Module 8 - Risk Management New
Module 8 - Risk Management New
ASSURANCE &
SECURITY 1
MODULE 8
RISK
MANAGEMENT
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ Define the Risk Analysis and its goals;
▪ Demonstrate the Threat and Risk Management;
▪ Explain the importance of Risk Response Strategies;
▪ Give different techniques and tools for vulnerability assessment.
▪ Discuss the different types of mitigation;
▪ Give different deterrent techniques;
OBJECTIVES
Upon completion of this module, the student would be able to:
▪ To identify and perform vulnerability risk.
▪ To discuss mitigation and deterrent techniques
▪ Discuss vulnerability assessment techniques;
▪ Give different types of vulnerability scans.
RISK ANALYSIS, IMPLEMENT
VULNERABILITY ASSESSMENT
TOOLS, MITIGATION AND
DETERRENT TECHNIQUES
DEFINING THREAT AND RISK MANAGEMENT
❑Threat and risk management is the process of identifying, assessing, and
prioritizing threats and risks.
Threat and Risk Management
Assessment
Mitigation Analysis
Response
Use DREAD to measure and rank the threats risk level:
❑ Damage potential: How much damage can be inflicted on our system?
❑ Affected users: If the attack occurs, how many users will be affected?
❑Man-made disasters:
✓Intentional:
• Terrorism, Bomb Threats, Arson, Theft
✓Unintentional:
• Employee mistakes
Components of Risk Analysis
❑Qualitative
❑Quantitative
Risk Calculation
Impact
Risk of Occurrence
Vulnerability Identification Source Estimate (US Mitigation
(1=Low; 5=High)
Dollars)
❑Fail secure:
✓Keeps something secure in the event of failure
✓Electric door strikes
❑Fail open:
✓Allows access in the event of failure
✓Magnetic lock
Risk Response Strategies
❑Avoidance
❑Transference
❑Acceptance
❑Mitigation
RISK AVOIDANCE is the process of eliminating a risk by choosing to
not engage in an action or activity.
RISK TRANSFERENCE is the act of taking steps to move responsibility
for a risk to a third party through insurance or outsourcing.
RISK ACCEPTANCE is the act of identifying and then making an
informed decision to accept the likelihood and impact of a specific risk.
RISK MITIGATION consists of taking steps to reduce the likelihood or
impact of a risk.
RISK DETERRENCE involves putting into place systems and policies
to mitigate a risk by protecting against the exploitation of vulnerabilities
that cannot be eliminated.
SCAN FOR VULNERABILITIES,
MITIGATION AND DETERRENT
TECHNIQUES
Vulnerability Assessment
Vulnerability Assessment is the process of identifying, quantifying, and
prioritizing (or ranking) the vulnerabilities in a system.
❑Protocol analyzer
❑Sniffer
❑Vulnerability scanner
❑Port scanner
❑Honeypot
A PROTOCOL ANALYZER is a tool (hardware or software) used to capture and
analyze signals and data traffic over a communication channel.
SNIFFERS are specially designed software (and in some cases hardware)
applications which capture network packets as they traverse the network
and display them for the attacker.
A VULNERABILITY SCANNER is a computer program designed to assess
computers, networks or applications for known weaknesses. In plain words,
these scanners are used to discover the weaknesses of a given system.
A honeypot is a trap for hackers. A honeypot is designed to distract hackers
from real targets, detect new vulnerabilities and exploits, and learn about the
identity of attackers.
Report on
White Hat Security Flaws
✓ 1. Foot printing
✓ 2. Scanning
✓ 3. Enumeration
✓ 4. Attacking
Foot Printing process of collecting as much as information as possible
about the target system to find ways to penetrate into the system.
SCANNING is a set of procedures for identifying live hosts, ports, and services,
discovering Operating system and architecture of target system.
ENUMERATION belongs to the first phase of Ethical Hacking, i.e.,
“Information Gathering”.
Attack is an information security threat that involves an attempt to
obtain, alter, destroy, remove, implant or reveal information without
authorized access or permission.
Vulnerability Scanning and Penetration Testing
❑Vulnerability scan:
✓Passively identifies missing security controls
✓Detects poor configurations
✓Doesn’t test the security mechanisms themselves
✓Credentialed vs. non-credentialed
✓May produce false positives and false negatives
❑Penetration test:
✓Actively simulates an attack on a system
✓Tests security strength directly and thoroughly
✓Less common
✓More intrusive
✓May cause actual damage
Vulnerability scanning is an inspection of the potential points of
exploit on a computer or network to identify security holes.
Types of vulnerability scanners include:
• Port Scanner
• Network Enumerator
• Network Vulnerability Scanner
• Web Application Security Scanner
• Computer Worm
Box Testing Methods