Lec 3
Lec 3
Chapter 3
Vulnerability Assessment
and Mitigating Attacks
1. Asset Identification
2. Threat Evaluation
Threat Modeling
• Threat modeling – the goal is to better understand
who the attackers are, why they attack and what type
of attacks might occur.
• Attack tree - Provides a visual representation of
potential attacks as inverted tree structure.
• Attack tree displays
– Goal of attack
– Types of attacks that could occur
– Techniques used in attacks
3. Vulnerability Appraisal
• Vulnerability appraisal - Determine current
weaknesses as snapshot of current organization
security.
• Every asset should be viewed in light of each
threat. النظر لكل أصل في ضوء التهديد
• Catalog each vulnerability.
• Risk assessment
– Determine damage resulting from attack
– Assess likelihood that vulnerability is a risk to
organization
4. Risk Assessment
• Risk assessment - Determine damage resulting from
attack and assess likelihood that vulnerability is risk
to organization.
• Determining damage from attack first requires
realistic look at several different types of attacks that
might occur.
• Based upon vulnerabilities recognized in vulnerability
appraisal, a risk assessment of impact can then be
undertaken.
• Not all vulnerabilities pose the same risk.
5. Risk Mitigation
Ports
• TCP/IP networks exchange information between
program running on one system (process), and
same/corresponding process running on remote
system.
• Port number - TCP/IP uses a numeric value as
identifier to applications and services on systems.
• Each packet/datagram contains source port and
destination port.
• Identifies both originating application/service on
local system and corresponding application/service
on remote system.
Security+ Guide to Network Security Fundamentals 21
Assessment Tools
Port Categories
Port Security
Port Scanner
Protocol Analyzers
• Example: Wireshark.
Vulnerability Scanners
• Vulnerability scanner - Generic term for range of
products that look for vulnerabilities in networks or
systems.
• Intended to identify vulnerabilities and alert network
administrators to these problems.
• Most vulnerability scanners maintain database that
categorizes and describes vulnerabilities that it can
detect.
2. Configuring Controls
• Key to mitigating and deterring attacks is proper
configuration and testing of the controls
• One category of controls is those either detect or
prevent attacks
• Another example of configuring controls regards
what occurs when a normal function is interrupted
by failure: does safety take priority or does security?
3. Hardening
5. Reporting