threat modeling part 3 - dread

14
Threat Modeling Part 3 - DREAD Brad Andrews, CISSP, CSSLP North Texas Cyber Security Conference 2015

Upload: north-texas-chapter-of-the-issa

Post on 07-Aug-2015

373 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Threat Modeling Part 3 - DREAD

Threat ModelingPart 3 - DREAD

Brad Andrews, CISSP, CSSLPNorth Texas Cyber Security Conference

2015

Page 2: Threat Modeling Part 3 - DREAD

Long time in the tech field Wide range of jobs – Defense, Online,

Banking, Airlines, Doc-Com, Medical, etc. 20+ Years software development

experience 10+ in Information Security M.S. and B.S. in Computer Science from the

University of Illinois Active Certifications – CISSP, CSSLP, CISM

Who Am I?

Page 3: Threat Modeling Part 3 - DREAD

Work for one of the largest providers of pharmacy software and services in the country

Serve as Lead Faculty-Area Chair and for Information Systems Security for the University of Phoenix Online Campus

Carry out independent reading and research for my own company, RBA Communications

My Work

Page 4: Threat Modeling Part 3 - DREAD

The views and opinions expressed in this session are mine and mine alone. They do

not necessarily represent the opinions of my employers or anyone associated with

anything!

My Opinions and Ideas Alone

Page 5: Threat Modeling Part 3 - DREAD

Part 1 – Threat Modeling Overview Part 2 – Applying STRIDE to a System Part 3 – Applying DREAD to a System

Sessions Today

Page 6: Threat Modeling Part 3 - DREAD

A way to evaluate and rank risks

Evaluate each risk / threat for:

Damage

Reproducibility

Exploitability

Affected Users

DiscoverabilityDetails from

https://www.owasp.org/index.php/Threat_Risk_Modeling

What is DREAD?

Page 7: Threat Modeling Part 3 - DREAD

How much damage if it happens?

0 – None,5 - Individual User Data,

10 – Complete System Destruction

Damage (Impact)

Page 8: Threat Modeling Part 3 - DREAD

How easy is it to reproduce?

0 – Almost Impossible,5 – One or Two Steps / Authorized User,

10 – Web Browser and Address – No Auth

Reproducibility (Probability)

Page 9: Threat Modeling Part 3 - DREAD

What is need to exploit the threat?

0 – Advanced Knowledge and Skills,5 – Malware Exists on Internet or Easy Exploit

10 – Only a Web Browser

Exploitability (Probability)

Page 10: Threat Modeling Part 3 - DREAD

How many users will be impacted?

0 – None,5 – Some Users, But Not All

10 – All Users

Affected Users (Impact)

Page 11: Threat Modeling Part 3 - DREAD

How easy to discover?

0 – Advanced Knowledge and Skills,5 – Easy to Guess or Find by Monitoring,

9 – Details of Fault Public10 – Details in URL

Discoverability (Probability)

Page 12: Threat Modeling Part 3 - DREAD

Be Involved Don’t Monopolize Work Together

Interactive Time

Page 13: Threat Modeling Part 3 - DREAD

Pick values for the risks from the previous sessions

Walk Through Previous Risks

Page 14: Threat Modeling Part 3 - DREAD

Questions?