Top Banner
Sources of Vulnerabilities CSEM02 University of Sunderland
22

Sources of Vulnerabilities

Feb 09, 2016

Download

Documents

jalila

Sources of Vulnerabilities. CSEM02 University of Sunderland. Reference. P. Neumann, 1995, Computer-Related Risks, Addison-Wesley, ISBN: 0-201-55805-X. System conceptualization Miss-assessment of the technology. Requirements definition - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Sources of Vulnerabilities

Sources of Vulnerabilities

CSEM02University of Sunderland

Page 2: Sources of Vulnerabilities

Reference

• P. Neumann, 1995, Computer-Related Risks, Addison-Wesley, ISBN: 0-201-55805-X

Page 3: Sources of Vulnerabilities

Vulnerabilities in Development

• System conceptualization – Miss-assessment of the

technology. • Requirements definition

– Erroneous, incomplete, or inconsistent requirements.

• System design – Fundamental

misconceptions or flaws. • Implementation

– Various errors. • Support systems

– Faulty or poor tools.

• System analysis – False assumptions or

erroneous models. • Testing

– Incomplete or erroneous testing.

• Evolution – Sloppy maintenance and

upgrades. • Decommission

– Premature removal; removal of components

used elsewhere.

Page 4: Sources of Vulnerabilities

Vulnerabilities in Use• Environment

– Earthquakes, floods, fires, etc.

• Animals – E.g., squirrelcide.

• Infrastructure – Loss of power, air conditioning

• Hardware – Malfunction due to ageing or transients

• Software – Bugs

• Communications – Outages, interference, and jamming

• Human Limitations – Installation or misuse

Page 5: Sources of Vulnerabilities

Note Well…• Vulnerabilities are not just security…

• However, security vulnerabilities:– Tend to involve insiders– Tend to involve human behavior– Sometimes result from unwarranted assumptions

– Often are due to design errors or incomplete understanding of a system or technology

Page 6: Sources of Vulnerabilities

System Conceptualization

• Misunderstanding of the technology– Too far– Not far enough

• Cost overruns• Schedule overruns• Lack of FeasibilityExample—MIFASS (Marine Fire and Air Support System). The agency direction was to use a CPU somewhat slower than a first generation Apple II. There was no recovery.

Page 7: Sources of Vulnerabilities

Requirements Definition

• Erroneous requirements• Incomplete requirements• Inconsistent requirementsExtremely common and expensive. Missing requirements are the worst problem. Agile methods attempt to address this.

Page 8: Sources of Vulnerabilities

System Design• Fundamentally false assumptions

– E.g., infinite speed of light• Erroneous modelsExample: the FAA’s Advance Automation System. The contractor assumed that the average statement in Ada generated 5 machine instructions (actually it was 10) and that the speed of a 10 MHz machine was (with parallelism) 20 MHz (actually it was 12 MHz). There was no recovery.

Page 9: Sources of Vulnerabilities

Implementation

• Various and varied.– Chip fab– Wiring– Programming bugs– Trojan horses– VirusesWe will discuss this.

Page 10: Sources of Vulnerabilities

Support Systems• Faulty or poor tools

– Language choice– Compiler/debugger– Bad tools– EdittingCASE tools never met their expectations…Sometimes reflect failure to meet standards.Sometimes are deliberate on the part of a vendor.

Page 11: Sources of Vulnerabilities

System Analysis

• False assumptions about– World– Operating environment– Human behavior

• Erroneous models and simulationsPrototypes help here.

Page 12: Sources of Vulnerabilities

Testing

• Incomplete testing• Erroneous testing• Faulty code verificationWhat is a testable requirement? One way of addressing this is Test-Driven Development (TDD), where you write the unit tests first.

Page 13: Sources of Vulnerabilities

Evolution• Sloppy maintenance and upgrades.• Misconceptions• New flaws• Loss of design coherencyMaintenance organizations do not attract the best engineers. Design your system so it can be maintained by entry-level staff.

Page 14: Sources of Vulnerabilities

Decommission• Premature removal.• Removal of components needed elsewhere.

• Hidden dependencies• Replacement not done in time• Hardware and software end of life

• Vendor profiteering

Page 15: Sources of Vulnerabilities

Environment

• Earthquake• Flood• Fire• Temperature extremes• EMI• Etc…

Page 16: Sources of Vulnerabilities

Animals• Sharks (underwater cables)• Squirrels (enjoy fibre and cabling)• Monkeys (inquisitive)• Birds (watch your neighborhood telephone poles)

• Horses (enjoy practical jokes)• Cattle• Pigs• Etc.

Page 17: Sources of Vulnerabilities

Infrastructure

• Power• Air Conditioning• Physical Security

Page 18: Sources of Vulnerabilities

Hardware

• Ageing• Transients• Environmental problems• Errors in Design

Page 19: Sources of Vulnerabilities

Software

• Bugs of many sorts– System development– Change implementation– Maintenance

Page 20: Sources of Vulnerabilities

Communications

• Outages• Natural interference• Jamming

– Intentional– Accidental

• Tapping• Other

Page 21: Sources of Vulnerabilities

Human Error

• Installation• Misuse

– Intentional– Unintentional

Page 22: Sources of Vulnerabilities

Adverse Effects

• A myriadDiscuss…