560 likes | 690 Views
PhD student in Computer Science Dipartimento di Scienze Università degli Studi “G. d’Annunzio” Pescara. Corso di Sicurezza e Privacy mercoledì 7 novembre 2007. Security Risk Analysis. Pamela Peretti. Dipartimento di Scienze - 16 luglio 2014. Risk Management Process.
E N D
PhD student in Computer Science Dipartimento di Scienze Università degli Studi “G. d’Annunzio” Pescara Corso di Sicurezza e Privacy mercoledì 7 novembre 2007 Security Risk Analysis Pamela Peretti Dipartimento di Scienze - 16 luglio 2014
Risk Management Process Il processo di risk management è l'insieme di attività coordinate per gestire un'organizzazione con riferimento ai rischi. Tipicamente include l'identificazione, la misurazione e la mitigazione delle varie esposizioni al rischio. 2
Risk Management Process Il rischio è l'incertezza che eventi inaspettati possano manifestarsi producendo effetti negativi per l'organizzazione. 3
Risk Management Process Il rischio di Information Technology: il pericolo di interruzione di servizio, diffusione di informazioni riservate o di perdita di dati rilevanti archiviati tramite mezzi computerizzati. Information Security Risk Management 4
1. Risk Assessment Il processo di risk assessment è usato per determinare l'ampiezza delle potenziali minacce ad un sistema IT ed identificare tutte le possibili contromisure per ridurre o eliminare tali voci di rischio. Vengono identificati: asset minacce vulnerabilità contromisure Vengono determinati: impatto prodotto dalle minacce, fattibilità delle minacce, complessivo livello di rischio. 5
2. Risk Mitigation Nel processo di risk mitigation vengono analizzati le contromisure raccomandati dal team di assessment, e vengono selezionati e implementate le contromisure che presentano il miglior rapporto costi/benefici. 6
3. Monitoring All'interno di grandi imprese i sistemi IT subiscono frequenti modifiche dovuti ad aggiornamenti, cambiamento dei componenti, modifica dei software, cambio del personale, ecc. Mutano le condizioni del sistema, modificando anche gli effetti delle contromisure adottate. 7
Approcci Approcci qualitativi Analisi degli scenari che possono realizzarsi all’interno di un sistema. Lo scopo è quello di individuare le possibili minacce e il livello di rischio associato ad ogni risorsa che compone il sistema. Attack tree Approcci quantitativi • Quantificazione di tutte le grandezze necessarie per una valutazione dei rischi con l'obiettivo di determinare, attraverso l’uso di una serie d’indici, la convenienza economica di un investimento in sicurezza. Indici economici 9
Approcci Approcci qualitativi Analisi degli scenari che possono realizzarsi all’interno di un sistema. Lo scopo è quello di individuare le possibili minacce e il livello di rischio associato ad ogni risorsa che compone il sistema. Approcci quantitativi Quantificazione di tutte le grandezze necessarie per una valutazione dei rischi con l'obiettivo di determinare, attraverso l’uso di una serie d’indici, la convenienza economica di un investimento in sicurezza. 10
Defence trees Defence trees are an extension of attack trees [Schneier00]. • Attack tree: • the root is an asset of an IT system • paths from a leaf to the root represent attacks to the asset • the non-leaf nodes can be: • and-nodes • or-nodes root or-nodes and-nodes • Defence tree: • attack tree • a set of countermeasures 13
Defence trees (example) Obtain root privileges a2 a1 $ $ $ Stealing access Corrupting a user Steal datastored in a server 14
Defence trees (example) Attack the system with a remote login a3 a4 a1 a2 Exploit an on-line vulnerability Exploit a web server vulnerability Steal datastored in a server 15
Defence trees (example) Steal theserver a5 a6 a1 a2 a3 a4 Access to the server’s room Go outunobserved Steal datastored in a server 16
Defence trees (example) a1 a2 a3 a5 a4 a6 Steal datastored in a server 17
Defence trees (example) c8 c12 c6 c10 c9 c13 c7 c11 c3 c1 c4 c2 c5 c3 Steal datastored in a server a1 a3 a5 a2 a4 a6 18
Cp-nets Conditional preference networks [Boutiliet99] are a graphical formalism to specify and representing conditional preference relations. D W I prefer red wine to white wine if a meat dish is served. preference condition • Two variables: the dish D, the wine W. • D is a parent of W: Pa(W)=D 20
Cp-nets (example) I prefer red wine to white wine if a meat dish is served. Df Wr Df Ww Dm Ww Dm Wr Less preferred Most preferred 21
Cp-nets can be used to model conditional preferences over attacks and countermeasures Cp-nets on defence trees A C a4 a3 … Exploit a web server vulnerability Exploit an on-line vulnerability less dangerous… … more dangerous 22
Cp-nets can be used to model conditional preferences over attacks and countermeasures Cp-nets on defence trees A a1 C Obtain root privileges stealing access c1 c3 c2 Add an identification token Change the password periodically Log out the pc after the use : less expensive… …more expensive 23
Cp-nets on defence trees Cp-nets can be used to model conditional preferences over attacks and countermeasures A C ? ? ? c3 c1 c8 c12 c6 c10 c9 c13 c7 c11 c4 c2 c5 c3 Ç Æ Ç a1 a2 a5 a6 a3 a4 24
An and-attack is an attack composed by a set of actions that an attacker has to successfully achieve to obtain his goal. and-composition ? How to combine the preferences for the countermeasure associated to each attack action? 25
and-composition (example) A countermeasure is preferred to another one if it is preferred in, at least, one of the partial orders. y a x z b b a a c c b b c A = {x,y,z}C = {a,b,c} : a  b  c x Æ y Æ z and-composition 26
and-composition (example 2) We have also to consider the preferences over the value of the parent variable a x y b a c c b d d A = {x,y}C = {a,b,c,d} and-composition x Æ y : c  d  a  b 27
or-composition An or-attack is an attack that can be performed with different and alternative actions: the attacker can complete successfully any of its actions to obtain his goal ? How to combine the preferences associated to each action that compose the attack and determine sets of countermeasures? 29
or-composition (example) a x z a,b a,b,c a a a,c b,c b b c y x Ç y Ç z A = {x,y,z}C = {a,b,c} a or-composition c <a,a,a> <a,a,b> [a] [a,b] [a,c] [b,c] [a,b,c] <a,c,a> <a,c,b> <b,a,a> [b,c] [a,b] <b,a,a> <b,a,b> <b,c,a> <b,c,b> <b,c,b> <c,a,a> <c,a,b> <c,c,a> <c,c,b> b b a c a b 30
or-composition: example c1 Æ c5 c3 Æ c4 c1 Æ c3 c3 c1 Æ c4 c2 Æ c5 c3 Æ c5 c3 c1 c2 Æ c4 c2 Æ c3 c4 c2 c5 c3 a1Ç a2 a1 a2 31
Approcci Approcci qualitativi • Analisi degli scenari che possono realizzarsi all’interno di un sistema. Lo scopo è quello di individuare le possibili minacce e il livello di rischio associato ad ogni risorsa che compone il sistema. • Approcci quantitativi • Quantificazione di tutte le grandezze necessarie per una valutazione dei rischi con l'obiettivo di determinare, attraverso l’uso di una serie d’indici, la convenienza economica di un investimento in sicurezza. 32
Indici: SLE The Single Loss Exposure (SLE) represents a measure of an enterprise's loss from a single threat event and can be computed by using the following formula: • where: • the Asset Value (AV) is the cost of creation, development, support, replacement and ownership values of an asset, • the Exposure Factor (EF) represents a measure of the magnitude of loss or impact on the value of an asset arising from a threat event. 34
Indici: ALE The Annualized Loss Expectancy (ALE) is the annually expected financial loss of an enterprise that can be ascribed to a threat and can be computed by using the following formula: • where: • the Annualized Rate of Occurrence, (ARO) is a number that represents the estimated number of annual occurrences of a threat. 35
Indici: ROI The Return on Investment (ROI) indicator can be computed by using the following formula: • where: • RM is the risk mitigated by a countermeasure and represents the effectiveness of a countermeasure in mitigating the risk of loss deriving from exploiting a vulnerability • CSI is the cost of security investment that an enterprise must face for implementing a given countermeasure. 36
Indici: ROA The Return On Attack(ROA) measures the gain that an attacker expects from a successful attack over the losses that he sustains due to the adoption of security measures by his target • where: • GI is the expected gain from the successful attack on the specifiedtarget • costa is the cost sustained by the attacker to succeed, • costac is the additional cost brought by the countermeasure cadopted by the defender to mitigate the attack a.
Etichettatura per ROI AV E D C B A EFbAROb SLEbAROb 5 3 1 2 4 RM1Cost1 EFdAROd EFeAROe RM2Cost2 SLEeALEe SLEdALEd RM3Cost3 RM4Cost4 RM5Cost5 39
Etichettatura per ROA A B C D E GI costb costc 1 2 5 3 4 RM1costb,1 RM2costb,2 RM3costc,3 RM4costc,4 RM5costc,5 Corso di Sicurezza e Privacy - 16 luglio 2014 40
Etichettatura Steal datastored in a server Obtain root privileges Attack the system with a remote login Steal the server Stealing access Corrupting a user Exploit an on-line vulnerability Exploit a web server vulnerability Access to the server’s room Go out unobserved Change the password periodically Add an identification token Update the system periodically Install a security door Use an antivirus software Install a video surveillance equipment Log out the pc after the use Distribute responsab. among users Separate the contents on the server Install a safety lock Stop suspicious attachment Employ a security guard Add an identification token Motivate employees 41
Etichettatura ROI Steal datastored in a server AV=100.000 € Attack the system with a remote login Steal the server Obtain root privileges SLE=90.000 € SLE=90.000 € EF=100% EF=100% ARO=0,09 ARO=0,09 Exploit an on-line vulnerability Exploit a web server vulnerability Go out unobserved Access to the server’s room Stealing access Corrupting a user RM=60% RM=80% ROI=9.8 ROI=1.4 CSI=500€ CSI=3000€ Change the password periodically Add an identification token Install a security door Update the system periodically Use an antivirus software Install a video survellaince equipment RM=10% RM=50% ROI=8 ROI=-0.7 CSI=100€ CSI=15000€ Separate the contents on the server Install a safety lock Stop suspicious attachment Employ a security guard Log out the pc after the use Distribute responsab. among users RM=80% RM=80% ROI=1.4 ROI=2.6 CSI=3000€ CSI=2000€ Add an identification token Motivate employees 42
Etichettatura ROA Steal datastored in a server GI=30.000 € Attack the system with a remote login Steal the server Obtain root privileges Costa=3000 € Costb=10000 € Exploit an on-line vulnerability Exploit a web server vulnerability Go out unobserved Access to the server’s room Stealing access Corrupting a user RM=60% RM=80% ROA=2 ROA=-0.48 cost=1000€ cost=1.500€ Change the password periodically Add an identification token Update the system periodically Install a security door Use an antivirus software Install a video survellaince equipment RM=10% RM=50% ROA=6.71 ROA=0.40 cost=500€ cost=700€ Separate the contents on the server Install a safety lock Stop suspicious attachment Employ a security guard Log out the pc after the use Distribute responsab. among users RM=80% RM=80% ROA=0.33 ROA=0.50 cost=1.500€ cost=2000€ Add an identification token Motivate employees 43
Three novel indicators • Critical time • Retaliation • Collusion
Critical time Exposure Factor duringCritical Time expresses the influence that the criticality of a specific time instance plays on the EF .
Critical time: the indicators • Annualized Rate of Occurrence, AROCT, is the rate of occurrence of an attack at a specific CTF per year. • Single Loss Exposure, SLECT, is the cost of a single attack at a specific CTF: • Annualized Loss Expectancy, ALECT, is the cost per year of an attack at a specific CTF: • Return On Investment, ROICT, is the economic return of an enterprise's investment against an attack mounted at a specific CTF:
Retaliation Exposure Factor underRetaliation expresses the influence that the chance of retaliating an attack to an asset plays on the EF.
Retaliation: the indicators • Annualized Rate of Occurrence, AROR, is the rate of occurrence per year of an attack that can be retaliated. • Single Loss Exposure, SLER, is the cost of a single attack that can retaliated: • Annualized Loss Expectancy, ALER, is the cost per year of an attack that can be retaliated: • Return On Investment, ROIR, is the economic return of an enterprise's investment against an attack that can be retaliated: