Assets Model
Assets Model
Solutions
(ii)Threat Model
ASSET SOURCES OF MOTIVE ACTS RESULTS POSSIBLE
THREAT AND LOSSES SOLUTIONS TO
THREATS
Web Servers Unauthorized Data Theft n Hacking Data Breach Access Control
Access Sabotage Social Engineering Financial Loss
Insider Threats DOS Sabotaging power DOS Authentication
Power outages Accidental supply. System
Equipment failure. Financial Installing malware. downtime Backup Systems
Natural disasters gai Breaking into Data Loss
physical premises
Install locking doors
Accidental (Natural
and limit distribution
Disaster)
of keys.
Install “Authorized
admittance only” signs
Company vehicles Burglars Financial gain Stealing Vehicle loss Require wearing of
Insider Threats Sabotage equipment. authorized access
Equipment failure DOS badges
Irrational
behavior Post guards at
entrances
GPU Servers Burglars Financial gain Stealing Asset Loss Access Control,
Insider Threats Sabotage equipment. DOS Surveillance
Power outages DOS Sabotaging power Financial loss
Equipment failure. supply Reputation
Install “Authorized
admittance only” signs
Firewalls Insider Threat Data Theft Hacking Security Breach Regular Updates
Data breaches Sabotage Installing malware Loss of privacy
Human Error DOS Stealing equipment Modification Proper Configuration
Malware and Management
and viruses.
Equipment failure Deploy robust
Unauthorized access antivirus and firewall
by hackers solutions
Proxy Server Unauthorized access Revenge Hacking System Traffic Filtering
by Hackers Insider Sabotage Stealing equipment downtime
Threat Curiosity Manipulating data Data Loss Rate Limiting
Malware and viruses Political activism Financial loss
Equipment failure Conduct regular
security training for
employees to mitigate
insider threats.
Dot Matrix Printer Burglars Financial gain, Theft Stealing Asset Loss Access Control
HP Printer Insider Threat Sabotage equipment Denial of use
Laser jet printer Sabotaging power Financial loss Install CCTV for
Photocopier supply Surveillance
Regular security
awareness campaigns
Financial Ledgers Burglars, Insider Financial Theft Asset Loss, Access Control
Cheque Books Threat Gain, Manipulating data Financial loss
Money Safe Sabotage Privacy breach Install CCTV for
Surveillance
References
Balachandra, R.; Ramakrishna, P.; and Rakshit, A. “Cloud Security Issues.” Proceedings, 2009
IEEE International Conference on Services Computing, 2009.
BARK91 Barker, W. Introduction to the Analysis of the Data Encryption Standard (DES). Laguna
Hills, CA: Aegean Park Press, 1991.
BARK05 Barker, E., et al. Recommendation for Key Management—Part 2: Best Practices for Key
Management Organization. NIST SP800-57, August 2005.
BARK09 Barker, E., et al. Recommendation for Key Management—Part 3: Specific Key
Management Guidance. NIST SP800-57, December 2009.
BARK12a Barker, E., et al. Recommendation for Key Management—Part 1: General. NIST
SP800-57,
June 2012.