Discuss at least four risk management strategy

Assignment Help Computer Engineering
Reference no: EM132245041

Question: Discuss at least four risk management strategy that you can apply to address threats.

Agenda

• Different ways to address threats

• Common mistakes

• Prioritization

• Reading: Chapter 9

How to Threat Model (Summary)

• What are you building?

• What can go wrong?

• What are you going to do about it?

• Check your work on 1-3

What Are You Going to Do About It?

• For each threat:

- Fix it (avoid the problem)

- Mitigate with standard or custom approaches

- Standard approaches were the previous session

- Accept it

- Transfer the risk

• For each assumption:

- Check it

- Wrong assumptions lead to reconsider what goes wrong

Fix It!

• The best way to fix a security bug is to remove the functionality

- For example, if SSL doesn't have a "heartbeat" message, the "heartbleed bug" couldn't exist

- You can only take this so far

- Oftentimes end up making risk tradeoffs

• If you don't remove it, you can only mitigate, not fix

• Mitigate the risk in various ways (next slide)

Mitigate Threat

• Add/use technology to prevent attacks

• As covered in previous session in depth

- You learned those first because they're "go-to"

- Only try other approaches when they're not effective/feasible

• For example, prevent tampering:

- Network: Digital signatures, cryptographic integrity tools, crypto tunnels such as SSH or IPsec

• Developers, sysadmins have different toolkits for mitigating problems

• Standard approaches available which have been tested & worked through

• Sometimes you need a custom approach

Custom Mitigations

• Sometimes the standard technologies don't work for your situation

• Requires custom mitigations (or risk acceptance)

• Easy to get a custom mitigation wrong

• Hard and expensive to test (page 176)

Accepting Risk/Threats

• Works best when it's your risk

- Your organization can accept risk

• Ultimately, a management decision

- Be careful about "accepting" risk for your customers.

• Customer risk acceptance

- Via user interface

- Sometimes the customer has details you can't have (is this network your work or a coffee shop?)

Transferring Risk/Threats

• Via license agreements, terms of service, etc

• Silently

• Both can lead to unhappy customers

- Threat that no one reads ToS

- Surprise!

- Media blowups

Common Mistakes

• Custom mitigations because they're fun

• Fuzzing as a mitigation

• Not covering all threats

Issue Prioritization Strategies

• Wait and see

• Easy fixes first

• Threat ranking with a bug bar

• Cost/damage estimation approaches

• DREAD

- Abandoned by its creators for being too subjective

- Loss of an awesome acronym

Wait and See

• Can be risky

- The "cheeseburger approach"

• Requires some way of seeing

- Change detection

- Signature-based detection

- Anomaly-based detection

- Impact detection

Easy Fixes First

• May be helpful when getting started

• Benefit: demonstrate value

• Risk: fixing the wrong things

Bug Bars

• Concrete impact levels drive severity (sev.)

• All anonymous, remote EoP are sev 1

• Information disclosure to authenticated users

- Normally sev 2

- Severity 1 if security info (passwords, crypto secrets) or violates explicit permissions

- Severity 3 if random information only

• Microsoft offers usable sample bars

Cost/Damage Estimation

• Probability/Impact

- Hard to do well

- Predicting odds and difficulty is challenging (visa holograms beaten by tin-foil, gummy bear fingerprints)

- People living on a dollar a day

• FAIR (Factor analysis of information risk)

- Useful

- Can be more time consuming than a bug bar

Arms Races

• Avoid when you can

• Economic game

- Maximize your profit

- Drive cost to the competition

• Tools

- Bag of tricks

- Last mover advantage

Recap

• For each threat:

- Fix/Standard mitigate/custom approaches

• Prioritization

- Wait & see/Easy fixes/bug bar

- Probability/Impact

• Arms races

Reference no: EM132245041

Questions Cloud

Find the outstanding loan balance after 30 months : The effective annual interest rate is 5%. Find the outstanding loan balance after 30 months.
Why the net working capital increases : When inventory increases, cash should drop (suppose use cash to pay), and current assets remain the same.
Your organization competitors current trends of innovation : What are your organization's competitors' current trends of innovation? How does your organization's innovativeness compare to its competitors'?
How much money should milhouse have in the retirement : How much money should Milhouse have in the retirement fund to achieve the goal when he? retires?
Discuss at least four risk management strategy : ISOL 536 Security Architecture and Design Threat Modeling. Discuss at least four risk management strategy that you can apply to address threats.
About media and society using proper writing mechanics : Evaluate the effects of digital information expansion / explosion on society Write clearly and concisely about media and society using proper writing mechanics
How much must you deposit annually to accumulate amount : You would like to have ?$50,000 in 15 years. To accumulate this? amount, you plan to deposit an equal sum in the bank each year that will earn 7 percent
Data set from your class project about waiting line theories : The following are the sample data sets from your class project about waiting line theories:
Monthly percentage rate in calculations : How long will it take to pay off a loan of ?$46,000 at an annual rate of 9 percent compounded monthly if you make monthly payments of ?$600??

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd