Ch09 Cryptographic Tools
Ch09 Cryptographic Tools
First Edition
by William Stallings and Lawrie Brown
threat: a potential cause of an unwanted incident which may result in harm to a system or
organization
vulnerability: a weakness in an asset or group of assets which can be exploited by a
threat
risk: the potential that a given threat will exploit vulnerabilities of an asset or group of
assets to cause loss or damage to the assets.
Threat Identification
to identify threats or risks to assets asK
1. who or what could cause it harm?
2. how could this occur?
threats are anything that hinders or
prevents an asset providing appropriate
levels of the key security services:
confidentiality, integrity, availability,
accountability, authenticity and reliability
assets may have multiple threats
Threat Sources
threats may be
natural “acts of god”
man-made and either accidental or deliberate
should consider human attackers:
Motivation: why would they target this organization, how motivated are
they?
Capability: what is their level of skill in exploiting the threat?
Resources:how much time, money, and other resources could they deploy?
probability of attack(how likely and how often would your assets be targeted? )
Deterrence(what are the consequences to the attacker of being identified)
any previous history of attack on org
Threat Identification
depends on risk assessors experience
uses variety of sources
natural threat chance usually well known
from insurance companies record(stats)
lists of potential threats in standards, IT
security surveys, info from governments
tailored to organization’s environment
and any vulnerabilities in its IT systems
Vulnerability Identification
identify exploitable flaws or weaknesses in
organization’s IT systems or processes
hence determine applicability and
significance of threat to organization
note need combination of threat and
vulnerability to create a risk to an asset
again can use lists of potential
vulnerabilities in standards etc
Analyse Risks
specify likelihood of occurrence of each
identified threat to asset given existing controls
management, operational, technical processes and
procedures to reduce exposure of org to some risks
specify consequence should threat occur
hence derive overall risk rating for each threat
risk = probability threat occurs x cost to organization
in practice very hard to determine exactly
use qualitative not quantitativ, ratings for each
aim to order resulting risks in order to treat them
Determine Likelihood
Rating Likelihood Expanded Definition
Description
1 Rare May occur only in exceptional circumstances and may
deemed as “unlucky” or very unlikely.
2 Unlikely Could occur at some time but not expected given current
controls, circumstances, and recent events.
3 Possible Might occur at some time, but just as likely as not. It may be
difficult to control its occurrence due to external influences.
4 Likely Will probably occur in some circumstance and one should
not be surprised if it occurred.
5 Almost Is expected to occur in most circumstances and certainly
Certain sooner or later.
Determine Consequence
judgment of the asset’s owners and the
organization’s management.
consequence needs to be realistic.
the impact on the organization as a whole
not just the impact on the affected system
impact on the organization could vary from it
being a minor inconvenience .
Determine Consequence
Rating Consequence Expanded Definition.
1 Insignificant Generally a result of a minor security breach in a single area.
Impact is likely to last less than several days and requires only
minor expenditure to rectify.
2 Minor Result of a security breach in one or two areas. Impact is likely to
last less than a week, but can be dealt with at the segment or project
level without management intervention. Can generally be rectified
within project or team resources.
3 Moderate Limited systemic (and possibly ongoing) security breaches. Impact
is likely to last up to 2 weeks and generally requires management
intervention. Will have ongoing compliance costs to overcome.
4 Major Ongoing systemic security breach. Impact will likely last 4-8 weeks
and require significant management intervention and resources to
overcome, and compliance costs are expected to be substantial.
Loss of business or organizational outcomes is possible, but not
expected, especially if this is a once off.
5 Catastrophic Major systemic security breach. Impact will last for 3 months or
more and senior management will be required to intervene for the
duration of the event to overcome shortcomings. Compliance costs
are expected to be very substantial. Substantial public or political
debate about, and loss of confidence in, the organization is likely.
Possible criminal or disciplinary action is likely.
6 Doomsday Multiple instances of major systemic security breaches. Impact
duration cannot be determined and senior management will be
required to place the company under voluntary administration or
other form of major restructuring. Criminal proceedings against
senior management is expected, and substantial loss of business and
failure to meet organizational objectives is unavoidable.
Determine Resultant Risk
Consequences
Likelihood Doomsday Catastrophic Major Moderate Minor Insignificant
Almost E E E E H H
Certain
Likely E E E H H M
Possible E E E H M L
Unlikely E E H M L L
Rare E H H M L L