- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 221字
- 2021-06-10 18:42:33
Step 6 – rate the threats
Evaluating the likelihood and impact of each of the previous threats allows for selecting appropriate types and levels of control (and their related costs) to mitigate each. Threats with higher risk ratings may require larger amounts of investment to mitigate. Conventional threat-rating methodologies can be used at this step, including Microsoft's DREAD approach.
The DREAD model asks basic questions for each level of risk and then assigns a score (1 to 10) for each type of risk that emerges from a particular threat:
- Damage: This is the amount of damage incurred by a successful attack
- Reproducibility: What level of difficulty is involved in reproducing the attack?
- Exploitability: Can the attack be easily exploited by others?
- Affected users: What percentage of a user/stakeholder population would be affected given a successful attack?
- Discoverability: Can the attack be discovered easily by an attacker?
An example of a threat rating for our smart parking system is provided in the following table:

Security architects who are responsible for designing the security controls for an IoT system should continue with this exercise until all threats have been rated. Once complete, the next step is to perform a comparison of each against the others based on each one's threat rating (overall score). This will help prioritize the mitigations within the security architecture.
- Metasploit Penetration Testing Cookbook(Third Edition)
- 數(shù)字安全藍皮書:本質(zhì)屬性與重要特征
- 軟件開發(fā)安全之道:概念、設計與實施
- Kali Linux Network Scanning Cookbook(Second Edition)
- Learning Devise for Rails
- 局域網(wǎng)交換機安全
- 物聯(lián)網(wǎng)安全滲透測試技術
- INSTANT Apple Configurator How-to
- 網(wǎng)絡關鍵設備安全檢測實施指南
- 黑客攻防實戰(zhàn)從入門到精通
- Mastering Python for Networking and Security
- 信息內(nèi)容安全管理及應用
- Web代碼安全漏洞深度剖析
- 5G網(wǎng)絡安全規(guī)劃與實踐
- 網(wǎng)絡對抗的前世今生