Assets Model Identification
Assets Model Identification
(ii)Threat Model
Web Servers Unauthorized Data Theft Hacking Data Breach Access Control
Access Sabotage Social Engineering Financial Loss
Insider Threats DOS Sabotaging power DOS Authentication
Power outages Accidental supply. System
Equipment failure. Financial gain Installing malware. downtime Backup Systems
Natural disasters Breaking into Data Loss
physical premises Install locking doors
Accidental (Natural and limit distribution
Disaster) of keys.
Install “Authorized
admittance only” signs
Company vehicles Burglars Financial gain Stealing Vehicle loss Require wearing of
Insider Threats Sabotage equipment. authorized access
Equipment failure DOS badges
Irrational
behavior Post guards at
entrances
GPU Servers Burglars Financial gain Stealing Asset Loss Access Control,
Insider Threats Sabotage equipment. DOS Surveillance
Power outages DOS Sabotaging power Financial loss
Equipment failure. supply Reputation
Installing malware Install CCTV and
remote-control locks
Install “Authorized
admittance only” signs
Firewalls Insider Threat Data Theft Hacking Security Breach Regular Updates
Data breaches Sabotage Installing malware Loss of privacy
Human Error DOS Stealing equipment Modification Proper Configuration
Malware and and Management
viruses.
Equipment failure Deploy robust
Unauthorized access antivirus and firewall
by hackers solutions
Proxy Server Unauthorized access Revenge Hacking System Traffic Filtering
by Hackers Sabotage Stealing equipment downtime
Insider Threat Curiosity Manipulating data Data Loss Rate Limiting
Malware and viruses Political activism Financial loss
Equipment failure Conduct regular
security training for
employees to mitigate
insider threats.
Microwave Insider Threat Financial Gain, Negligence Asset Loss. Install Intrusion alarms
Fridge Power outages Sabotage Theft, Stealing Financial loss
Utensils Equipment failure Vandalism. equipment Install CCTV for
Sabotaging power Surveillance
supply
Burglar proofing
Dot Matrix Printer Burglars Financial gain, Theft Stealing Asset Loss Access Control
HP Printer Insider Threat Sabotage equipment Denial of use
Laser jet printer Sabotaging power Financial loss Install CCTV for
Photocopier supply Surveillance
Regular security
awareness campaigns
Financial Ledgers Burglars, Insider Financial Gain, Theft Asset Loss, Access Control
Cheque Books Threat Sabotage Manipulating data Financial loss
Money Safe Privacy breach Install CCTV for
Surveillance
References
Balachandra, R.; Ramakrishna, P.; and Rakshit, A. “Cloud Security Issues.” Proceedings,
2009 IEEE International Conference on Services Computing, 2009.
BARK91 Barker, W. Introduction to the Analysis of the Data Encryption Standard (DES). Laguna
Hills, CA: Aegean Park Press, 1991.
BARK05 Barker, E., et al. Recommendation for Key Management—Part 2: Best Practices for Key
Management Organization. NIST SP800-57, August 2005.
BARK09 Barker, E., et al. Recommendation for Key Management—Part 3: Specific Key
Management Guidance. NIST SP800-57, December 2009.
BARK12a Barker, E., et al. Recommendation for Key Management—Part 1: General. NIST
SP800-57,
June 2012.