SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
Talk 
for 
the 
NATO 
Advanced 
Workshop 
on 
Preparedness 
for 
Nuclear 
and 
Radiological 
Threats 
Focusing on the Threats to the Detriment of the 
Vulnerabilities: A Vulnerability Assessor’s Perspective 
Roger 
G. 
Johnston, 
Ph.D., 
CPP 
Vulnerability 
Assessment 
Team 
Argonne 
Na=onal 
Laboratory 
630-­‐252-­‐6168 
rogerj@anl.gov 
hJp://www.ne.anl.gov/capabili=es/vat
This is a plea for more, earlier, better, 
and more imaginative vulnerability 
assessments for nuclear and 
radiological security/safeguards 
and emergency response.
Argonne Vulnerability Assessment Team 
The 
VAT 
has 
done 
vulnerability 
assessments 
on 
over 
1000 
different 
security 
and 
safeguards 
devices, 
systems, 
& 
programs. 
Sponsors 
• 
DOE 
• 
DoD 
• 
DOS 
• 
IAEA 
• 
NNSA 
• 
private 
companies 
• 
intelligence 
agencies 
• 
public 
interest 
organiza:ons
Argonne Vulnerability Assessment Team 
• biometrics 
• courier 
bags 
• GPS 
spoofing 
• access 
control 
• cargo 
security 
• reverse 
engineering 
• warehouse 
security 
• product 
tampering 
• product 
counterfei=ng 
• medical 
device 
security 
• consul=ng 
& 
training 
• physical 
security 
R&D 
• security 
guard 
turnover 
• insider 
threat 
mi=ga=on 
• security 
of 
sealed 
sources 
• security 
of 
drug 
test 
kits 
• human 
factors 
in 
security 
• vulnerability 
assessments 
• tamper/intrusion 
detec=on 
• RFID 
spoofing/counterfei=ng 
• tags 
& 
tamper-­‐indica=ng 
seals 
• microprocessor 
& 
wireless 
systems 
• elec=on 
& 
vo=ng 
machine 
security 
• countermeasures 
to 
security 
theater 
• countermeasures 
to 
perceptual 
blindness 
• nuclear 
safeguards 
& 
monitoring 
equipment 
• countermeasures 
to 
sleight-­‐of-­‐hand 
& 
misdirec=on
Definitions 
Threat: Who might attack, why, when, and how, 
and with what resources and probabilities. 
Threat Assessment (TA): Attempting to 
identify threats.
Definitions 
Vulnerability: A security weakness that can be 
exploited to cause undesirable consequences. 
Vulnerability Assessment (VA): Discovering and 
demonstrating ways to defeat a security device, 
system, or program. Often includes suggesting 
countermeasures and security improvements.
Things That Often 
Get Confused with Vulnerabilities 
² Assets 
² Threats 
² Attack Scenarios 
² Delay Paths 
² Features
Threats vs. Vulnerabilities 
Threat Assessments (TAs) are speculations about 
groups and people who may or may not exist, their 
goals, motivations, and resources. TAs are often 
reactive in nature, i.e., focused on past incidents. 
Vulnerabilities are right in front of you (if you will 
open your eyes and mind), and are often testable. 
VAs are typically proactive in nature. 
Oddly, however, TAs are usually 
much more reproducible than VAs!
Purpose 
The purpose of a VA is to: 
1. Improve security or 
emergency response. 
2. Serve as one of the inputs to overall 
Risk Management.
• list 
of 
assets 
to 
protect 
• asset 
valua=on/priori=za=on 
• overall 
security 
goals 
• consequences 
of 
successful 
aJack(s) 
• threat 
assessment 
• vulnerability 
assessment 
• available 
resources 
& 
possible 
security 
measures 
• general 
security 
philosophy/strategy 
• psychological 
tolerance 
for 
risk 
• various 
es=mated/guessed 
probabili=es 
• acceptable 
tradeoffs 
in 
produc=vity 
vs. 
security, 
reputa=on 
vs. 
security, 
morale 
vs. 
security, 
safety 
vs. 
security, 
and 
liberty/privacy 
vs. 
security 
Modern 
Risk 
Management 
• What 
INPUT 
PARAMETERS 
OUTPUT 
PARAMETERS: 
to 
protect 
• How 
to 
protect 
it 
• How 
à 
to 
deploy 
security 
resources 
op=mally 
DECISION 
MAKING 
PROCESS 
Value 
Judgments 
Objec=ve 
Analysis 
Subjec=ve 
Analysis 
Experience 
& 
Exper=se 
Intui=on 
& 
Hunches
Not the Purpose 
The purpose of a VA is not to: 
• “Validate” 
• Pass a test 
• Generate metrics 
• Justify the status quo 
• Praise or accuse anybody 
• Check against some standard 
• Claim there are no vulnerabilities 
• Engender warm & happy feelings 
• Test security or do performance testing 
• Rationalize the research & development 
• Apply a mindless, bureaucratic stamp of approval 
• Endorse a security product or program, or certify it as 
“good” or “ready for use”
Techniques Often Mistaken for VAs 
• security survey (walking around with a checklist) 
• security audit (are the rules being followed?) 
• feature analysis 
• threat assessment 
• Design Basis Threat 
• fault or event tree analysis (from safety engineering) 
• Delphi Method (method for getting a decision from a 
panel of experts)
Techniques Often Mistaken for VAs 
• vulnerability “modeling” 
• software assessment tools 
• 3D representations of the facility 
• CARVER Method (DoD & law enforcement) 
• performance testing 
• Risk Management 
• delay path analysis
Vulnerabilities Are the Threat Maxim: 
Security (and emergency response) typically fails not 
because the threats were misunderstood, but because the 
vulnerabilities were not recognized and/or not mitigated.
Vulnerabilities Trump Threats Maxim: 
If you understand your threats but are clueless about your 
vulnerabilities, you’re in trouble. One the other hand, if you 
understand your vulnerabilities and try to mitigate them, 
you might be ok, even if you get your threats wrong 
(which is quite possible).
Examples of Vulnerabilities Being the Problem 
• Hurricane 
Katrina, 
2005 
• Breach 
of 
the 
Y-­‐12 
nuclear 
facility 
by 
an 
82-­‐year-­‐old 
nun 
and 
two 
other 
protesters, 
2012 
• Target 
stores 
credit 
card 
hack, 
2013 
• White 
House 
fence 
jumper, 
2014
Michener’s Maxim: 
We are never prepared for what we expect.
Waylayered Security Maxim: 
Layered security will fail stupidly.
For 170 other security maxims: 
https://www.scribd.com/doc/46333208/Security-Maxims-October-2014
So why are threats more popular 
• There 
than vulnerabilities? 
are 
fewer 
threats 
than 
vulnerabili=es 
• TAs 
are 
reproducible 
& 
reac=ve 
• Formalis=c, 
objec=ve 
methods 
work 
fairly 
well 
for 
TAs 
• VAs 
require 
imagina=on, 
subjec=ve 
judgment, 
and 
“thinking 
like 
the 
bad 
guys” 
• No 
security 
or 
emergency 
response 
program 
claims 
zero 
threats, 
but 
there 
is 
strong 
cogni=ve 
dissonance 
about 
vulnerabili=es 
• Vulnerabili=es 
depend 
cri=cally 
on 
local 
details
Thinking Like the Bad Guys 
Bad Guys Don’t Do: 
TAs, DBT, security audits, etc. 
They do something closer to VAs. 
So if we are going to predict what they 
might do, we need to do creative VAs as 
well!
Creative Vulnerability Assessments! 
• Perform a mental coordinate transformation 
and pretend to be the bad guys (or VAers). 
(This is much harder than you might think.) 
• Be much more creative than the 
adversaries. They need only stumble upon 
1 vulnerability, the good guys have 
to worry about all of them.
Creative Vulnerability Assessments! 
• Don’t let the good guys & the existing 
security infrastructure and tactics define the 
problem. 
• Gleefully look for trouble, rather than 
seeking to reassure yourself that everything 
is fine.
We need to be more like these expert fault 
finders. They find problems because they 
want to find problems, and because they are 
skeptical: 
• bad guys 
• therapists 
• movie critics 
• computer hackers 
• scientific peer reviewers 
• mothers-in-law
Where Vulnerability! 
Ideas Come From! 
The Vulnerability Pyramid
Warning! 
“Fear of NORQ” is not a valid reason to try to 
force-fit formalistic methods onto VAs! 
The… 
Non-­‐Objec=ve 
Non-­‐Reproducible 
Non-­‐Quan=fiable 
NORQ 
All 
effec=ve 
security 
and 
risk 
management 
is 
ul=mately 
subjec=ve, 
no 
maJer 
how 
much 
we 
may 
wish 
to 
pretend 
it 
isn’t.
Emergency Response 
Two Kinds of Vulnerabilities: 
- flaws in the response 
- vulnerability to attacks on the response 
Are we properly prepared for attacks 
during emergency response, attacks by 
the original attackers or by a different 
set of attackers? 
(Wait & Pounce is a very 
effective attack strategy!)
Nuclear & Radiological Security Problems 
from a Vulnerability Assessor’s Perspective 
• Poor tags & seals, poor use protocols, poor 
tamper detection for monitoring and security devices 
• Confusing inventory functions with security functions: why 
GPS, RFIDs, MC&A programs often provide poor security 
• VAs not done, not done early, not done iteratively, not done 
well, not done by the right people 
• VA myths & blunders 
• Poor or not-existent Chain of Custody for procured 
hardware & software
Warning: Chain of Custody 
The 
importance 
of 
a 
cradle-­‐to-­‐grave, 
secure 
chain 
of 
custody: 
Most 
security 
devices 
(locks, 
tags, 
seals, 
access 
control 
& 
biometrics 
devices, 
monitoring 
equipment, 
etc.) 
can 
usually 
be 
compromised 
in 
~15 
seconds, 
at 
the 
factory 
or 
vendor, 
on 
the 
loading 
dock, 
in 
transit, 
in 
the 
receiving 
department, 
before 
or 
aler 
being 
installed. 
Most 
“security” 
and 
nuclear 
safeguards 
devices 
have 
liJle 
built-­‐in 
security 
or 
significant 
ability 
to 
detect 
intrusion/tampering.
Nuclear & Radiological Security Problems 
from a Vulnerability Assessor’s Perspective 
• Security as a last-minute “Band-Aid” 
• Lack of insider threat mitigation 
• Lack of research-based practice 
• Few countermeasures for groupthink & cognitive dissonance 
• Compliance-Based Security and “Security by Obscurity” 
• Confusing Safety & Security
Safety & Security are 2 Relatively Unrelated Problems! 
Example: March 2012 Recall of 900,000 
Safety 1st Push N’ Snap Cabinet Locks 
140 reports of babies/toddlers defeating 
the locks, resulting in 3 poisonings 
Security: All about intentional nefarious adversaries. 
Safety: No adversaries.
Problem: Lack of Research-Based Security Practice" 
The Journal of Physical Security 
A free, non-profit, online 
peer-reviewed R&D journal 
http://jps.anl.gov
For More Information… 
rogerj@anl.gov 
http://www.ne.anl.gov/capabilities/vat

Más contenido relacionado

La actualidad más candente

Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
tschraider
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
beltface
 

La actualidad más candente (20)

Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Risk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility SolutionsRisk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility Solutions
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 
NIST 800 30 revision Sep 2012
NIST 800 30 revision  Sep 2012NIST 800 30 revision  Sep 2012
NIST 800 30 revision Sep 2012
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Using the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modelingUsing the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modeling
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
 

Destacado

Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret   pgs.ts le kieuThi cong coc khoan nhoi va coc barret   pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
Đỗ Quang Định
 
Top 8 chief business development officer resume samples
Top 8 chief business development officer resume samplesTop 8 chief business development officer resume samples
Top 8 chief business development officer resume samples
porichfergu
 
KCB May 2008 Cover
KCB May 2008 CoverKCB May 2008 Cover
KCB May 2008 Cover
rsmacintosh
 
Sweden Presetasion
Sweden PresetasionSweden Presetasion
Sweden Presetasion
oldusel
 
Rba impian-guide-sept-20132
Rba impian-guide-sept-20132Rba impian-guide-sept-20132
Rba impian-guide-sept-20132
burhan fuady
 
Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27
Nikos Kaklamanos
 

Destacado (20)

C11 nhandangtamgiac
C11 nhandangtamgiacC11 nhandangtamgiac
C11 nhandangtamgiac
 
Peterson 1klass2
Peterson 1klass2Peterson 1klass2
Peterson 1klass2
 
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret   pgs.ts le kieuThi cong coc khoan nhoi va coc barret   pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
 
Stanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park PlanStanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park Plan
 
Top 8 chief business development officer resume samples
Top 8 chief business development officer resume samplesTop 8 chief business development officer resume samples
Top 8 chief business development officer resume samples
 
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh HóaĐề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
 
Managic presentation english
Managic presentation englishManagic presentation english
Managic presentation english
 
KCB May 2008 Cover
KCB May 2008 CoverKCB May 2008 Cover
KCB May 2008 Cover
 
Infinity plus one
Infinity plus oneInfinity plus one
Infinity plus one
 
Because i believe i can
Because i believe i canBecause i believe i can
Because i believe i can
 
Sweden Presetasion
Sweden PresetasionSweden Presetasion
Sweden Presetasion
 
Rba impian-guide-sept-20132
Rba impian-guide-sept-20132Rba impian-guide-sept-20132
Rba impian-guide-sept-20132
 
Tambah
TambahTambah
Tambah
 
Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27
 
Pour les enfants du monde entier
Pour les enfants du monde entierPour les enfants du monde entier
Pour les enfants du monde entier
 
Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2
 
360Gate Business Objects portal
360Gate Business Objects portal360Gate Business Objects portal
360Gate Business Objects portal
 
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
 
Cisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routersCisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routers
 
Earned value management lecture 2009e my31
Earned value management lecture 2009e my31Earned value management lecture 2009e my31
Earned value management lecture 2009e my31
 

Similar a Focusing on the Threats to the Detriment of the Vulnerabilities

threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
ImXaib
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
PoornachanranKV
 

Similar a Focusing on the Threats to the Detriment of the Vulnerabilities (20)

Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Vuln_Man_91003.ppt
Vuln_Man_91003.pptVuln_Man_91003.ppt
Vuln_Man_91003.ppt
 
Vuln.ppt
Vuln.pptVuln.ppt
Vuln.ppt
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 

Más de Roger Johnston

Más de Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 

Último

Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Sheetaleventcompany
 
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
Sheetaleventcompany
 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan 087776558899
 
Difference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac MusclesDifference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac Muscles
MedicoseAcademics
 
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
Sheetaleventcompany
 
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
Sheetaleventcompany
 
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Sheetaleventcompany
 

Último (20)

Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
Cheap Rate Call Girls Bangalore {9179660964} ❤️VVIP BEBO Call Girls in Bangal...
 
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
Dehradun Call Girls Service {8854095900} ❤️VVIP ROCKY Call Girl in Dehradun U...
 
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
Call Girl In Indore 📞9235973566📞 Just📲 Call Inaaya Indore Call Girls Service ...
 
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
Cara Menggugurkan Kandungan Dengan Cepat Selesai Dalam 24 Jam Secara Alami Bu...
 
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
 
Call 8250092165 Patna Call Girls ₹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ₹4.5k Cash Payment With Room DeliveryCall 8250092165 Patna Call Girls ₹4.5k Cash Payment With Room Delivery
Call 8250092165 Patna Call Girls ₹4.5k Cash Payment With Room Delivery
 
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9809698092 👄🫦Independent Escort Service Cha...
 
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
Call girls Service Phullen / 9332606886 Genuine Call girls with real Photos a...
 
Difference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac MusclesDifference Between Skeletal Smooth and Cardiac Muscles
Difference Between Skeletal Smooth and Cardiac Muscles
 
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
Exclusive Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bangal...
 
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
Ahmedabad Call Girls Book Now 9630942363 Top Class Ahmedabad Escort Service A...
 
Cardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their RegulationCardiac Output, Venous Return, and Their Regulation
Cardiac Output, Venous Return, and Their Regulation
 
Circulatory Shock, types and stages, compensatory mechanisms
Circulatory Shock, types and stages, compensatory mechanismsCirculatory Shock, types and stages, compensatory mechanisms
Circulatory Shock, types and stages, compensatory mechanisms
 
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book nowChennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 6378878445 Call Girls in Chennai Escort service book now
 
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
💰Call Girl In Bangalore☎️7304373326💰 Call Girl service in Bangalore☎️Bangalor...
 
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
💚Call Girls In Amritsar 💯Anvi 📲🔝8725944379🔝Amritsar Call Girl No💰Advance Cash...
 
Low Cost Call Girls Bangalore {9179660964} ❤️VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❤️VVIP NISHA Call Girls in Bangalo...Low Cost Call Girls Bangalore {9179660964} ❤️VVIP NISHA Call Girls in Bangalo...
Low Cost Call Girls Bangalore {9179660964} ❤️VVIP NISHA Call Girls in Bangalo...
 
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
Premium Call Girls Dehradun {8854095900} ❤️VVIP ANJU Call Girls in Dehradun U...
 
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
Bhawanipatna Call Girls 📞9332606886 Call Girls in Bhawanipatna Escorts servic...
 
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
Gorgeous Call Girls Dehradun {8854095900} ❤️VVIP ROCKY Call Girls in Dehradun...
 

Focusing on the Threats to the Detriment of the Vulnerabilities

  • 1. Talk for the NATO Advanced Workshop on Preparedness for Nuclear and Radiological Threats Focusing on the Threats to the Detriment of the Vulnerabilities: A Vulnerability Assessor’s Perspective Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne Na=onal Laboratory 630-­‐252-­‐6168 rogerj@anl.gov hJp://www.ne.anl.gov/capabili=es/vat
  • 2. This is a plea for more, earlier, better, and more imaginative vulnerability assessments for nuclear and radiological security/safeguards and emergency response.
  • 3. Argonne Vulnerability Assessment Team The VAT has done vulnerability assessments on over 1000 different security and safeguards devices, systems, & programs. Sponsors • DOE • DoD • DOS • IAEA • NNSA • private companies • intelligence agencies • public interest organiza:ons
  • 4. Argonne Vulnerability Assessment Team • biometrics • courier bags • GPS spoofing • access control • cargo security • reverse engineering • warehouse security • product tampering • product counterfei=ng • medical device security • consul=ng & training • physical security R&D • security guard turnover • insider threat mi=ga=on • security of sealed sources • security of drug test kits • human factors in security • vulnerability assessments • tamper/intrusion detec=on • RFID spoofing/counterfei=ng • tags & tamper-­‐indica=ng seals • microprocessor & wireless systems • elec=on & vo=ng machine security • countermeasures to security theater • countermeasures to perceptual blindness • nuclear safeguards & monitoring equipment • countermeasures to sleight-­‐of-­‐hand & misdirec=on
  • 5. Definitions Threat: Who might attack, why, when, and how, and with what resources and probabilities. Threat Assessment (TA): Attempting to identify threats.
  • 6. Definitions Vulnerability: A security weakness that can be exploited to cause undesirable consequences. Vulnerability Assessment (VA): Discovering and demonstrating ways to defeat a security device, system, or program. Often includes suggesting countermeasures and security improvements.
  • 7. Things That Often Get Confused with Vulnerabilities ² Assets ² Threats ² Attack Scenarios ² Delay Paths ² Features
  • 8. Threats vs. Vulnerabilities Threat Assessments (TAs) are speculations about groups and people who may or may not exist, their goals, motivations, and resources. TAs are often reactive in nature, i.e., focused on past incidents. Vulnerabilities are right in front of you (if you will open your eyes and mind), and are often testable. VAs are typically proactive in nature. Oddly, however, TAs are usually much more reproducible than VAs!
  • 9. Purpose The purpose of a VA is to: 1. Improve security or emergency response. 2. Serve as one of the inputs to overall Risk Management.
  • 10. • list of assets to protect • asset valua=on/priori=za=on • overall security goals • consequences of successful aJack(s) • threat assessment • vulnerability assessment • available resources & possible security measures • general security philosophy/strategy • psychological tolerance for risk • various es=mated/guessed probabili=es • acceptable tradeoffs in produc=vity vs. security, reputa=on vs. security, morale vs. security, safety vs. security, and liberty/privacy vs. security Modern Risk Management • What INPUT PARAMETERS OUTPUT PARAMETERS: to protect • How to protect it • How à to deploy security resources op=mally DECISION MAKING PROCESS Value Judgments Objec=ve Analysis Subjec=ve Analysis Experience & Exper=se Intui=on & Hunches
  • 11. Not the Purpose The purpose of a VA is not to: • “Validate” • Pass a test • Generate metrics • Justify the status quo • Praise or accuse anybody • Check against some standard • Claim there are no vulnerabilities • Engender warm & happy feelings • Test security or do performance testing • Rationalize the research & development • Apply a mindless, bureaucratic stamp of approval • Endorse a security product or program, or certify it as “good” or “ready for use”
  • 12. Techniques Often Mistaken for VAs • security survey (walking around with a checklist) • security audit (are the rules being followed?) • feature analysis • threat assessment • Design Basis Threat • fault or event tree analysis (from safety engineering) • Delphi Method (method for getting a decision from a panel of experts)
  • 13. Techniques Often Mistaken for VAs • vulnerability “modeling” • software assessment tools • 3D representations of the facility • CARVER Method (DoD & law enforcement) • performance testing • Risk Management • delay path analysis
  • 14. Vulnerabilities Are the Threat Maxim: Security (and emergency response) typically fails not because the threats were misunderstood, but because the vulnerabilities were not recognized and/or not mitigated.
  • 15. Vulnerabilities Trump Threats Maxim: If you understand your threats but are clueless about your vulnerabilities, you’re in trouble. One the other hand, if you understand your vulnerabilities and try to mitigate them, you might be ok, even if you get your threats wrong (which is quite possible).
  • 16. Examples of Vulnerabilities Being the Problem • Hurricane Katrina, 2005 • Breach of the Y-­‐12 nuclear facility by an 82-­‐year-­‐old nun and two other protesters, 2012 • Target stores credit card hack, 2013 • White House fence jumper, 2014
  • 17. Michener’s Maxim: We are never prepared for what we expect.
  • 18. Waylayered Security Maxim: Layered security will fail stupidly.
  • 19. For 170 other security maxims: https://www.scribd.com/doc/46333208/Security-Maxims-October-2014
  • 20. So why are threats more popular • There than vulnerabilities? are fewer threats than vulnerabili=es • TAs are reproducible & reac=ve • Formalis=c, objec=ve methods work fairly well for TAs • VAs require imagina=on, subjec=ve judgment, and “thinking like the bad guys” • No security or emergency response program claims zero threats, but there is strong cogni=ve dissonance about vulnerabili=es • Vulnerabili=es depend cri=cally on local details
  • 21. Thinking Like the Bad Guys Bad Guys Don’t Do: TAs, DBT, security audits, etc. They do something closer to VAs. So if we are going to predict what they might do, we need to do creative VAs as well!
  • 22. Creative Vulnerability Assessments! • Perform a mental coordinate transformation and pretend to be the bad guys (or VAers). (This is much harder than you might think.) • Be much more creative than the adversaries. They need only stumble upon 1 vulnerability, the good guys have to worry about all of them.
  • 23. Creative Vulnerability Assessments! • Don’t let the good guys & the existing security infrastructure and tactics define the problem. • Gleefully look for trouble, rather than seeking to reassure yourself that everything is fine.
  • 24. We need to be more like these expert fault finders. They find problems because they want to find problems, and because they are skeptical: • bad guys • therapists • movie critics • computer hackers • scientific peer reviewers • mothers-in-law
  • 25. Where Vulnerability! Ideas Come From! The Vulnerability Pyramid
  • 26. Warning! “Fear of NORQ” is not a valid reason to try to force-fit formalistic methods onto VAs! The… Non-­‐Objec=ve Non-­‐Reproducible Non-­‐Quan=fiable NORQ All effec=ve security and risk management is ul=mately subjec=ve, no maJer how much we may wish to pretend it isn’t.
  • 27. Emergency Response Two Kinds of Vulnerabilities: - flaws in the response - vulnerability to attacks on the response Are we properly prepared for attacks during emergency response, attacks by the original attackers or by a different set of attackers? (Wait & Pounce is a very effective attack strategy!)
  • 28. Nuclear & Radiological Security Problems from a Vulnerability Assessor’s Perspective • Poor tags & seals, poor use protocols, poor tamper detection for monitoring and security devices • Confusing inventory functions with security functions: why GPS, RFIDs, MC&A programs often provide poor security • VAs not done, not done early, not done iteratively, not done well, not done by the right people • VA myths & blunders • Poor or not-existent Chain of Custody for procured hardware & software
  • 29. Warning: Chain of Custody The importance of a cradle-­‐to-­‐grave, secure chain of custody: Most security devices (locks, tags, seals, access control & biometrics devices, monitoring equipment, etc.) can usually be compromised in ~15 seconds, at the factory or vendor, on the loading dock, in transit, in the receiving department, before or aler being installed. Most “security” and nuclear safeguards devices have liJle built-­‐in security or significant ability to detect intrusion/tampering.
  • 30. Nuclear & Radiological Security Problems from a Vulnerability Assessor’s Perspective • Security as a last-minute “Band-Aid” • Lack of insider threat mitigation • Lack of research-based practice • Few countermeasures for groupthink & cognitive dissonance • Compliance-Based Security and “Security by Obscurity” • Confusing Safety & Security
  • 31. Safety & Security are 2 Relatively Unrelated Problems! Example: March 2012 Recall of 900,000 Safety 1st Push N’ Snap Cabinet Locks 140 reports of babies/toddlers defeating the locks, resulting in 3 poisonings Security: All about intentional nefarious adversaries. Safety: No adversaries.
  • 32. Problem: Lack of Research-Based Security Practice" The Journal of Physical Security A free, non-profit, online peer-reviewed R&D journal http://jps.anl.gov
  • 33. For More Information… rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat