Title: Threat and Risk Assessments in a Network Environment
1Threat and Risk Assessmentsin a Network
Environment
- Ted Reinhardt
- Course 94.470
- reinhardt_at_ncf.ca
2 Threat and Risk Assessment Overview an
Evaluation of the Three Little Pigs Performance
3Asset Value
Dwelling
Confidentiality, Integrity, Availability and Value
4Threat
Threat agent
Threat Class
Wolf
f
Destruction
25 km/h
Blows House Down
Threat Event
5Threat Classes
Destruction - Blows House Down Removal - Steals
house by moving it off foundation Disclosure -
Listens in to conversations in the
house Interruption - Keeps knocking on the door
preventing owner from doing work Modification -
Redecorates house (like Trading Spaces)
DR DIM
6Little Pig 1 - Straw HouseThreat and Risk
Assessment
7Pig 1 Straw HousePerformance Evaluation
- One night the big bad wolf, who dearly loved to
eat fat little piggies, came along and saw the
first little pig in his house of straw. He said
"Let me in, Let me in, little pig or I'll huff
and I'll puff and I'll blow your house in! "Not
by the hair of my chinny chin chin", said the
little pig. - But of course the wolf did blow the house in and
ate the first little pig.
Threat Assessment was wrong. Likelyhood was
incorrectly assessed.
8Little Pig 3 - Post Straw House AttackThreat
Assessment
9Safeguard
Administrative, Procedural or Technical
mechanisms used to mitigate a threat. Safeguards
Cost to Implement House made of Sticks (wind
loading 10 mph) 2.00/bundle House made of
Bricks (wind loading 70 mph) 1000/pallet
10Management Risk Decision
- accept the risk
- mitigate the risk
Risk
Cost
Balance is important
11Re-evaluateSafeguards Periodically
12Identity Threats Events
- Destruction
- Removal
- Disclosure
- Interruption
- Modification
NETSEC Threat Classes
13Typical Threat Events
- Eavesdropping
- Traffic Flow Analysis
- Masquerading
- Denial of service attacks
- Repudiation
- Replay
14Select Safeguards
- Authentication
- Access Control
- Confidentiality
- Integrity
- Non-repudiation
- Availability -- redundancy,recovery,disaster
15Layer Safeguards
Filtering Routers 2 feeds
Web Server TLS/SSL
Hardened Server
Firewall
Firewall
IPSEC VPN Gateway
Server Network Filter Detection