Lecture 10 - Threat Analysis and Risk Assessment (TARA)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/9

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

10 Terms

1
New cards

What does TARA stand for (as used in the lecture)?

Threat Agent Risk Assessment

2
New cards

List the 7 steps of the TARA process

Asset identification → Impact rating → Threat enumeration → Attack path analysis → Attack feasibility rating → Risk determination → Risk treatment decision

3
New cards

Name 3 security properties you consider when identifying assets

Confidentiality, Integrity, Availability

4
New cards

What are the impact rating levels used?

Severe, Major, Moderate, Negligible

5
New cards

What is “threat enumeration”?

Identifying and listing potential threats that could compromise security/integrity

6
New cards

What is an “attack path”?

A described sequence of steps an attacker could take to realise a threat scenario.

7
New cards

What are the 5 core parameters used to rate attack feasibility?

elapsed time, expertise, equipment, knowledge of the item/component, window of opportunity

8
New cards

What are the possible attack feasibility ratings?

High, Medium, Low, Very Low

9
New cards

What does risk treatment include (options)?

Avoid, Reduce, Share/transfer, Accept/retain

10
New cards

Give an example of security requirements derived in the OTA case study

Implement a secure protocol, use strong encryption, use resource exhaustion detection