Threat scenario based security risk analysis using use case modeling in information systems
|
|
|
- Kory Garrett
- 9 years ago
- Views:
Transcription
1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2012; 5: Published online 7 April 2011 in Wiley Online Library (wileyonlinelibrary.com)..321 SPECIAL ISSUE PAPER Threat scenario based security risk analysis using use case modeling in information systems Young Gab Kim* and Sungdeok Cha Center for Engineering and Education of Dependable Software, College of Information and Communication, Korea University, Seoul, Korea ABSTRACT Successful Security Risk Analysis (SRA) enables us to develop a secure information management system and provides valuable analysis data for future risk estimation. One of the qualitative techniques for SRA is the scenario method. This provides a framework for our explorations that raises our awareness and appreciation of uncertainty. However, the existing scenario methods are too abstract to be applicable to some situations and have not been formalized in information systems (ISs) because they do not explicitly define artifacts or have any standard notation. Therefore, this paper proposes the improved scenario based SRA approach, which can create SRA reports using threat scenario templates and manage security risk directly in ISs. Furthermore, in order to show how to apply the proposed method in a specific environment, especially in a Broadband convergence Network (BcN) environment, a case study is presented. Copyright 2011 John Wiley & Sons, Ltd. KEYWORDS security risk analysis; qualitative risk analysis; scenario method; use case modeling; Broadband convergence Network (BcN) *Correspondence Young Gab Kim, College of Information and Communication, Korea University, 1, 5 ga, Anam dong, SungBuk gu, Seoul , Korea. E mail: [email protected] 1. INTRODUCTION With the rapid explosion of Internet technology over the past few years, the incidence of security attacks has grown very rapidly. However, it is difficult to detect and prevent all security threats and security vulnerabilities in information systems (ISs). Therefore, there is an urgent need to analyze the risks posed by security threats and prevent them effectively. Security Risk Analysis (SRA) is a proactive approach that can identify and assess accident risks before they cause major losses. It enables us to develop secure information management and establish practical security policies for organizations. Furthermore, it provides valuable analysis data for future risk estimation [1]. In order to manage security risk, SRA involves identifying the most probable threats to ISs and analyzing the related vulnerabilities of ISs to these threats. Security risk analysis techniques may be either qualitative or quantitative, and both types, ideally in combination, can be very effective in the process of SRA. The qualitative SRA prioritizes the risks and identifies areas for immediate improvement in addressing the vulnerabilities. However, it does not provide specific quantifiable measurements of the magnitude of the security risks, therefore making cost benefit analysis of any recommended controls difficult. On the contrary, the quantitative SRA provides a measurement of the risk s magnitude, which can be used in the cost benefit analysis of recommended controls. However, it has a disadvantage that, depending on the numerical ranges used to express the measurement, the meaning of the quantitative risk analysis may be unclear, requiring the result to be interpreted in a qualitative manner. The scenario method is a qualitative SRA that provides a framework for analyzing possible future events (cyber attacks) by considering alternative possible scenarios. Furthermore, it provides future strategies and appropriate countermeasures for security risks through the SRA. However, the normal scenario method is too abstract and informal because it is in the form of a narrative. That is, there is no standard notation or format for a scenario based SRA [2]. Therefore, in order to address these problems, an enhanced scenario based approach using the Unified Modeling Language (UML) use cases [3,4] is proposed. It aims to provide systematic analysis of potential security issues at the start of risk analysis. The rest of this paper is organized as follows: Section 2 presents background and related works about SRA and use case modeling. Section 3 presents an SRA based on a Copyright 2011 John Wiley & Sons, Ltd. 293
2 Threat scenario based security risk analysis Y. G. Kim and S. Cha threat scenario using the use case model, which can effectively analyze security risks and provide countermeasures in ISs. In Section 4, in order to show how to apply the enhanced scenario method proposed in this paper, a case study is presented. Section 5 compares the existing qualitative approaches and the proposed method. Finally, Section 6 concludes the paper. 2. BACKGROUND AND RELATED WORKS 2.1. Security risk analysis As mentioned previously, SRA is a technique used to identify and assess risk factors that may jeopardize ISs [5]. The SRA mainly involves three phases, as depicted in Figure 1. Phase 1 (security requirements) is a step that defines the scope of the effort, the boundaries of the ISs, the resources and information, and the methodology for the organization. Phase 2 (risk analysis) is a step that identifies assets, threats, and vulnerabilities and measures the security risk. The important task in this phase is classifying and categorizing the assets, the threats, and the vulnerabilities. Furthermore, it includes the types of threats and vulnerabilities that exist for a specific asset and the probabilities that threats may occur. Finally, the security risk of the organization or the system is evaluated by summing up all the risks of the system components considering the existing threats in the core assets of the organization and the degree of vulnerability per threat. Once the risk analysis has been conducted, the management can use various risk mitigation techniques to complete the process in phase 3 (risk mitigation and evaluation). That is, phase 3 is a process that shows the list of current security countermeasures in the organization, selects suitable mitigation methods against the threats, and then shows their effectiveness. In this paper, the following factors are considered in order to clarify the threat scenario, because each factor is a key aspect of information security: data integrity, availability, confidentiality, authenticity, and non repudiation. Data integrity refers to the requirement that information should be protected from improper modification. Integrity is lost if unauthorized changes are made to the data or IT system as a result of intentional or accidental acts. Also, a violation of integrity may be the first step in a successful attack against system availability or confidentiality. Availability is a property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to the performance specifications for the system. Ensuring availability involves preventing denial of service (DoS) attacks. Confidentiality refers to the protection of information from unauthorized disclosure. In order to support data confidentiality, cryptography techniques such as encryption, network traffic padding, and access control are required. Authenticity means that the data, transactions, communications, or documents are genuine. For authenticity, it is important to validate that both parties involved are who they claim they are. Nonrepudiation implies that one party of a transaction cannot deny having received a transaction, nor can the other party deny having sent a transaction Use case modeling The use case model is a means to understand and describe the functional requirements of a system. It defines a goaloriented set of interactions between external actors and the systems under consideration. Furthermore, it consists of a use case diagram and a description of each use case using a template. A use case diagram in UML is represented by an actor, a use case, and an association line. The actors usually represent entities outside a system that interact with it in some manner, and the use case usually describes the possible courses of events that may occur in various scenarios. Finally, the actors and the use case in which they participate are connected by the association line. The use case description typically includes a normal scenario. Each Figure 1. Security risk analysis model. 294 Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd.
3 Y. G. Kim and S. Cha Threat scenario based security risk analysis scenario is in the form of a sequence of events between the actors and the system. However, non functional security requirements are often neglected in the requirement analysis process. Recent work has applied use case modeling to requirements other than the purely functional. Abuse and misuse cases are proposed as means to capture and analyze security requirements [6 8]. Sindre and Opdahl [8] noted that both security and safety requirements can be elicited from use case diagrams and scenarios. Douglass [9] showed that use case modeling can be used to document some non functional requirements, for example, by annotation of each action in the use case scenarios with timing constraints. Allenby and Kelly [10] used Hazard and Operability (HAZOP) analysis [11,12] on use case scenarios to elicit and analyze safety requirements. Georg et al. [13,14] proposed a methodology based on aspect oriented modeling for designing secure applications based on UML diagrams such as sequence diagrams and class diagrams. However, these researches only focus on identifying and evaluating the security requirements and design problems involved in building secure ISs. 3. SECURITY RISK ANALYSIS BASED ON THREAT SCENARIOS The scenario is the best available language for strategic conversation because it allows differing viewpoints while bringing people together to work toward a shared understanding of the situation. This enables decision making when the time comes to take action [15]. Therefore, we apply the scenario method to the SRA because we can obtain future strategies and appropriate countermeasures for security risks through the SRA. The steps of the proposed method in this paper are summarized as follows: (1) Identify actors representing malicious user classes such as (internal or external) attackers and malicious software or systems. (2) Identify use cases representing the many ways malicious user classes could cause harm in the service or the system. The goal of this step is to identify security threats and vulnerabilities for each of the functions, processes, data, transactions and assets involved in the use case. These can come from different potential security risks such as unauthorized access, DoS attacks, privacy violations, confidentiality and integrity violations, and malicious hacking attacks. (3) Show the associations between the actors and the use cases. (4) Identify and document scenarios for each use case. The goal of this step is to describe all possible threat scenarios for each use case and provide countermeasures for identified threats and vulnerabilities. The core components of the scenario based SRA proposed in this paper are the use case model and the threat scenario description. More detailed explanation will be presented in the following subsections Use case model for security risk analysis As described earlier, the use case model for SRA involves three phases (phases 1 3). First of all, the actor(s) is identified. In the use case model for SRA, the actors may be hackers, malicious programmers, academics and security researchers, and inexperienced programmers and designers. Furthermore, the use cases can represent security hazards and attacks such as traffic analysis, masquerade, modification of message contents, and DoS attacks. In order to derive the use cases, threat trees [16] identifying threats and attacks unique to the application domain can be used. The use cases can also be translated to sequence diagrams [18,19]. The translation from a use case to a sequence diagram is the key to a successful implementation of user security requirements. Figure 2 depicts an example of a use case diagram for SRA. There are two actors (service user attacker and service provider attacker) and five use cases (play user service, break legitimacy, play provider service, break integrity, and break privacy). Each use case can be mapped onto a scenario. The first use case model describes an attack wherein a service user attacker plays a user s service with unauthorized access and breaks legitimacy with malicious security attacks. Like the first use case model, the second one describes attacks wherein a service provider attacker plays a provider s service, breaks integrity of service contents, and breaks privacy of service provider. Figure 2. Example of use case diagram. Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd. 295
4 Threat scenario based security risk analysis Y. G. Kim and S. Cha 3.2. Threat scenario description Scenario analysis is the process of analyzing possible future events by considering alternative possible outcomes (scenarios). The analysis is designed to allow improved decision making by considering the outcomes and their implications more fully. As mentioned previously, the existing scenario analysis methods for SRA are ambiguous, abstract, and informal. Therefore, in order to describe more formally the scenario including many aspects of security risk such as security properties, security impact, sensitivity, countermeasures, and others, the enhanced threat scenario template is proposed as shown in Figure 5. The proposed threat scenario template has been extended from the normal use case scenario description and has several elements: use case name, actor, security risk property, description, target, expected damage, preconditions, post conditions, threat scenario, consideration, and countermeasure. Each element can reflect the context of the threat scenario sufficiently. The definitions of the 11 elements are as follows: Use case name. A use case represents security hazards and attacks. Each use case should have a unique name suggesting its purpose. The name should express what happens when the use case is performed. Actor(s). An actor(s) is someone or something that interacts with the use case. In a threat scenario, the actor is a malicious user such as a hacker, a cracker, or a malicious programmer. Security risk property(ies). A security risk property(ies) describes security attributes as one of the key factors affecting the system or the organization. These include confidentiality, integrity, availability, authenticity, and non repudiation. Description. This is a set of simple explanations on the actions of the use case. Target. This is the aim of an attack (especially a victim of ridicule or exploitation) by some hostile actors (malicious user classes) or security attacks. Expected damage. This is the expected loss of assets such as information, hardware, software, human resources, and circumstances in ISs. Pre conditions. These are the rules defining all the conditions that must be true for the trigger to meaningfully cause the initiation of the use case. That is, if the system is not in the state described in the pre conditions, the behavior of the use case is indeterminate. Post conditions. These are the rules defining all the conditions that must be true on successful completion of the use case. The post conditions are not necessarily true if an exception course was taken. Threat scenario. These are the actions of the use case. A use case is defined as a set of sequences of actions (threat scenarios) a system performs that yield an observable result that is of value to a particular actor. The threat scenario is a synopsis of events or conditions leading to an accidental loss. Each threat scenario has a special characteristic such as impact, sensitivity, and relationship: Impact is a measure of the magnitude of the loss or harm to the values of an asset. The following are simple definitions of the impact values: High impact shutdown of a critical business unit that leads to a significant loss of business, corporate image, or profit. Medium impact short interruption of critical process or system that results in a limited financial loss to a single business unit. Low impact interruption with no financial loss. Sensitivity is the likelihood that a scenario event will occur. The following are simple definitions of the sensitivity values: High sensitivity very likely that the scenario event will occur by tomorrow. Medium sensitivity possible that the scenario may occur by tomorrow. Low sensitivity highly unlikely that the scenario will occur by tomorrow. Relationship represents the relationship between threat scenarios. The following are simple definitions of the relationship values: Inclusive if a scenario is described as inclusive, it allows all kinds of scenarios to belong to it. Conflict a conflict is a serious difference between two or more scenarios. If two scenarios are in conflict, they are very different. Consideration. Anything of value in the SRA. Countermeasure. Controls or safeguards that could possibly eliminate the risk or at least reduce the risk to an acceptable level. Generally speaking, the risk is the possibility of significant financial impact. In this paper, in order to assess the risk faced by the organization, the impact and sensitivity elements are included in the threat template. The identification of impact and sensitivity associated with a threat scenario is usually performed by engineers and actuaries, based on statistical data and expert judgment. In practice, many more threat scenarios can be added to the diagram. This gives the analyst a complete security risk profile of the ISs exposure to accidental damage. 296 Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd.
5 Y. G. Kim and S. Cha Threat scenario based security risk analysis Figure 3. Scenario for Broadband convergence Network. 4. CASE STUDY In order to illustrate the motivation of our research, let us discuss an example application that will be enabled by a Broadband convergence Network (BcN) environment, as illustrated in Figure 3. In order to support BcN services, service requests and admission procedures are required. The detailed scenario description in Figure 3 may be described as follows: attacker: Play User Service, Saturating the SSW, Modification of Session Message, Traffic Analysis. As mentioned earlier, each use case can be a scenario wherein the use case is mapped onto the threat scenario. In this case study, the Modification of Session Message use case is mapped onto the threat scenario, as illustrated in Figure 5. As described earlier, the key concept of our approach is use case modeling based on the threat scenario. The threat (1) Service request. To use the registered services, a user sends a service request message to the softswitch (SSW). (2) Service profile check. The SSW checks the service profile of the application server and identifies whether the user has a right to use the request service. (3) Service provider search. If the user has a valid right, the SSW looks for service providers supporting the user s requested service. The service provider can be a server of a content provider or another user s home terminal in case of interactive communication such as a video telephone. That is, the SSW retrieves the service provider connected to the current network and its location. (4) Access route establishment. In order to support the service to the user, the SSW establishes the access route and sends its information to the network transmission control systems such as routers, gateways (GWs), and signaling gateways (SGs). In the BcN environment, attack scenarios are first depicted in Figure 4 by the use case diagram. Given an actor and a home terminal attacker, there are four use cases that can occur for the home terminal Figure 4. Use case diagram for scenario based security risk analysis. Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd. 297
6 Threat scenario based security risk analysis Y. G. Kim and S. Cha scenario template is extended from the normal use case scenario description to deal with security aspects of SRA such as security property, threat impact, sensitivity, and relationship. 5. EVALUATION In this paper, a method for analyzing the security risks in ISs using use case modeling and its threat scenario is proposed. The proposed method has different advantages from the existing qualitative approaches such as the scenario method, Delphi technique, ranking method, scoring method, and others. Table I compares the existing qualitative approaches and the proposed method in this paper. First, the proposed method is easier to understand than the textual based or expert based qualitative SRA method. That is, from a user perspective, it is clear that the users do not need a strong security background. By examining the use cases, a user can establish what security threats can occur. By examining the actors, a user can establish exactly who will be involved in security hazards and attacks. Table I. Comparison of the existing approaches and the proposed method. Understandability Ambiguity Standards compliant Completeness Operational technology Measurability Scenario approach Low High Low Low Low Low Delphi technique Middle Middle Low Middle Middle Middle Ranking method Middle Middle Low Middle Middle Middle Scoring method Middle Middle Low Middle Middle Middle Proposed method High Low High High High Middle Figure 5. Threat scenario for Modification of Session Message use case. 298 Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd.
7 Y. G. Kim and S. Cha Threat scenario based security risk analysis Second, the proposed method aims to move from simple textual descriptions of security threat scenarios to more formalized SRA models. The captured use case diagram and threat scenario template for SRA deal with difficult security threats faced by users in a much more direct manner than a mere textual discussion of security threats. Furthermore, the proposed method uses the standard UML use case diagram, which is an industry standard collection of notations for analysis and design. The benefits of using the UML standard are sharing the best practices and setting benchmarks for performance, quality, and safety, so an SRA analyst can focus on evaluating a better SRA. Third, the existing scenario approach does not consider security aspects such as the impact and sensitivity of threats. However, the proposed scenario based SRA allows identification and prioritization of potential threats by estimating the impact and the sensitivity of threats. Therefore, the SRA can be conducted effectively and simply. 6. CONCLUSION Scenario based risk analysis allows us to investigate possible future accidents in detail. However, the existing scenario based SRA methods are too abstract and informal, because they do not explicitly define artifacts or have any standard notation. Therefore, we proposed the threat scenario based SRA method, which can create SRA reports using use case diagrams and threat scenario templates, and managed security risk directly in the ISs. This starts with use case modeling, which can capture and analyze security risk in a simple manner. Thus, the proposed method makes it possible to use prototype user interfaces for capturing desired scenarios of SRA, as well as animating these scenarios for the purposes of validation using use case modeling. Furthermore, it can provide valuable guidance to decision makers and others responsible for the effective management of security risks. ACKNOWLEDGEMENT This research was supported by the National IT Industry Promotion Agency (NIPA) under the program of Software Engineering Technologies Development. REFERENCES 1. In HP, Kim Y G, Lee T, et al. A security analysis model for information systems. Lecture Notes in Artificial Intelligence 2004; 3398: Lee Y, Kim Y G, Shim M, Lim J. Qualitative risk analysis using scenario method. In Proceedings of the Second International Joint Workshop on Information Security and Its Applications (IJWISA 2007), Seoul. 5 6 February 2007; Korea University, Seoul, 2007; Booch G, Rumbaugh J, Jacobson I. The Unified Modeling Language User Guide, Addison Wesley Longman Ltd: Boston, MA, Booch G, Rumbaugh J, Jacobson I. UML Distilled: A Brief Guide to the Standard Object Modeling Language (third edn), Addison Wesley Professional: Reading, MA, Stoneburner G, Goguen A, Feringa A. Risk Management Guide for Information Technology Systems, Special Publication , National Institute of Standards and Technology (NIST): Gaithersburg, MD, McDermott J, Fox C. Using abuse case models for security requirements analysis. In Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), Phoenix, AZ, 6 10 December IEEE Computer Society: Washington, DC, 1999; McDermott J. Abuse case based assurance arguments. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, LA, December IEEE Computer Society: Washington, DC, 2001; Sindre G, Opdahl AL. Eliciting security requirements by misuse cases. In Proceedings of the 37th International Conference on Technology of Object oriented Languages and Systems (TOOLS Pacific 2000),Sydney, New South Wales, November IEEE Computer Society: Washington, DC, 2000; Douglass BP. Real time UML Developing Efficient Objects for Embedded Systems (second edn), Addison Wesley Longman Ltd: Boston, MA, Allenby K, Kelly TP. Deriving safety requirements using scenarios. In Proceedings of Fifth IEEE International Symposium on Requirements Engineering (RE 01), Toronto, Ontario, August IEEE Computer Society: Washington, DC, 2001; UK Ministry of Defence. Defence Standard 00 58: HAZOP Studies on Systems Containing Programmable Electronics, UK Ministry of Defence: London, Srivatanakul T, Clark JA, Polack F. Effective security requirements analysis: HAZOP and use cases. Lecture Notes in Computer Science 2004; 3225: Georg G, Ray I, Anastasakis K, Bordbar B, Toahchoodee M, Houmb SH. An aspect oriented methodology for designing secure applications. Information and Software Technology 2009; 51(5): Georg G, Houmb SH, Ray I. Aspect oriented riskdriven development of secure applications. In Proceedings of the 20th IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Sophia Antipolis, 31 July 2 August Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd. 299
8 Threat scenario based security risk analysis Y. G. Kim and S. Cha 15. Heijden KVD. Scenarios The Art of Strategic Conversation, John Wiley & Sons Ltd.: Hoboken, NJ, Meier JD, Kackman A, Wastell B. How to Create a Threat Model for a Web Application at Design Time, Technical Report, Microsoft Corp.: Redmond, WA, Perry WE, Kuong J. Edp Risk Analysis and Controls Justification (Enterprise Protection, Control, Audit, Security, Risk Management and Business Continuity), Management Advisory Publications: Wellesley Hills, MA, June Li L. Translating Use Cases to Sequence Diagrams. In Proceedings of the 15th IEEE International Conference on Automated Software Engineering, Grenoble, September IEEE Computer Society: Washington, DC, 2000; Jacobson I, Booch G, Rumbaugh J. The Unified Software Development Process. Addison Wesley Longman Ltd: Boston, MA, Security Comm. Networks 2012; 5: John Wiley & Sons, Ltd.
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Analyzing the Security Significance of System Requirements
Analyzing the Security Significance of System Requirements Donald G. Firesmith Software Engineering Institute [email protected] Abstract Safety and security are highly related concepts [1] [2] [3]. Both
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Introduction to Security
2 Introduction to Security : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 25 October 2013 its335y13s2l01, Steve/Courses/2013/s2/its335/lectures/intro.tex,
Towards Security Risk-oriented Misuse Cases
Towards Security Risk-oriented Misuse Cases Inam Soomro and Naved Ahmed Institute of Computer Science, University of Tartu J. Liivi 2, 50409 Tartu, Estonia {inam, naved}@ut.ee Abstract. Security has turn
A Methodology for Capturing Software Systems Security Requirements
A Methodology for Capturing Software Systems Security Requirements Hassan EL-Hadary Supervised by: Prof. Sherif EL-Kassas Outline Introduction to security Software Security Security Definitions Security
Performing Effective Risk Assessments Dos and Don ts
Performing Effective Risk Assessments Dos and Don ts % Gary Braglia Security Specialist GreyCastle Security TCTC March 18, 2013 Introduction Who am I? Why Risk Management? Because you have to Because
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
A Practical Approach to Threat Modeling
A Practical Approach to Threat Modeling Tom Olzak March 2006 Today s security management efforts are based on risk management principles. In other words, security resources are applied to vulnerabilities
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan March 19, 2015 Network Security Reference Books Corporate Computer Security (3rd Edition)
Threat Modeling Using Fuzzy Logic Paradigm
Issues in Informing Science and Information Technology Volume 4, 2007 Threat Modeling Using Fuzzy Logic Paradigm A. S. Sodiya, S. A. Onashoga, and B. A. Oladunjoye Department of Computer Science, University
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
UF Risk IT Assessment Guidelines
Who Should Read This All risk assessment participants should read this document, most importantly, unit administration and IT workers. A robust risk assessment includes evaluation by all sectors of an
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Microsoft STRIDE (six) threat categories
Risk-based Security Testing: Prioritizing Security Testing with Threat Modeling This lecture provides reference material for the book entitled The Art of Software Security Testing by Wysopal et al. 2007
HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
APPLICATION THREAT MODELING
APPLICATION THREAT MODELING APPENDIX PROCESS FOR ATTACK SIMULATION AND THREAT ANALYSIS Marco M. Morana WILEY Copyrighted material Not for distribution 1 2 Contents Appendix process for attack simulation
Security Testing. How security testing is different Types of security attacks Threat modelling
Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Misuse Cases: earlier and smarter information security
Misuse Cases: earlier and smarter information security By defining the scenarios in which computer systems could be misused, security professionals can test more thoroughly and close down risk more quickly.
A Structured Comparison of Security Standards
A Structured Comparison of Security Standards Kristian Beckers 1, Isabelle Côté 3, Stefan Fenz 2, Denis Hatebur 1,3, and Maritta Heisel 1 1 paluno - The Ruhr Institute for Software Technology - University
A Survey on Requirements and Design Methods for Secure Software Development*
A Survey on Requirements and Design Methods for Secure Software Development* Muhammad Umair Ahmed Khan and Mohammad Zulkernine School of Computing Queen s University Kingston, Ontario, Canada K7L 3N6 {umair
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Vulnerability Scanning & Management
Vulnerability Scanning & Management (An approach to managing the risk level of a vulnerability) Ziad Khalil 1, Mohamed Elammari 2 1 Higher Academy, 2 Rogue Wave Software Ottawa, Canada Abstract Vulnerability
IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines
IM-93-1 ADP System Security Requirements and Review Process - Federal Guidelines U.S. Department of Health and Human Services Administration for Children and Families Washington, D.C. 20447 Information
Secure By Design: Security in the Software Development Lifecycle
Secure By Design: Security in the Software Development Lifecycle Twin Cities Rational User s Group Security Briefing by Arctec Group (www.arctecgroup.net) Integrating Security into Software Development
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
A Governance Framework for Building Secure IT Systems *
A Governance Framework for Building Secure IT Systems * Abdelwahab Hamou-Lhadj 1 and AbdelKrim Hamou-Lhadj 2 1 Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats
Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats Mohamed Ali Saleh Abomhara University of Agder [email protected] Winter School in Information Security, Finse May
HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY
VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide
VoIP: The Evolving Solution and the Evolving Threat Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide VoIP: The Evolving Solution and the Evolving Threat An ISS Whitepaper 2
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
Threat modeling. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2011
Threat modeling Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Threats Threat = something bad that can happen Given an system or product what are the threats against
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT
INTERNATIONAL CIVIL AVIATION ORGANIZATION ASIA AND PACIFIC OFFICE ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT DRAFT Second Edition June 2010 3.4H - 1 TABLE OF CONTENTS 1.
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
UoB Risk Assessment Methodology
[Type here] UoB Risk Assessment Methodology The Risk Assessment Methodology describes how information security risk will be managed, including guidance for assessing, scoring, choosing acceptance or treatment
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics
Compliance Risk Assessment Measures of Financial Information Security using System Dynamics Ae Chan Kim 1, Su Mi Lee 2 and Dong Hoon Lee 3 1, 3 Graduate School of Information Security, Korea University
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
About Effective Penetration Testing Methodology
보안공학연구논문지 (Journal of Security Engineering), 제 5권 제 5호 2008년 10월 About Effective Penetration Testing Methodology Byeong-Ho KANG 1) Abstract Penetration testing is one of the oldest methods for assessing
Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
SecSDM: A Model for Integrating Security into the Software Development Life Cycle
SecSDM: A Model for Integrating Security into the Software Development Life Cycle Lynn Futcher, Rossouw von Solms Centre for Information Security Studies, Nelson Mandela Metropolitan University, Port Elizabeth,
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11
Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2
white SECURITY TESTING WHITE PAPER
white SECURITY TESTING WHITE PAPER Contents: Introduction...3 The Need for Security Testing...4 Security Scorecards...5 Test Approach... 11 Framework... 16 Project Initiation Process... 17 Conclusion...
Cryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
What is required of a compliant Risk Assessment?
What is required of a compliant Risk Assessment? ACR 2 Solutions President Jack Kolk discusses the nine elements that the Office of Civil Rights requires Covered Entities perform when conducting a HIPAA
ESKISP6054.01 Conduct security testing, under supervision
Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA Younghee Lee, Jinkyung Kim and Il Moon Department of Chemical Engineering, Yonsei University, 134 Sinchon-dong, Seodaemun-gu,
Designing Real-Time and Embedded Systems with the COMET/UML method
By Hassan Gomaa, Department of Information and Software Engineering, George Mason University. Designing Real-Time and Embedded Systems with the COMET/UML method Most object-oriented analysis and design
White Paper An Enterprise Security Program and Architecture to Support Business Drivers
White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
HIPAA Security COMPLIANCE Checklist For Employers
Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
RISK ASSESSMENT GUIDELINES
RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.
Overview TECHIS60441. Carry out security testing activities
Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being
Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh
Effectively Completing and Documenting a Risk Analysis Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS Session Objectives Identify the difference between risk analysis and risk assessment
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities
A Vulnerability-Centric Requirements Engineering Framework: Analyzing Security Attacks, Countermeasures, and Requirements Based on Vulnerabilities Golnaz Elahi University of Toronto [email protected]
Network Security. Instructor: Adam Hahn
Network Security Instructor: Adam Hahn The syllabus Reading for Wednesday Ken Thompson, Reflections on Trusting Trust, Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http://cm.bell-labs.com/who/ken/trust.html
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Improving SCADA Control Systems Security with Software Vulnerability Analysis
Improving SCADA Control Systems Security with Software Vulnerability Analysis GIOVANNI CAGALABAN, TAIHOON KIM, SEOKSOO KIM Department of Multimedia Hannam University Ojeong-dong, Daedeok-gu, Daejeon 306-791
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS
http://dx.doi.org/10.5516/net.04.2012.091 AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS JAE-GU SONG *, JUNG-WOON LEE, GEE-YONG PARK, KEE-CHOON KWON,
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
Keywords Aspect-Oriented Modeling, Rule-based graph transformations, Aspect, pointcuts, crosscutting concerns.
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Functional and Non-Functional
Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches
Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES
A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES JAEKWAN PARK * and YONGSUK SUH Korea Atomic Energy Research Institute
Functional vs. Load Testing
Best Practices in Performance & Security Testing March 26, 2009 CVN www.sonata-software.com Functional vs. Load Testing Functional test Objective Functionality Example Do business processes function properly
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
