1.1 Threat, risk, vulnerability, impact _ KEATS
1.1 Threats, Risks, Vulnerabilities, Impact
Site: KEATS
Course: 7CCSMSEM Security Management (24~25 SEM1 000001)
Book: 1.1 Threat, risk, vulnerability, impact
Printed by: Victor Nabasu
Date: Wednesday, 1 January 2025, 6:16 AM
Table of Contents
Where do threats come from?
Key definitions
An example
1. Where Do Threats Come From?
Understanding threats involves considering security decisions and analyzing potential targets.
Factors to Consider:
Who may want to attack?
For what purpose?
Types of Threats:
Hackers:
Example: Albert Gonzalez, leader of a hacking group, stole 40 million credit cards.
Consequence: 20 years imprisonment, forfeited $1.65 million in assets.
Insider Threat:
Example: James Stevenson, an employee at Sainsbury’s, jailed for fraudulent activities regarding customer points.
Viruses and Trojans
Virus Example: Stuxnet
Targets programmable logic controllers (PLCs) affecting industrial processes.
Significant impact on Iran's nuclear program, damaging about 20% of centrifuges.
Phishing and Social Engineering:
Example: Google Docs phishing campaign targeting a million users with a deceptive link.
Quick response from Google limited widespread damage.
2. Key Definitions
Threat Agent:
An entity capable of causing a threat; can be internal or external.
Threat:
A potential cause of an incident that could harm a system/organization (ISO 27002).
Includes categories like malware, rootkits, and natural disasters.
Vulnerability:
A weakness in an asset or group of assets that can be exploited (ISO 27002).
Examples: procedural flaws, software weaknesses.
Risk:
The likelihood of a threat exploiting vulnerabilities, resulting in harm (ISO 27002).
Impact:
The result of a risk materializing due to a threat; examines the cost of exploitation (ISO 27005).
Safeguard:
Also called risk treatment actions; measures to mitigate/transfer/remove threats.
3. An Example
Basic Example: Weather-related Threat
Threat: Rain
Vulnerability: Not having an umbrella
Risk: Likelihood of rain affecting the asset (haircut/shoes)
In September, expect approx. 15 rainy days, indicating risk level.
Impact:
Minor impact: Getting wet (acceptable risk).
Major impact: Missing a job interview due to being too wet (risk must be mitigated).
Analyze response measures if risks materialize; focus on the relation between threats, vulnerabilities, risks, and impacts.