Threat Analysis and Risk Assessment Flashcards
Risk
The possibility of something bad/unpleasant/dangerous happening
Risk = Likelihood × Impact
Generic Risk Assessment Process
1 Risk Identification
2 Risk Analysis (Likelihood and Impact)
3 Risk Evaluation (Risk level)
4 Risk Treatment
TARA Process Overview
Asset identification
Impact rating
Threat enumeration
Attack path analysis
Attack feasibility rating
Risk determination
Risk treatment decision
Impact Rating
Safety | Finance | Operational | Privacy
Threat Enumeration
Brainstorm-based methods
misuse-case
STRIDE
a combination of the above
Threat scenario can include:
the targeted asset
the compromised cybersecurity property
the action to accomplish a damage scenario
One damage scenario can correspond to multiple threat scenarios
Attack path analysis
The threat scenarios shall be analyzed to describe possible attack paths
There are different Methods for determining attack paths
* Top-down approaches (e.g. Attack Trees)
* Bottom-up approaches
* A combination of these approaches
Attack feasibility rating
Ratings for attack feasibility:
High: easy or almost certain to accomplish the attack path.
Medium: feasible and not unusual to accomplish the attack path.
Low: feasible to accomplish the attack path.
Very low: difficult or almost never possible to accomplish the attack path
Attack potential-based approach
elapsed time: from identifying a weakness to developing and a successful exploitation.
expertise: attacker’s capabilities including skill and experience.
equipment: attacker’s tools necessary to perform the attack.
knowledge of the item or component: attacker’s knowledge the target.
window of opportunity: the likelihood to perform an attack combing access nature
Risk Treatment
Avoiding the risk
Reducing the risk
Sharing or transferring the risk
Accepting or retaining the risk