SlideShare a Scribd company logo
1 of 24
www.cyberoam.com
Presenter:
Ravindra Krishna
Manager - Pre Sales
Threat Modeling
www.cyberoam.com
Our Products
Network Security Appliances - UTM, NGFW (Hardware
& Virtual)
Modem Router Integrated Security
appliance
www.cyberoam.com
www.cyberoam.com
Average number of security incidents keep on growing
www.cyberoam.com
Estimated likely sources of incidents
www.cyberoam.com
Safeguards not in place but a top priority over the next year
www.cyberoam.com
Average cost per security incident
www.cyberoam.com
Average cost per security incident
Overall, the costs and complexity of responding to
incidents are increasing”. “This includes the cost to
investigate; the cost to understand business risks and
contain incidents; the cost to manage notification to
regulators, customers, and consumers; and the cost
of litigation. Also, the cost of remediation is rising
because more records across more jurisdictions are
being impacted, and security controls have not kept
pace with the ever-changing threat landscape.”
www.cyberoam.com
There’s more to reveal…
CIOs, IT managers unable to track advanced evasion
techniques - The Security Industry’s Dirty Little Secret
There are 800 million known advanced evasion
techniques (AETs) but most security managers don’t
have the methods to track AETs within their company
www.cyberoam.com
Here’s the paradox…
But are they spending wisely on security?
www.cyberoam.com
Cost of reacting
of machines will need to be patched
manually at a cost of $50/machine10%
- Marc Donner, executive director, Morgan Stanley
$50 * 500
=
$25,000
(5000-node network)
 Redesigning and implementing
new security solution help little
 Reactive way is not solution
 Not Smarter Spent
www.cyberoam.com
 Threat can be anything i.e. human, event, weather, error, and failures that
have the potential to cause an impact or harm to an asset.
 Directly compromises CIA traid
Threat
www.cyberoam.com
www.cyberoam.com
Threat Model
Understanding
Attack Surface
Threats who can attack
Assets Threats may compromise
1
Estimate
Probability of Attack
Impact of successful attack
2
www.cyberoam.com
Cyberoam Threat Modeling- The process
 Identify and document critical assets in your
infrastructure
 Identify and document each component in the
system
 Identify and document possible points of attack
 Identify and document threats that pertain each
possible attack point
 Identify and document the category and priority
of the attack
 Identify and document the Mitigation solutions
 Monitor the security controls
 Re-evaluate security Controls
www.cyberoam.com
Manufacturing Unit
Manufacturing Data services
ICS
Internet facing Web-servers/Email/AV
Internal Servers
www.cyberoam.com
Identify and document critical assets in your infrastructure
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI
Supervisory
control
system
Database/
Backup
Authorized to access
ICS/SCADA
IP-based access
Unauthorized
user
Unscheduled time to access
SCADA system
www.cyberoam.com
Identify and document possible points of attack
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI
Supervisory
control
system
Database/
Backup
Exploitation of
Service vulnerability
Exploitation
of RTU
vulnerability
Service-level exploits.
E.g. web attacks, FTP
attacks, Telnet or SSH
attacks
www.cyberoam.com
Identify and document threats that pertain each possible attack point
Malware over email to employees
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI
Supervisory
control
system
Database/
Backup
www.cyberoam.com
Identify and document threats that pertain each possible attack point
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI
Supervisory
control
system
Database/
Backup
Lure employees to visit an
infected website or app
www.cyberoam.com
Identify and document threats that pertain each possible attack point
Waterhole attacks
- Bad guys poison a website frequented by employee and/or company
- Hacker maliciously modifies the website code or some desired object on the website is poisoned
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI
Supervisory
control
system
Database/
Backup
www.cyberoam.com
Identify and document the category and priority of the attack
Temperature level
Pressure level
Oil level
Maintenance alarm
Radioactivity level
Pump /Fan speed
Remote
Terminal
Unit
Remote
Terminal
Unit
HMI Supervisory
control system
Database
/Backup
HMI
ClientBusiness Systems,
Web/Email server
Data between Server and the ICS Systems
Threat Description Eavesdropping Data during Transit
Threat Target Damage critical infrastructure
Risk High
Attack Technique Command Change
Counter Measure Strong IPS
www.cyberoam.com
Priority of the attack - DREAD MODEL
Damage Potential
Reproducibility
Exploitability
Affected Users
Discoverability
Medium = 2
Leaking sensitive information
The attack can be reproduced, but only with a
timing window and a particular race situation.
A skilled programmer could make the attack,
then repeat the steps.
Some users, non-default configuration
The vulnerability is in a seldom-used part of
the product, and only a few users should come
across it. It would take some thinking to see
malicious use.
Low = 1
Leaking trivial information
The attack is very difficult to reproduce,
even with knowledge of the security
hole.
The attack requires an extremely skilled
person and in-depth knowledge every
time to exploit.
Very small percentage of users, obscure
feature; affects anonymous users
The bug is obscure, and it is unlikely
that users will work out damage
potential.
High = 3
The attacker can subvert the security system;
get full trust authorization; run as
administrator; upload content.
The attack can be reproduced every time and
does not require a timing window.
A novice programmer could make the attack in
a short time.
All users, default configuration, key customers
Published information explains the attack. The
vulnerability is found in the most commonly
used feature and is very noticeable.
Threat: Eavesdropping Data during Transit
Damage Potential Reproducibility Exploitability Affected Users Discoverability Total RISK
3 3 3 3 3 15
www.cyberoam.com
Monitor and Re-evaluate security Controls
 Due Care and Due Diligence
 Compliance
 Better and Smarter spent of IT budget
 Pro-active Solution
 Systematic defense, build on thorough Threat Modeling
methodology, is your best protection
 There is still no silver bullet!
www.cyberoam.com
Thank you
Contact: sales@cyberoam.com
Link:
http://demo.cyberoam.com
Credentials:
guest /guest
Get a 30 day FREE Evaluation of
Cyberoam Virtual appliance

More Related Content

What's hot

festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2016
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
 

What's hot (20)

7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
Threat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star WarsThreat Modeling Lessons From Star Wars
Threat Modeling Lessons From Star Wars
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Introduction to threat_modeling
Introduction to threat_modelingIntroduction to threat_modeling
Introduction to threat_modeling
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
Developing a Threat Modeling Mindset
Developing a Threat Modeling MindsetDeveloping a Threat Modeling Mindset
Developing a Threat Modeling Mindset
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan MarcilOWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
OWASP Québec: Threat Modeling Toolkit - Jonathan Marcil
 
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent AdversariesUsing Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 
5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)5 things i wish i knew about sast (DSO-LG July 2021)
5 things i wish i knew about sast (DSO-LG July 2021)
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 

Similar to Threat Modeling

Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
amiable_indian
 

Similar to Threat Modeling (20)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...The hacker playbook: How to think and act like a cybercriminal to reduce risk...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
 
Ceh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hackingCeh v5 module 01 introduction to ethical hacking
Ceh v5 module 01 introduction to ethical hacking
 
It security
It securityIt security
It security
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
CC 2-1 Incident response.pdf
CC 2-1 Incident response.pdfCC 2-1 Incident response.pdf
CC 2-1 Incident response.pdf
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Essentials Of Security
Essentials Of SecurityEssentials Of Security
Essentials Of Security
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Threat Modeling

  • 1. www.cyberoam.com Presenter: Ravindra Krishna Manager - Pre Sales Threat Modeling www.cyberoam.com Our Products Network Security Appliances - UTM, NGFW (Hardware & Virtual) Modem Router Integrated Security appliance
  • 3. www.cyberoam.com Average number of security incidents keep on growing
  • 5. www.cyberoam.com Safeguards not in place but a top priority over the next year
  • 7. www.cyberoam.com Average cost per security incident Overall, the costs and complexity of responding to incidents are increasing”. “This includes the cost to investigate; the cost to understand business risks and contain incidents; the cost to manage notification to regulators, customers, and consumers; and the cost of litigation. Also, the cost of remediation is rising because more records across more jurisdictions are being impacted, and security controls have not kept pace with the ever-changing threat landscape.”
  • 8. www.cyberoam.com There’s more to reveal… CIOs, IT managers unable to track advanced evasion techniques - The Security Industry’s Dirty Little Secret There are 800 million known advanced evasion techniques (AETs) but most security managers don’t have the methods to track AETs within their company
  • 9. www.cyberoam.com Here’s the paradox… But are they spending wisely on security?
  • 10. www.cyberoam.com Cost of reacting of machines will need to be patched manually at a cost of $50/machine10% - Marc Donner, executive director, Morgan Stanley $50 * 500 = $25,000 (5000-node network)  Redesigning and implementing new security solution help little  Reactive way is not solution  Not Smarter Spent
  • 11. www.cyberoam.com  Threat can be anything i.e. human, event, weather, error, and failures that have the potential to cause an impact or harm to an asset.  Directly compromises CIA traid Threat
  • 13. www.cyberoam.com Threat Model Understanding Attack Surface Threats who can attack Assets Threats may compromise 1 Estimate Probability of Attack Impact of successful attack 2
  • 14. www.cyberoam.com Cyberoam Threat Modeling- The process  Identify and document critical assets in your infrastructure  Identify and document each component in the system  Identify and document possible points of attack  Identify and document threats that pertain each possible attack point  Identify and document the category and priority of the attack  Identify and document the Mitigation solutions  Monitor the security controls  Re-evaluate security Controls
  • 15. www.cyberoam.com Manufacturing Unit Manufacturing Data services ICS Internet facing Web-servers/Email/AV Internal Servers
  • 16. www.cyberoam.com Identify and document critical assets in your infrastructure Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database/ Backup Authorized to access ICS/SCADA IP-based access Unauthorized user Unscheduled time to access SCADA system
  • 17. www.cyberoam.com Identify and document possible points of attack Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database/ Backup Exploitation of Service vulnerability Exploitation of RTU vulnerability Service-level exploits. E.g. web attacks, FTP attacks, Telnet or SSH attacks
  • 18. www.cyberoam.com Identify and document threats that pertain each possible attack point Malware over email to employees Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database/ Backup
  • 19. www.cyberoam.com Identify and document threats that pertain each possible attack point Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database/ Backup Lure employees to visit an infected website or app
  • 20. www.cyberoam.com Identify and document threats that pertain each possible attack point Waterhole attacks - Bad guys poison a website frequented by employee and/or company - Hacker maliciously modifies the website code or some desired object on the website is poisoned Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database/ Backup
  • 21. www.cyberoam.com Identify and document the category and priority of the attack Temperature level Pressure level Oil level Maintenance alarm Radioactivity level Pump /Fan speed Remote Terminal Unit Remote Terminal Unit HMI Supervisory control system Database /Backup HMI ClientBusiness Systems, Web/Email server Data between Server and the ICS Systems Threat Description Eavesdropping Data during Transit Threat Target Damage critical infrastructure Risk High Attack Technique Command Change Counter Measure Strong IPS
  • 22. www.cyberoam.com Priority of the attack - DREAD MODEL Damage Potential Reproducibility Exploitability Affected Users Discoverability Medium = 2 Leaking sensitive information The attack can be reproduced, but only with a timing window and a particular race situation. A skilled programmer could make the attack, then repeat the steps. Some users, non-default configuration The vulnerability is in a seldom-used part of the product, and only a few users should come across it. It would take some thinking to see malicious use. Low = 1 Leaking trivial information The attack is very difficult to reproduce, even with knowledge of the security hole. The attack requires an extremely skilled person and in-depth knowledge every time to exploit. Very small percentage of users, obscure feature; affects anonymous users The bug is obscure, and it is unlikely that users will work out damage potential. High = 3 The attacker can subvert the security system; get full trust authorization; run as administrator; upload content. The attack can be reproduced every time and does not require a timing window. A novice programmer could make the attack in a short time. All users, default configuration, key customers Published information explains the attack. The vulnerability is found in the most commonly used feature and is very noticeable. Threat: Eavesdropping Data during Transit Damage Potential Reproducibility Exploitability Affected Users Discoverability Total RISK 3 3 3 3 3 15
  • 23. www.cyberoam.com Monitor and Re-evaluate security Controls  Due Care and Due Diligence  Compliance  Better and Smarter spent of IT budget  Pro-active Solution  Systematic defense, build on thorough Threat Modeling methodology, is your best protection  There is still no silver bullet!
  • 24. www.cyberoam.com Thank you Contact: sales@cyberoam.com Link: http://demo.cyberoam.com Credentials: guest /guest Get a 30 day FREE Evaluation of Cyberoam Virtual appliance

Editor's Notes

  1. As stems from the findings, while the number of security incidents have grown, the ambiguity in dealing with these incidents has also grown. We can see a growing percentage of respondents admitting to lack. of awareness.
  2. Now this one’s a real eye-opener. As stems from the chart, many security executives and IT decision makers continue to believe that security threats from insider sources is JUST as high as from outsiders like hackers and cyber criminals. This underlines the fact that many CIOs still fail to trust their own decisions and security deployments and lack confidence in existing security measures.
  3. As stems from the findings, while the number of security incidents have grown, the ambiguity in dealing with these incidents has also grown. We can see a growing percentage of respondents admitting to lack of awareness.
  4. As emerges from the chart, security executives at different positions, from those with very mature security practices to those coping at a relatively nascent level, all of them indicate at rising cost in dealing with security incident…
  5. As one leading ICT analyst observes, present situation in enterprise security clearly showcases the compounding costs of loss due to spiraling cost in mitigating security threats.
  6. While many organizations seem to be ready to increase their IT spend on security, a question still remains. Are they spending ig bucks on security wisely? The answer can be seen from this. This clearly reveals that despite growing security deployments, number of security incidents also continue to grow and degree of compromise is significant. This is because there’s a lack of proactive approach. Enterprises fail to see how they need to defend different areas of their network and IT ecosystem. It takes a combination of the right security technologies and how they are deployed at various points throughout the enterprise network.
  7. Identify potential threats and the conditions that must exist for an attack to be successful 2. Provide information about how existing safeguards affect required attack conditions 3. Provide information about which attack condition and vulnerability remediation activities add the most value 4. Help you understand which conditions or vulnerabilities, when eliminated mitigated, affect multiple threats; this optimizes your security investment Smart investment