mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 23:04:05 -06:00
vault backup: 2022-09-14 21:04:35
This commit is contained in:
parent
1c76458ae5
commit
4d11e44c1c
@ -18,4 +18,56 @@ intrustion detection, system monitoring, penetration testing
|
|||||||
- security specialists more interesting in analysis
|
- security specialists more interesting in analysis
|
||||||
|
|
||||||
## Terminology
|
## Terminology
|
||||||
-
|
- hacker
|
||||||
|
- was originially positive - enthusism etc
|
||||||
|
- became negative through public media (wargames 1983, Hackers 1984)
|
||||||
|
- cracking can mean bad hacking
|
||||||
|
- white hat - good
|
||||||
|
- black hat - bad
|
||||||
|
- others:
|
||||||
|
- grey hat - may violate laws to discover vulnerabilites for good reasons
|
||||||
|
- script kiddie - uses ready made exploits
|
||||||
|
- hacktivist - hacks for political/social causes (e.g., Anonymous "Anon")
|
||||||
|
- cyberwarfare
|
||||||
|
|
||||||
|
## People
|
||||||
|
- kevin mitnick
|
||||||
|
- robert tappan morris
|
||||||
|
- morris worm (to measure size of internet)
|
||||||
|
- dan kaminsky
|
||||||
|
- wietse venema
|
||||||
|
|
||||||
|
## Risk assessment
|
||||||
|
evaluate potential risks so you an safegurad against them
|
||||||
|
- consider pobability and severity
|
||||||
|
- e.g., risk matrix
|
||||||
|
- SEP (Severity, Exposure, Probability) model
|
||||||
|
- account to cost of safeguarding
|
||||||
|
- remember complex attacks may be difficult to carry out
|
||||||
|
- limitations
|
||||||
|
- probabilites and severity are estimatse
|
||||||
|
- limitations of qualitative assessment
|
||||||
|
- subjectivity
|
||||||
|
|
||||||
|
### Attack surface
|
||||||
|
describe not how vulnerable you are but what vulnerabilites you have
|
||||||
|
- refers to all potential vulnerabilities
|
||||||
|
- includes social engineering etc
|
||||||
|
- more components of system = greater attack surface
|
||||||
|
- more widely available = greater attack surface
|
||||||
|
- principle of leasts privilege
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### SEP model
|
||||||
|
- takes into account severity exposure (attcak opporunities), and probability using weighted scores
|
||||||
|
- severity 1-5 — potential consequences
|
||||||
|
- exposure 1-4 — frequency or duration of opportunity for attack to occur
|
||||||
|
- probability 1-5 — likelihood of consequences given exposure instance.
|
||||||
|
- overall risk is S x E x P
|
||||||
|
|
||||||
|
Once score is calculated, the course of action can be determined using the following table.
|
||||||
|

|
||||||
|
|
||||||
|
### Security through obscurity
|
||||||
|
an optimistic/idealist approach. Better to think of STO as a
|
||||||
Loading…
Reference in New Issue
Block a user