Site: KEATS
Course: 7CCSMSEM Security Management (24~25 SEM1 000001)
Book: 1.1 Threat, risk, vulnerability, impact
Printed by: Victor Nabasu
Date: Wednesday, 1 January 2025, 6:16 AM
Where do threats come from?
Key definitions
An example
Understanding threats involves considering security decisions and analyzing potential targets.
Factors to Consider:
Who may want to attack?
For what purpose?
Types of Threats:
Hackers:
Example: Albert Gonzalez, leader of a hacking group, stole 40 million credit cards.
Consequence: 20 years imprisonment, forfeited $1.65 million in assets.
Insider Threat:
Example: James Stevenson, an employee at Sainsbury’s, jailed for fraudulent activities regarding customer points.
Virus Example: Stuxnet
Targets programmable logic controllers (PLCs) affecting industrial processes.
Significant impact on Iran's nuclear program, damaging about 20% of centrifuges.
Phishing and Social Engineering:
Example: Google Docs phishing campaign targeting a million users with a deceptive link.
Quick response from Google limited widespread damage.
Threat Agent:
An entity capable of causing a threat; can be internal or external.
Threat:
A potential cause of an incident that could harm a system/organization (ISO 27002).
Includes categories like malware, rootkits, and natural disasters.
Vulnerability:
A weakness in an asset or group of assets that can be exploited (ISO 27002).
Examples: procedural flaws, software weaknesses.
Risk:
The likelihood of a threat exploiting vulnerabilities, resulting in harm (ISO 27002).
Impact:
The result of a risk materializing due to a threat; examines the cost of exploitation (ISO 27005).
Safeguard:
Also called risk treatment actions; measures to mitigate/transfer/remove threats.
Basic Example: Weather-related Threat
Threat: Rain
Vulnerability: Not having an umbrella
Risk: Likelihood of rain affecting the asset (haircut/shoes)
In September, expect approx. 15 rainy days, indicating risk level.
Impact:
Minor impact: Getting wet (acceptable risk).
Major impact: Missing a job interview due to being too wet (risk must be mitigated).
Analyze response measures if risks materialize; focus on the relation between threats, vulnerabilities, risks, and impacts.