Lecture 3 - 1
Lecture 3 - 1
Lecture 3 & 4
2024 Abdulsalam S. Mustafa (Ph.D.)
Last Lecture
• Principles and Planning
• Contingency Plan Components
Threat Environment
Types of attackers and attacks faced
◼ Usually 4 Processes
Scanning
Penetration Testing
Classification
Remediation
Assessment
Vulnerability Assessment Process
Vulnerability Assessment
Responding to the Threats
◼ Do Nothing
◼ Warn the User
◼ Remove the Problem
◼ Fix the Problem
◼ Reboot?
◼ Shutdown?
Responding to Threats: Doing Something
Company Profile
Name: The Galactic Empire
Size: 26,000 destroyers + auxiliary fleet
Business: Galactic supremacy
The CEO, Emperor Sheev Palpatine, created his Empire on the shards
of the Galactic Republic and the Confederation of Independent Systems,
wallow in corruption and civil wars (in most cases the latter were
orchestrated by the mysterious Darth Sidious, who turned out to be
disguised Palpatine, the Naboo senator and then a chancellor) In the
times of the battle of Yavin the Empire had been around for 19 years and
was the supreme force in the galaxy.
Threat Example: Star Wars
Asset: Death Star Plans
Asset: Death Star Plans (Threat)
Information Disclosure
Threat Level?
Threat Level?
Reproducibility
Level= 10
◼ How was the security breach handled?
◼ Threat Mitigation?
Countermeasures: Mitigation
Countermeasures…
Exploitability Level?
End Result?
Critical security flaws
Flaw Action
The Empire officers could not prevent a
All personnel should attend cybersecurity
data leak, allowing two droids flee in a
trainings
rescue capsule