IAA202 - LAB1 - SE140442: RISK, Threats and Vulnerabilities
IAA202 - LAB1 - SE140442: RISK, Threats and Vulnerabilities
IAA202 - LAB1 - SE140442: RISK, Threats and Vulnerabilities
The following are the evaluation criteria and rubrics for Lab #1 that the students must perform:
AND
2. Was the student able to align risks, threats, and vulnerabilities to
one of the seven domains of a typical IT infrastructure accurately?
</> RISK, Threats and Vulnerabilities.
A• User domain :
Susceptibility to social engineering
Employees and users are vulnerable to being socially engineered into letting malware and threat
actors into the system.
Phishing, vishing, whaling, pharming, spoofing, and impersonation are the various ways a user
could fall victim to hackers.
Accidental disclosures
Users due to ignorance or negligence could cause accidental disclosures leading to data leaks,
account compromises, and organizational losses.
Writing down passwords, leaving their systems unlocked, using trivial passwords, sharing too
much information on social media, are all ways that users increase the risk of hacks.
Malicious behavior
Malicious insiders are a serious threat and pose a huge risk to organizations. Confidentiality data,
copyrighted material, trade secrets, business plans and strategies could be at risk.
Additionally, disgruntled employees can wreak havoc with logic bombs and installing backdoors
into systems.
Vulnerabilities: These vulnerabilities pose a potential danger to users and
organizations. An attacker can attack a user who breaks into an organization
using an authorized user within the organization. This can lead to dangers
such as: data loss, internal secrets, copying data, exposing important data,
extortion, ...
B• Workstation domain:
Old operating systems represent a huge vulnerability. They are beyond their end-
of-life and are not maintained with security updates and patches.
Older and outdated hardware is vulnerable to hackers and data loss through
outdated firmware exploits and the lack of the ability to encrypt the hardware.
Known remote access vulnerabilities within older OS’s can allow hackers to take
over the workstation and gain access to the corporate network.
Old hard drives can lead to failure and the data loss of critical business
information.
Vulnerabilities: These risks have the potential to allow hackers into the
network and also have the potential for data loss of failed hardware
components. These risks can be mitigated by a complete overhaul of old
hardware to ensure everything is up-to-date. Newer OS’s will mean
security holes are closed and new equipment, maintained through sound
backup policies and encryption techniques, will help maintain business
continuity if a hard drive were to fail. This will also protect corporate data
in the event of a data breach. Also, by establishing a strong baseline
system defined by a security policy, each workstation can be ensured to
provide strong local encryption, backup of sensitive information, and
protection from intrusion and compromise by utilizing the latest patched
operating system and antimalware/antivirus protection.
C• LAN domain:
Flat network designs lack security.
IT Employees may lack the experience, or the time, in designing and maintaining
a secure network.
Lack of security policy governing the network.
D• WAN domain:
A lack of security policy and trained employees means multiple vulnerabilities
may exist at the perimeter which are unknown, including open ports and
protocols, including FTP and Remote Desktop.
Lack of firewalls and possibly improperly configured modem at the perimeter
could introduce many possible attacks.
Vulnerabilities: These identified risks have the potential to allow a
compromise at the network border with the Internet (WAN). These
weaknesses can directly be mitigated by shoring up the LAN-to-WAN
Domain. Verifying and setting up SFTP instead of FTP can help secure
this protocol if it is being utilized at your company. Best practices in
defense in depth should be utilized, as well as penetration testing to
ensure this domain is secure. Solid Incident Response policies should
also be developed and tested to ensure a breach in this domain does not
expose the business to unnecessary risk.
E• LAN-to-WAN:
No firewall is present, only a simple modem.
Lack of any defensive perimeter controls.
Lack of Intrusion Detection/Intrusion Prevention.
Vulnerabilities: These identified risks have the potential to allow
unrestricted access into the organization’s LAN, and also to introduce
DDoS (distributed denial of service) or other attacks against computers in
the DMZ, which could contain your corporate email and web servers. A
best practice in security is “defense in depth”. This means securing
resources through a variety of controls so that if one control fails, there
are other defenses in place that can provide security and act as backups
to an organization's defense. A firewall should exist between the WAN
(Internet) and the LAN, and another should exist between the DMZ and
the LAN. Access to the DMZ should never come from the LAN because a
breach of the DMZ would allow hackers an internal position to launch
further attacks inside the network. Proper network perimeter design
including multiple firewalls coupled with a strong defense in depth
strategy, would help mitigate these threats.
G• System/Application domain:
Unpatched operating systems and software existing on the network.
End-users lack of security mindedness and unrestricted workstation access can
lead to additional unsupported software being introduced to the network.
An email that is not scanned for viruses.
Employees that are not trained in social engineering schemes can unwittingly
open infected files.
Lack of antimalware/antivirus software to protect company assets.
Vulnerabilities: These identified risks have the potential to allow an
external threat actor to gain access to the internal LAN through spyware
or trojan horse virus variants downloaded through email or from a
compromised website. Antimalware and antivirus software can help stop
these infections from getting released into the company network.
Additionally, unpatched OS’s and software have many known
vulnerabilities that can be exploited if discovered by a hacker. A solid
policy to maintain systems and software can mitigate this risk. This would
call for the use of antimalware and antivirus software on workstations and
servers, including the webserver and email server. All email can be
scanned and secured through an email gateway or Unified Threat
Management (UTM) device installed at the network perimeter. Proper
security and awareness training to help employees spot social
engineering schemes would be a huge factor in mitigating these threats
as well.
4. Was the student able to prioritize the identified critical, major, and
minor risks, threats, and software vulnerabilities?
Unauthorized access from public Internet
User destroys data in application and deletes all files
Hacker penetrates your IT infrastructure
and gains access to your internal network
Intra-office employee romance gone bad
Fire destroys primary data center
Communication circuit outages
Workstation OS has a known software vulnerability
Unauthorized access to organization owned
Workstations
Loss of production data
Denial of service attack on organization e-mail
Serve
Remote communications from home office
LAN server OS has a known software vulnerability
User downloads an unknown e –mail attachment
Workstation browser has software vulnerability
Service provider has a major network outage
Weak ingress/egress traffic filtering degrades
Performance
User inserts CDs and USB hard drives with personal photos, music, and videos on organization
owned computers
VPN tunneling between remote computer and ingress/egress router
WLAN access points are needed for LAN connectivity within a warehouse
Need to prevent rogue users from unauthorized WLAN access
Just like anything else, HIPPA faces potential threats that are identified
as "risks" that can be further segmented: Human Intentional Risk:
Hackers, disgruntled employees, terrorists. Human Unintentional Risk:
Unknowing employees, human error. Non-Human Technical Risk:
Corrupt computer code or viruses.
2. How many threats and vulnerabilities did you find that impacted
risk within each of the seven domains of a typical IT infrastructure?
• User Domain: 4
• Workstation Domain: 5
• LAN Domain: 4
• LAN-to-WAN Domain: 4
• WAN Domain: 3
•Remote Access Domain: 5
•Systems/Application Domain: 6
3. Which domain(s) had the greatest number of risks, threats, and
vulnerabilities?
> The User Domain represents the greatest risk and uncertainty because human
behavior is unreliable and influenced by factors uncontrolled by policy.
4. What is the risk impact or risk factor (critical, major, minor) that you
would qualitatively assign to the risks, threats, and vulnerabilities you
identified for the LAN-to-WAN Domain for the healthcare and HIPPA
compliance scenario?
> Hacker penetrates IT infrastructure and gains access to your internal network: Critical,
PHI can be compromised Denial of service attack on organization's e-mail server:
Minor, can be mitigated Weak ingress/egress traffic filtering degrades performance:
Minor, can be mitigated VPN tunneling between the remote computer and
ingress/egress router: Major, if electronic protected health information (ePHI) is being
accessed remotely
14. Customers that conduct online banking using their laptop or personal
computer must use HTTPS, the secure and encrypted version of HTTP:
browser communications. HTTPS:// encrypts webpage data inputs and
data through the public Internet and decrypts that webpage and data once
displayed on your browser. True or False.
> True
> By examining where privacy data and confidential data reside and are accessed,
organizations can design a layered security solution, providing multiple security
countermeasures and security controls at key points throughout the entire IT
infrastructure. By implementing proper security controls within the User Domain and
Workstation Domain, users and their point-of-entry are granted access to systems and
data according to their access control requirements. Within the IT infrastructure,
additional security countermeasures and security controls in the LAN Domain and LAN-
to-WAN Domain can provide access controls to servers, drives, folders, and data to
authorized users. Finally, by ensuring servers, operating systems, and application
software are patched with the latest software updates, risks, threats, and vulnerabilities
can be mitigated within the System/Application Domain.