Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 5 Threat risk modeling. Risk Management Cycle.

Similar presentations


Presentation on theme: "Lecture 5 Threat risk modeling. Risk Management Cycle."— Presentation transcript:

1 Lecture 5 Threat risk modeling

2 Risk Management Cycle

3 CRAMM

4 RuSecure

5

6

7 British Standard

8 Hierarchical Criteria Model

9 Performing threat risk modeling using the Microsoft Threat Modeling Process

10 Trike Trike is a threat modeling framework with similarities to the Microsoft threat modeling processes. Trike differs because it uses a risk based approach with distinct implementation, threat, and risk models, instead of using the STRIDE/DREAD aggregated threat model (attacks, threats, and weaknesses). Trike’s goals are: With assistance from the system stakeholders, to ensure that the risk this system entails to each asset is acceptable to all stakeholders. Be able to tell whether we have done this. Communicate what we’ve done and its effects to the stakeholders. Empower stakeholders to understand and reduce the risks to them and other stakeholders implied by their actions within their domains.

11 The approach have three layers for the security model as is presented in the following picture. Not all the security models use the layered approach. The model is particularized depending of the magnitude of the organization that will implement it –For corporate level –For small and medium business Both of the models support the layered approach

12 References William Stallings, Cryptography and Network Security, Fourth Edition, 2005, Prentice Hall Mirkovic, J., and Relher, P. "A Taxonomy of DDoS Attack and DDoS Defense Mechanisms." ACM SIGCOMM Computer Communications Review, April NIST – Risk Management Guide for Information Technology Systems Jelena Mirkovic, ven Dietrich, David Dittrich, Peter Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall, Glossary-10/M/Malformed-packet-attack-8152/http://www.managementlink.com/index.php/help-and-information/business-glossaries/Network-Security- Glossary-10/M/Malformed-packet-attack-8152/ https://www.owasp.org

13 This is only a model…


Download ppt "Lecture 5 Threat risk modeling. Risk Management Cycle."

Similar presentations


Ads by Google