官术网_书友最值得收藏!

Step 6 – rate the threats

Evaluating the likelihood and impact of each of the previous threats allows for selecting appropriate types and levels of control (and their related costs) to mitigate each. Threats with higher risk ratings may require larger amounts of investment to mitigate. Conventional threat-rating methodologies can be used at this step, including Microsoft's DREAD approach.

The DREAD model asks basic questions for each level of risk and then assigns a score (1 to 10) for each type of risk that emerges from a particular threat:

  • Damage: This is the amount of damage incurred by a successful attack
  • Reproducibility: What level of difficulty is involved in reproducing the attack?
  • Exploitability: Can the attack be easily exploited by others?
  • Affected users: What percentage of a user/stakeholder population would be affected given a successful attack?
  • Discoverability: Can the attack be discovered easily by an attacker?

An example of a threat rating for our smart parking system is provided in the following table:

Security architects who are responsible for designing the security controls for an IoT system should continue with this exercise until all threats have been rated. Once complete, the next step is to perform a comparison of each against the others based on each one's threat rating (overall score). This will help prioritize the mitigations within the security architecture.

主站蜘蛛池模板: 醴陵市| 腾冲县| 方正县| 莱芜市| 类乌齐县| 上杭县| 甘肃省| 太白县| 贺兰县| 乌兰县| 逊克县| 湘潭县| 姚安县| 尚义县| 金华市| 金溪县| 黔西县| 龙川县| 济阳县| 南通市| 句容市| 台中县| 安塞县| 孟州市| 宿州市| 永靖县| 华宁县| 江源县| 渭源县| 枝江市| 寿阳县| 鸡泽县| 乐业县| 洪洞县| 南充市| 丰原市| 金山区| 南安市| 华阴市| 汉中市| 长白|