2.2 Risk Management and Threat Modeling Flashcards
vulnerability
the aspect of a business that can be exploited to compromise a system’s CIA (confidentiality, integrity, or availability).
threat
an actor that might exploit a vulnerability.
-can be intentional (a malicious hacker steals data), unintentional (an incompetent sysadmin destroys the network), or due to a natural disaster.
risk
the possibility of losing something valuable.
Risk analysis:
Understanding what risks an organization faces, which are most severe, and which are most likely.
Risk management:
Using the results of such an analysis to determine how to deploy personnel and spend budget.
Threat modeling:
Determining which attacks an organization is most likely to experience, who is most likely to launch them, and what can be done to stop them.
Threat Modeling Methodologies
PASTA (Process for Attack Simulation and Threat Analysis)
Aims to align consideration of business objectives with technical requirements.
Threat Modeling Methodologies
STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, DoS (Denial of Service), Elevation of Privilege)
Focuses on identifying what can fail in the system being modeled.
Threat Modeling Methodologies
OWASP (Open Web Application Security Project)
Focuses on identifying possible threats, prioritizing risks, and planning mitigation strategies. It is mainly applied to the analysis of applications, such as web or desktop apps.
OWASP process consists of six steps:
- Determine Assessment Scope
- Identify Threat Agents
- Identify Possible Attacks
- Identify Exploitable Vulnerabilities
- Rank/Prioritize Risks
- Mitigate Risks
Determine Assessment Scope
Listing the assets under consideration, determining their value, and defining objectives for your threat modeling assessment.
Identify Possible Attacks:
Identify the attacks that each threat agent is likely to perform, based on how much skill and funding they have.
Identify Exploitable Vulnerabilities:
Identify ways for data to enter and exit the system.
Asset inventory
the process of identifying and assigning an asset value (financial worth of an asset) to all of an organization’s assets.
exposure factor
measuring “how much” of an asset will be affected in the event of a breach.