks
 First-party risks are those that concern the
company itself
 Third-party risks are threats to the company’s
customers, suppliers, business partners or
competitors that may seek legal redress by lawsuit
 You can review the lists of First-Party Risks and
the list Third-Party Risks we have discussed most
of this already this semester
 End of Chapter
 Look at Review Questions
– All of them are excellent!!