Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.

Slides:



Advertisements
Similar presentations
Sachin Rawat Crypsis SDL Threat Modeling.
Advertisements

Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Risk Assessment What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling.
Bridging the gap between software developers and auditors.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Copyright © Microsoft Corp 2006 Introduction to Threat Modeling Michael Howard, CISSP Senior Security Program Manager Security Engineering and Communication.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Threat Modeling for Hostile Client Systems Avni Rambhia.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
Firewall Implementation and Design Term: January 2005 Dana Epp COMP 4706.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Architecting secure software systems
1 Threat Modeling at Symantec OWASP WWW, Irvine, CA, January 28, 2011 Threat Modeling at Symantec Edward Bonver Principal Software Engineer, Symantec Product.
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Threat Modeling and Data Sensitivity Classification for Information Security Risk Analysis Secure Electronic Elections – Case Study Conference on Data.
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Hands-On Threat Modeling with Trike v1. Generating Threats.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Chapter 1 COMPUTER AND NETWORK SECURITY PRINCIPLES.
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
Module 11: Designing Security for Network Perimeters.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Practical Threat Modeling for Software Architects & System Developers
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Module 2: Designing Network Security
What is RISK?  requires vulnerability  likelihood of successful attack  amount of potential damage Two approaches:  threat modeling  OCTAVE Risk/Threat.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computers and Security by Calder Jones. What is Computer Security Computer Security is the protection of computing systems and the data that they store.
Chapter 1: Security Governance Through Principles and Policies
Module 7: Designing Security for Accounts and Services.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Presented by Mike Sues, Ethical Hack Specialist Threat Modeling.
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Threat Modeling: Employing the 5 Ws Security Series, December 13, 2013 Jeff Minelli Penn State ITS
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Threat Modeling for Cloud Computing
Threat Modeling - An Overview All Your Data is Mine
Training Arkansas Computing Teachers (TACT)
Evaluating Existing Systems
Threat modeling Aalto University, autumn 2013.
Evaluating Existing Systems
Off-line Risk Assessment of Cloud Service Provider
Lesson Title: Reader Architecture and Antenna Configurations
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Copyright Gupta Consulting, LLC.
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Engineering Secure Software
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008 by Dale R. Thompson

Terminology Threat – It is a potential event that causes damage. Threat modeling – It is a security analysis to determine the most important security risks to a system. The goal is to reduce the risk to an acceptable level by determining threats to mitigate and the steps to mitigate the identified threats. Vulnerability – It is a weakness in the system. Attack – This is when an attacker takes advantage of vulnerability. Asset – It is something of value and in threat modeling is called a threat target. Threat target – It is an asset. 2

Three components of security Assets Vulnerabilities Attackers 3

Assemble Team Design, sales, marketing, manufacturing, etc. Led by someone with security background 4

Threat Modeling Process Decompose the system – High-level context diagram – High-level physical view – List components Determine the threats to the system – Apply STRIDE – Create threat tree for each threat target Determine risk for each threat tree – Apply DREAD Rank threats by decreasing risk Mitigation – Choose whether to respond to threat – Choose technique to mitigate threat – Choose appropriate technologies 5

Threat Modeling a Robotic Dog System: Robotic dog that roams the house, can bark, avoid obstacles, investigates sound, walks, sees visible and infrared, and can be controlled over the Internet. 6

Data flow diagram 7

High-level context diagram 8

Next-level context diagram 9

High-level physical view 10

List components (threat targets = assets) User Web browser User computer Internet Network equipment Robotic dog Administrator 11

STRIDE* threat categories Spoofing identity Tampering with data Repudiation Information disclosure Denial of service Elevation of privilege 12 *M. Howard and D. LeBlanc, Writing Secure Code 2nd ed., Redmond, Washington: Microsoft Press, 2003.

Apply STRIDE Threat Model to Robotic Dog STRIDE CategoryThreat target(s) Spoofing identityUser, admin Tampering with dataInternet, wireless network RepudiationAdmin, User Information disclosureInternet, wireless, dog Denial of serviceInternet, wireless, dog, browser Elevation of privilegeUser, Admin 13

Threat Tree 14

Assign Risk with DREAD* Damage potential (1-10) – Measure of damage Reproducibility (1-10) – Measure of how easy it is to work Exploitability (1-10) – Measure of effort and expertise required Affected Users (1-10) – Measure of percentage of affected users Discoverability (1-10) – Measure of how easy it is to find R DREAD = average score 15 *M. Howard and D. LeBlanc, Writing Secure Code 2nd ed., Redmond, Washington: Microsoft Press, 2003.

Rank threats by decreasing risk 16

Mitigation Choose whether to respond to threat Choose technique to mitigate threat Choose appropriate technologies 17

Mitigation Techniques CategoryTechniques Spoofing identityAppropriate authentication Protect secrets Don’t store secrets Tampering with dataAppropriate authentication Hashes Message authentication codes Digital signatures Tamper-resistant protocols RepudiationDigital signatures Timestamps Audit trails Information disclosureAuthorization Privacy-enhanced protocols Encryption Protect secrets Don’t store secrets Denial of serviceAppropriate authentication Appropriate authorization Filtering Throttling Quality of Service Elevation of privilegeRun with least privilege

Choose appropriate technologies DES, AES, XOR? 19

Threat Modeling Process Decompose the system – High-level context diagram – High-level physical view – List components Determine the threats to the system – Apply STRIDE – Create threat tree for each threat target Determine risk for each threat tree – Apply DREAD Rank threats by decreasing risk Mitigation – Choose whether to respond to threat – Choose technique to mitigate threat – Choose appropriate technologies 20

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 22