160 likes | 373 Views
Vulnerability Analysis. Stefanie Wilcox. Vulnerabilities. Hardware Software Data. Hardware Vulnerabilities. Devices-adding, removing Traffic-interrupting, flooding Physical Attacks Involuntary machine slaughter Machinicide Theft
E N D
Vulnerability Analysis Stefanie Wilcox
Vulnerabilities • Hardware • Software • Data
Hardware Vulnerabilities • Devices-adding, removing • Traffic-interrupting, flooding • Physical Attacks • Involuntary machine slaughter • Machinicide • Theft • “. . .thousands of dollars worth of equipment sits unattended on desks. Curiously, the supply cabinet, containing only a few hundred dollars worth of pens, pencils and paper clips is often locked.. . .”
Software Vulnerabilities • Software Deletion • Software Modification • Logic Bombs • Trojan Horse • Virus • Trapdoor • Information Leaks • Software Theft • Unauthorized copying
Data Vulnerabilities • Confidentiality • unauthorized disclosure of a data item • Integrity • unauthorized modification • Availability • denial of authorized access
Penetration Studies • Also called tiger team attack or red team attack • Tests the system once it is in place. • Goal is toviolate the site security policy. • Type 1 • Authorized attempt to violate specific constraints stated in the for of a security or integrity policy. • Penetration Test Example. • Type 2 • No specific target. Find some number of vulnerabilities in a set period of time. • Penetration Test Example.
Penetration Studies cont’ • Layering of tests • 1) External attacker with no knowledge of the system • 2) External attacker with access to the system. • 3) Internal attacker with access to the system.
Flaw Hypothesis Methodology • 1) Information Gathering • 2)Flaw Hypothesis • 3)Flaw Testing • 4)Flaw Generalization • 5)Flaw Elimination
Vulnerability Classification • 1)The ability to specify, design, and implement a computer system without vulnerabilities. • 2)The ability to analyze a computer system to detect vulnerabilities. • 3)The ability to address any vulnerabilities introduced during the operation of the computer system. • 4)The ability to detect attempted exploitation's of vulnerabilities
Frameworks • The RISOS Study • Protection Analysis Model • NRL Taxonomy • Aslam’s Model
Bibliography • Bishop, Matt. Computer Security