Question

In: Computer Science

It can be difficult to estimate the probability of some threat events, as the attack could...

It can be difficult to estimate the probability of some threat events, as the attack could be accomplished in many ways. Fortunately, the quantitative technique of decomposition suggests one approach to this problem. What is this technique called?

Solutions

Expert Solution

---> Risk Management, in general, is a process aiming at an efficient balance between realizing opportunities for gains while minimizing vulnerabilities and losses.

---> Risk Management should be an endlessly recurring process consisting of phases which, when properly implemented, enable continuous improvement in decision-making and performance improvement.

A review of cyber security risk assessment methods for SCADA systems:

---> Over the last several decades we already saw a range of cyber attacks on CNI and SCADA.

---> In 1982, the first recorded cyber attack on CNI took place at the Trans-Siberian pipeline and resulted in an explosion visible from space (Miller and Rowe, 2012).

---> Over the last decade there was a number of cyber attacks on SCADA systems and ICS.

---> This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems.


---> Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. We also outline five research challenges facing the domain and point out the approaches that might be taken.


---> A Supervisory Control and Data Acquisition (SCADA) system is a type of Industrial Control System (ICS).

---> An ICS controls processes in the industrial sector and in the sectors which form a Critical National Infrastructure (CNI) (NIST, 2011).


Quantitative cyber risk reduction estimation methodology, 2006:
------------------------------------------------------------------------------------

---> McQueen et al. (2006) suggest a methodology for the quantitative estimation of cyber risk reduction for a SCADA system in which an enhancement of cyber security has been performed.

---> For risk reduction estimation a directed graph of a cyber attack is developed for both a baseline and improved systems, and the difference in time-to-compromise in each system is measured and analysed.

The methodology consists of ten steps:

1.Establish system configuration;

2.Identify the applicable portions of the quantitative risk model;

3.Identify and prioritise the security requirements of the primary target(s);

4.Identify system vulnerabilities;

5.Categorise vulnerabilities on each device by the type of compromise;

6.Estimate time-to-compromise for each device;

7.Generate compromise graph(s) and attack paths;

8.Estimate dominant attack path(s);

9.Perform steps 3–8 for both baseline and enhanced system; and

10.Compare results of both versions of the system and estimate risk reduction.

---> McQueen et al. (2006) introduce a formula for calculating the probability of an occurrence of an undesired event. This probability is the product of the following conditional probabilities.

---> the probability of the system being on an attacker's target list, the probability of being attacked given that the system is targeted, the probability of a perimeter breach given that the system is attacked, the probability of a successful attack given that there is a perimeter breach and the probability of damage given the system is successfully attacked.

---> Since the estimation of all probabilities involved is not feasible, risk reduction is measured as the change of the probabilities of perimeter breach and successful attack rather than an absolute value of risk.

---> Security requirements for SCADA are identified so that integrity and availability have the highest priority, while confidentiality is secondary.

---> The vulnerabilities of a system are identified using existing vulnerability identification libraries. Each vulnerability is classified as reconnaissance, breach, penetrate, escalation or damage.

---> Time-to-compromise a device is calculated. It depends on the known vulnerabilities of the target system and the skills of an attacker.


Related Solutions

What are some approaches to assigning probability? Which could be labeled as difficult to understand? Why?
What are some approaches to assigning probability? Which could be labeled as difficult to understand? Why?
The probability that a patient with a heart attack dies of the attack is 4%. Suppose...
The probability that a patient with a heart attack dies of the attack is 4%. Suppose we have 4 patients who suffer a heart attack a) what is the probability that 2 will survive? b) what is the probability that all will die? c) what is the probability that less than 3 will survive? d) what is the probability that all will survive?
SQL injection attacks continue to be a significant attack vector for threat actors. Use the Internet...
SQL injection attacks continue to be a significant attack vector for threat actors. Use the Internet to research these attacks. What are some recent attacks that have been initiated by SQL injection? How were they conducted? What defenses are there against them? Write a one-page paper on your research.
An Emerging Threat: Ransomware The attack, expertly planned, was insidious. For six weeks or more, cybercriminals...
An Emerging Threat: Ransomware The attack, expertly planned, was insidious. For six weeks or more, cybercriminals purportedly from either North Korea or Russia wormed their way into Monroe College’s computer systems, maneuvering undetected as they sought out weak points. Then, in July 2019, they pounced. Using an IT staffer’s pilfered password across platforms, hackers infected every server on Monroe’s two New York City-area campuses with a virus, effectively locking down administrative files, email, learning management systems, and website. “The college...
Some types of capital investments have associated cash flows that are very difficult to estimate, while...
Some types of capital investments have associated cash flows that are very difficult to estimate, while other types of capital investments have associated cash flows that are very easy to estimate. Name two capital investments from your chosen publicly traded entity, one that has associated cash flows that are easy to estimate and one that has associated cash flows that are difficult to estimate. Explain how these two types of investments differ and why the associated cash flows are easier...
Provide a specific scenario in which the following notions are all included: threat, vulnerability, risk, attack,...
Provide a specific scenario in which the following notions are all included: threat, vulnerability, risk, attack, countermeasures, cost-benefit analysis, risk mitigation, risk acceptance, risk transfer, and risk avoidance. Make sure that the scenario is not the one discussed in class. (b) Discuss the relationship among them. (c) Discuss the benefits of learning using this method.
P(CA) = probability of experiencing a cybersecurity attack P(V) = probability of finding a vulnerability on...
P(CA) = probability of experiencing a cybersecurity attack P(V) = probability of finding a vulnerability on your webservers P(A) = probability of an attack on your webservers P(CA|A) 13% P(CA|~A) 6% P(V) 10% P(A|V) 18% P(A|~V) 7% Estimates for Company A Each question is 5 points. You need to do the following questions in order. 2.a. What is the probability of an attack on the webservers in Company A? P(A) = ? 2.b. What is the probability of Company A...
UNIX ONLY -- DIFFICULT LAB ASSIGNMENT This is an extremely difficult subject for me. Could you...
UNIX ONLY -- DIFFICULT LAB ASSIGNMENT This is an extremely difficult subject for me. Could you please give step by step instructions on how to write a script called "encrypt_password.sh" and say line by line what the code should be to complete the assignment according to the instructions and examples below? The assignment will be done entirely in Terminal on Mac Our Lab assignment is as follows: In this lab, you will write a script called encrypt_password.sh to encrypt passwords....
Can be multiple answers to each answer 16        According to the Drake estimate of the probability that...
Can be multiple answers to each answer 16        According to the Drake estimate of the probability that intelligent life exists elsewhere in the Milky Way at the present time, the issues one must consider include: a       the number of Population I stars in the galaxy. b      the likelihood that stars are not members of close multiple star systems. c       the main sequence lifetime of various types of stars. d      whether stars are in a spiral arm at them moment. e       the probability that carbon-based life will...
Discuss an example of applying probability to investigating burglaries . What are some ways you could...
Discuss an example of applying probability to investigating burglaries . What are some ways you could measure or express that probability using the Basic Law of Probability.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT