STRIDE – Part 2/3

Keeping in mind that the occurred threats on the system might attest the different areas of your system. The table below shows what area might be affected when an attack occurs.

screen-shot-2017-03-06-at-12-34-54-pm

Prioritisation is a process of rating the actions with the highest priority or determine first things first. STRIDE can be prioritised as the following:

  • Chance of an attack occurring:
    • 1 – high.
    • 10 – low.
  • What’s the cost or damage if attack occurs:
    • 1 – little.
    • 10 – massive.
  • Risk:
    • the caused damage that might occur / the chance of the attack occurring.
Advertisements

Risk Management

Risk is a situation that involves exposure to danger, where it might cause a potential harm. Risk management is a process of a quick respond and controlled to the risks in order to minimise their threats. In another word, risk management involves understanding, analysing and addressing risk to make sure organisations fulfil and achieve their objectives. Meanwhile, risk assessment is the methodical process of evaluating the risks’ prospective that might involve in the project activities.

Risks occur frequently in the world of computer security. Thus, it is important to keep your system up to date and to know everything happens in and around your system. The term risk assessment in computer security is a process of implementing techniques to mitigate the risks. A simple example, is how to implement security techniques to your house to mitigate risks in the future or to make sure thief cannot come inside your house and steel you. Let’s take a real-life example and try to find some of the vulnerabilities in which it might cause threats.

vulnerable-house

 

The figure above shows an example of a normal house, which might be vulnerable to many threats via thieves. Due to the absence of security, the thief can penetrate the house and steal valuable things such as, jewelleries, money, TVs, PCs, accessories and many more. Therefore, it is important to implement risk assessments and risk managements to mitigate these threats as much as possible.

 

Risk assessment is the process of introducing and finding the vulnerabilities within the system that might cause threats or allow the attacker to gain access to the system. Below are some of the vulnerabilities that might be exploited from the figure above:

  1. The windows might be used to penetrate the house.
  2. The door can be used/ broken to penetrate the house.
  3. There is no security camera to record video of any suspicious activities.
  4. And many more.

 

Risk management is the taken steps to manage and control the system by implementing different techniques to avoid the threats from being occurred. Below are some techniques than can be introduced to the house to mitigate the threats or the attacker from exploiting these vulnerabilities.

  1. Implement fence around the windows (bulletproof).
  2. Add a fence around the house.
  3. Have a dog outside the house for more security.
  4. Install recorded cameras to monitor and control the area around the house.
  5. Patrolling the area around the house.

The figure below for more details about the implemented security techniques:

secure-house

 

Remember: you cannot build secure systems unless you know the threats to which you are susceptible.

Ethical Hacking Glossary

Some terms that you must encounters in pentesting:

  • Hack Value: This term describes the target that may attract the attacker. Due to the value of this target, it is considered to be very attractive to the attacker because of what it may contain.
  • Target of Evaluation (TOE): Is a system or resource that is being evaluated for vulnerabilities. Usually, TOE would be specified in a contract with the client.
  • Attack: The act of targeting and attacking the other side (value).
  • Exploit: To breach the security of a system.
  • Zero Day: This describes the threat or vulnerability, which is unknown to the developers and has not been addressed yet.
  • Threat: A potential violation of security in a system.
  • Vulnerability: Considered to be a weakness on the system that can be exploit to attack and enter the system (as an entry point into an environment).
  • Daisy Chaining: This is the act of performing several hacking attacks in sequence with each acting/building on the result of the previous action.