Worksheet 01: Risk and Threat Modeling
Worksheets are self-guided activities that reinforce lectures. They are not graded for accuracy, only for completion. Worksheets are due by the start of the next lecture via Blackboard link as a single pdf document. Be sure to properly label each question.
Questions
-
How would you define computer security?
-
Which of the six, high-level computer security goals matches the following description: the property of data, software or hardware remaining unaltered.
-
Consider a voting system, like in the US election. Define how each of the six, high-level computer security principles apply to a voting system.
-
What is the difference between anonymity and confidentiality/privacy? Can you provide an example of where each might apply to a system?
-
Using the terminology of computer security policies and attacks (see Chapter 1.2 in the book), consider the security policy for access to a dorm on campus. Your description should use terms like, assets, security policy, security requirements, secure, non-secure, violated, attack, security violation, controls, countermeasure, denial of service, etc.
-
Consider the risk equation \(R = T \cdot V \cdot C\), what do each of the variables in the equation mean.
-
Explain how the risk equation can be rewritten as \(R = P \cdot C\)
-
What does the acronym DREAD stand for?
-
Apply DREAD, where each category is rated on a 10 point scale (10 highest risk, 1 lowest), where an attacker is trying to attack a hardened combination lock on a vault door that is protecting a single family’s jewels. Justify each of the ratings you apply and calculate the final risk analysis.
-
For the above scenario of the family jewels, create an attack tree
-
Define the parts of the acronym STRIDE
-
Which of the design principles has the following property: The design does not reply on obfuscation or secrets for it security.
-
Provide an example using the Jewelry safe from above to apply the principle of Least-Privilege.
-
Read the following Wikipedia article about the Sony hack in 2014 and review Chapter 1.8 in the book for why computer security is hard. Choose three of the items from the list of 20 and describe how they made computer security hard in preventing this incident.