Threat analysis-perception
-
Upload
zaffar-abbasi -
Category
News & Politics
-
view
1.361 -
download
0
Transcript of Threat analysis-perception
![Page 1: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/1.jpg)
Threat Analysis
Lunar Security Services
![Page 2: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/2.jpg)
2
Overview
• Definitions• Representation• Challenges• “The Unthinkable”• Strategies & Recommendations
![Page 3: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/3.jpg)
3
Background
• What is threat analysis?– Potential Attacks/Threats/Risks– Analysis– Countermeasures– Future Preparations
• NIST’s “Introduction to Threat Analysis Workshop”, October 2005
![Page 4: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/4.jpg)
4
Stakes• People– Voters– Candidates– Poll Workers– Political Groups– Developers– Board of Elections– Attackers– More...
• Voting: A System of...– IT– American Politics– Duty– Trust– Inclusion– Safety– Process– Precedence...if it
works
![Page 5: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/5.jpg)
5
Means of Representation
General tactic:– Identify possible attackers– Identify goals of attacker– Enumerate possible ways to achieve goals– Locate key system vulnerabilities– Create resolution plan
![Page 6: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/6.jpg)
6
• Bruce Sheneier, Dr. Dobb’s Journal, 1999:– Used to “model threats against computer
systems”
• Continual breaking down of goals and means to achieve them
Attack Tree
Simple Example
Cost propagation
Multiple Costs
![Page 7: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/7.jpg)
7
Attack Tree Evaluation• Creation
– Refining over time– Realistic costs
• Advantages– Identifies key security issues– Documenting plans of attack
and likelihood– Knowing the system
• Disadvantages– Amount of documentation– Can only ameliorate
foreseen circumstances– Difficult to prioritize/quantize
factorsShortened version of an Attack
Tree for the interception of a message send with a PGP
header.
![Page 8: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/8.jpg)
8
Other Means of Representation
• Threat Catalog – Doug Jones– Attacks -> vulnerabilities -> analysis of defense– Challenges
• Organization• Technology• Identity• Scale of Attack
• Fault Tree Analysis– Ensures product performance from software– Attempts to avoid single-point, catastrophic
failures
![Page 9: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/9.jpg)
9
Challenges• Vulnerabilities– System– Process
• Variety of possible attacks• New Field: Systems Engineering• Attack Detection• Attack Resolution
-> too many dimensions to predict all possibilities, but we’ll try to name a few…
![Page 10: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/10.jpg)
10
“The Unthinkable”, Part 1
1. Chain Voting2. Votes On A Roll 3. The Disoriented Optical Scanner4. When A Number 2 Pencil Is Not
Enough5. ...we found these poll workers where?
![Page 11: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/11.jpg)
11
“The Unthinkable”, Part 2
6. This DRE “fell off the delivery truck”...
7. The Disoriented Touch Screen8. The Confusing Ballot (Florida 2000
Election)9. Third Party “Whoopsies”10.X-ray vision through walls of precinct
![Page 12: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/12.jpg)
Natalie Podrazik – [email protected] 12
“The Unthinkable”, Part 3
11.“Oops” code12.Do secure wireless connections
exist?13.I’d rather not have your help,
thanks...14.Trojan Horse15.Replaceable firmware on Optical
Scanners
![Page 13: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/13.jpg)
Natalie Podrazik – [email protected] 13
“The Unthinkable”, Part 4
16.Unfinished vote = free vote for somebody else
17.“I think I know what they meant by...”
18.Group Conspiracy: “These machines are broken.”
19.“That’s weird. It’s a typo.”20.Denial of Service Attack
![Page 14: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/14.jpg)
Natalie Podrazik – [email protected] 14
My Ideas...
• Write-in bomb threat, terrorist attack, backdoor code
• Swapping of candidate boxes (developers) at last minute on touch-DRE; voters don’t know the difference
• Children in the voting booth
![Page 15: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/15.jpg)
15
Strategies & Recommendations
• Create Fault Trees to counter Attack Tree goals using the components set forth in Brennan Study
• Tamper Tape• Use of “independent
expert security team”– Inspection– Assessment– Full Access
• Use of “Red Team Exercises” on:– Hardware design– Hardware/Firmware
configuration– Software Design– Software Configuration– Voting Procedures (not
hardware or software, but people and process)
![Page 16: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/16.jpg)
16
Conclusions
• Attack Trees– Identify agents, scenarios, resources,
system-wide flaws• Challenges: dimensions in system
analysis• Unforeseen circumstances• Independent Team of Experts, but how
expert can they be?
![Page 17: Threat analysis-perception](https://reader036.fdocuments.in/reader036/viewer/2022082907/58ecb8a21a28abf52e8b4613/html5/thumbnails/17.jpg)
17
Works Cited1. All 20 “The Unthinkable” scenarios available at:
http://www.vote.nist.gov/threats/papers.htm2. Goldbrick Gallery’s 25 Best Editorial Cartoons of 2004. Online:
http://www.goldbrickgallery.com/bestof2004_2.html 3. Jones, Doug. “Threat Taxonomy Overview” slides, from the NIST
Threats to Voting Workshop, 7 October 2005. Online: http://www.vote.nist.gov/threats/Jonesthreattalk.pdf
4. Mell, Peter. “Handling IT System Threat Information” slides, from the NIST Threats to Voting Workshop, 7 October 2005. Online: http://www.vote.nist.gov/threats/mellthreat.pdf
5. “Recommendations of the Brennan Center for Justice and the Leadership Conference on Civil Rights for Improving Reliability of Direct Recording Electronic Voting Systems”: http://www.brennancenter.org/programs/downloads/voting_systems_final_recommendations.pdf:
6. Wack, John, and Skall, Mark. “Introduction to Threat Analysis Workshop” slides, from the NIST Threats to Voting Workshop, 7 October 2005. Online: http://www.vote.nist.gov/threats/wackthreat.pdf
7. Wikipedia Entry for fault tree: http://en.wikipedia.org/wiki/Fault_tree