0% found this document useful (0 votes)
37 views

Chapter02-Managing Risk-Threats, Vulnerabilities, and Exploits

The document discusses managing risk by addressing threats, vulnerabilities, and exploits. It defines these terms and provides best practices for managing each, including creating security policies, training, patching systems, and performing assessments. The document focuses on IT infrastructure and describes threats to public-facing servers along with techniques to mitigate exploits such as hardening servers and reducing attack surfaces.

Uploaded by

MHuy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Chapter02-Managing Risk-Threats, Vulnerabilities, and Exploits

The document discusses managing risk by addressing threats, vulnerabilities, and exploits. It defines these terms and provides best practices for managing each, including creating security policies, training, patching systems, and performing assessments. The document focuses on IT infrastructure and describes threats to public-facing servers along with techniques to mitigate exploits such as hardening servers and reducing attack surfaces.

Uploaded by

MHuy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Managing Risk: Threats,

Vulnerabilities, and Exploits


Objectives

• What threats are and how can they be managed


• What vulnerabilities are and how can they be managed
• What exploits are and how can they be managed
• Which risk management initiatives the U.S. federal
government sponsors

http://fpt.edu.vn 14/05/2019 2
Understanding and Managing Threats

• Threat as any activity that represents a possible danger


• The uncontrollable nature of threats
• Unintentional threats
• Intentional threats
• Any attempt to manage risk requires a through knowledge
of threats

http://fpt.edu.vn 14/05/2019 3
Best Practices for Managing
Threats Within Your IT Infrastructure
• Create a security policy
• Insurance
• Use access controls
• Use automation
• Include input validation
• Provide training
• Use antivirus software
• Protect the boundary

http://fpt.edu.vn 14/05/2019 4
Understanding and Managing
Vulnerabilities
• Vulnerability can be a weakness in an asset or the
environment.
• The loss occurs when a threat exploits the vulnerability.
– threat/vulnerability pairs
• Vulnerabilities can be mitigated.

http://fpt.edu.vn 14/05/2019 5
Mitigation Techniques

• Policies and procedures


• Documentation
• Training
• Separation of duties
• Configuration management
• Version control
• Patch management

http://fpt.edu.vn 14/05/2019 6
Mitigation Techniques (cont.)

• Intrusion detection system


• Incident response
• Continuous monitoring
• Technical controls
• Physical controls

http://fpt.edu.vn 14/05/2019 7
Best Practices for Managing
Vulnerabilities Within Your IT Infrastructure
• Identify vulnerabilities
• Match the threat/vulnerability pairs
• Use as many of the mitigation techniques as feasible
• Perform vulnerability assessments

http://fpt.edu.vn 14/05/2019 8
Understanding and Managing Exploits

• An exploit is the act of exploiting a vulnerability


• The result is a compromise to the system, an application, or
data
• Example: public-facing server
– Buffer overflow
– SQL injection attacks
– Denial of service (DoS) attacks
– Distributed denial of service (DDoS) attacks

http://fpt.edu.vn 14/05/2019 9
Public-Facing Server
Exploits
• Perpetrators
– Script kiddies, programmers
• Initiate
– Public server discovery
– Server fingerprinting
– Vulnerability discovery
• Find information about Vulnerabilities and Exploits
– Blogs, forums, security newsletters
– Common Vulnerabilities and Exposures (CVE) list
– Reverse engineering

http://fpt.edu.vn 14/05/2019 10
Public-Facing Server
Mitigation Techniques
• Remove or change defaults
• Reduce the attack surface
• Keep systems up to date
• Enable firewalls
• Enable intrusion detection systems (IDSs)
• Install antivirus software

http://fpt.edu.vn 14/05/2019 11
Best Practices for Managing
Exploits Within Your IT Infrastructure
• Harden servers
• Use configuration management
• Perform risk assessments
• Perform vulnerability assessments

http://fpt.edu.vn 14/05/2019 12

You might also like