SlideShare a Scribd company logo
1 of 33
Download to read offline
Talk 
for 
the 
NATO 
Advanced 
Workshop 
on 
Preparedness 
for 
Nuclear 
and 
Radiological 
Threats 
Focusing on the Threats to the Detriment of the 
Vulnerabilities: A Vulnerability Assessor’s Perspective 
Roger 
G. 
Johnston, 
Ph.D., 
CPP 
Vulnerability 
Assessment 
Team 
Argonne 
Na=onal 
Laboratory 
630-­‐252-­‐6168 
rogerj@anl.gov 
hJp://www.ne.anl.gov/capabili=es/vat
This is a plea for more, earlier, better, 
and more imaginative vulnerability 
assessments for nuclear and 
radiological security/safeguards 
and emergency response.
Argonne Vulnerability Assessment Team 
The 
VAT 
has 
done 
vulnerability 
assessments 
on 
over 
1000 
different 
security 
and 
safeguards 
devices, 
systems, 
& 
programs. 
Sponsors 
• 
DOE 
• 
DoD 
• 
DOS 
• 
IAEA 
• 
NNSA 
• 
private 
companies 
• 
intelligence 
agencies 
• 
public 
interest 
organiza:ons
Argonne Vulnerability Assessment Team 
• biometrics 
• courier 
bags 
• GPS 
spoofing 
• access 
control 
• cargo 
security 
• reverse 
engineering 
• warehouse 
security 
• product 
tampering 
• product 
counterfei=ng 
• medical 
device 
security 
• consul=ng 
& 
training 
• physical 
security 
R&D 
• security 
guard 
turnover 
• insider 
threat 
mi=ga=on 
• security 
of 
sealed 
sources 
• security 
of 
drug 
test 
kits 
• human 
factors 
in 
security 
• vulnerability 
assessments 
• tamper/intrusion 
detec=on 
• RFID 
spoofing/counterfei=ng 
• tags 
& 
tamper-­‐indica=ng 
seals 
• microprocessor 
& 
wireless 
systems 
• elec=on 
& 
vo=ng 
machine 
security 
• countermeasures 
to 
security 
theater 
• countermeasures 
to 
perceptual 
blindness 
• nuclear 
safeguards 
& 
monitoring 
equipment 
• countermeasures 
to 
sleight-­‐of-­‐hand 
& 
misdirec=on
Definitions 
Threat: Who might attack, why, when, and how, 
and with what resources and probabilities. 
Threat Assessment (TA): Attempting to 
identify threats.
Definitions 
Vulnerability: A security weakness that can be 
exploited to cause undesirable consequences. 
Vulnerability Assessment (VA): Discovering and 
demonstrating ways to defeat a security device, 
system, or program. Often includes suggesting 
countermeasures and security improvements.
Things That Often 
Get Confused with Vulnerabilities 
² Assets 
² Threats 
² Attack Scenarios 
² Delay Paths 
² Features
Threats vs. Vulnerabilities 
Threat Assessments (TAs) are speculations about 
groups and people who may or may not exist, their 
goals, motivations, and resources. TAs are often 
reactive in nature, i.e., focused on past incidents. 
Vulnerabilities are right in front of you (if you will 
open your eyes and mind), and are often testable. 
VAs are typically proactive in nature. 
Oddly, however, TAs are usually 
much more reproducible than VAs!
Purpose 
The purpose of a VA is to: 
1. Improve security or 
emergency response. 
2. Serve as one of the inputs to overall 
Risk Management.
• list 
of 
assets 
to 
protect 
• asset 
valua=on/priori=za=on 
• overall 
security 
goals 
• consequences 
of 
successful 
aJack(s) 
• threat 
assessment 
• vulnerability 
assessment 
• available 
resources 
& 
possible 
security 
measures 
• general 
security 
philosophy/strategy 
• psychological 
tolerance 
for 
risk 
• various 
es=mated/guessed 
probabili=es 
• acceptable 
tradeoffs 
in 
produc=vity 
vs. 
security, 
reputa=on 
vs. 
security, 
morale 
vs. 
security, 
safety 
vs. 
security, 
and 
liberty/privacy 
vs. 
security 
Modern 
Risk 
Management 
• What 
INPUT 
PARAMETERS 
OUTPUT 
PARAMETERS: 
to 
protect 
• How 
to 
protect 
it 
• How 
à 
to 
deploy 
security 
resources 
op=mally 
DECISION 
MAKING 
PROCESS 
Value 
Judgments 
Objec=ve 
Analysis 
Subjec=ve 
Analysis 
Experience 
& 
Exper=se 
Intui=on 
& 
Hunches
Not the Purpose 
The purpose of a VA is not to: 
• “Validate” 
• Pass a test 
• Generate metrics 
• Justify the status quo 
• Praise or accuse anybody 
• Check against some standard 
• Claim there are no vulnerabilities 
• Engender warm & happy feelings 
• Test security or do performance testing 
• Rationalize the research & development 
• Apply a mindless, bureaucratic stamp of approval 
• Endorse a security product or program, or certify it as 
“good” or “ready for use”
Techniques Often Mistaken for VAs 
• security survey (walking around with a checklist) 
• security audit (are the rules being followed?) 
• feature analysis 
• threat assessment 
• Design Basis Threat 
• fault or event tree analysis (from safety engineering) 
• Delphi Method (method for getting a decision from a 
panel of experts)
Techniques Often Mistaken for VAs 
• vulnerability “modeling” 
• software assessment tools 
• 3D representations of the facility 
• CARVER Method (DoD & law enforcement) 
• performance testing 
• Risk Management 
• delay path analysis
Vulnerabilities Are the Threat Maxim: 
Security (and emergency response) typically fails not 
because the threats were misunderstood, but because the 
vulnerabilities were not recognized and/or not mitigated.
Vulnerabilities Trump Threats Maxim: 
If you understand your threats but are clueless about your 
vulnerabilities, you’re in trouble. One the other hand, if you 
understand your vulnerabilities and try to mitigate them, 
you might be ok, even if you get your threats wrong 
(which is quite possible).
Examples of Vulnerabilities Being the Problem 
• Hurricane 
Katrina, 
2005 
• Breach 
of 
the 
Y-­‐12 
nuclear 
facility 
by 
an 
82-­‐year-­‐old 
nun 
and 
two 
other 
protesters, 
2012 
• Target 
stores 
credit 
card 
hack, 
2013 
• White 
House 
fence 
jumper, 
2014
Michener’s Maxim: 
We are never prepared for what we expect.
Waylayered Security Maxim: 
Layered security will fail stupidly.
For 170 other security maxims: 
https://www.scribd.com/doc/46333208/Security-Maxims-October-2014
So why are threats more popular 
• There 
than vulnerabilities? 
are 
fewer 
threats 
than 
vulnerabili=es 
• TAs 
are 
reproducible 
& 
reac=ve 
• Formalis=c, 
objec=ve 
methods 
work 
fairly 
well 
for 
TAs 
• VAs 
require 
imagina=on, 
subjec=ve 
judgment, 
and 
“thinking 
like 
the 
bad 
guys” 
• No 
security 
or 
emergency 
response 
program 
claims 
zero 
threats, 
but 
there 
is 
strong 
cogni=ve 
dissonance 
about 
vulnerabili=es 
• Vulnerabili=es 
depend 
cri=cally 
on 
local 
details
Thinking Like the Bad Guys 
Bad Guys Don’t Do: 
TAs, DBT, security audits, etc. 
They do something closer to VAs. 
So if we are going to predict what they 
might do, we need to do creative VAs as 
well!
Creative Vulnerability Assessments! 
• Perform a mental coordinate transformation 
and pretend to be the bad guys (or VAers). 
(This is much harder than you might think.) 
• Be much more creative than the 
adversaries. They need only stumble upon 
1 vulnerability, the good guys have 
to worry about all of them.
Creative Vulnerability Assessments! 
• Don’t let the good guys & the existing 
security infrastructure and tactics define the 
problem. 
• Gleefully look for trouble, rather than 
seeking to reassure yourself that everything 
is fine.
We need to be more like these expert fault 
finders. They find problems because they 
want to find problems, and because they are 
skeptical: 
• bad guys 
• therapists 
• movie critics 
• computer hackers 
• scientific peer reviewers 
• mothers-in-law
Where Vulnerability! 
Ideas Come From! 
The Vulnerability Pyramid
Warning! 
“Fear of NORQ” is not a valid reason to try to 
force-fit formalistic methods onto VAs! 
The… 
Non-­‐Objec=ve 
Non-­‐Reproducible 
Non-­‐Quan=fiable 
NORQ 
All 
effec=ve 
security 
and 
risk 
management 
is 
ul=mately 
subjec=ve, 
no 
maJer 
how 
much 
we 
may 
wish 
to 
pretend 
it 
isn’t.
Emergency Response 
Two Kinds of Vulnerabilities: 
- flaws in the response 
- vulnerability to attacks on the response 
Are we properly prepared for attacks 
during emergency response, attacks by 
the original attackers or by a different 
set of attackers? 
(Wait & Pounce is a very 
effective attack strategy!)
Nuclear & Radiological Security Problems 
from a Vulnerability Assessor’s Perspective 
• Poor tags & seals, poor use protocols, poor 
tamper detection for monitoring and security devices 
• Confusing inventory functions with security functions: why 
GPS, RFIDs, MC&A programs often provide poor security 
• VAs not done, not done early, not done iteratively, not done 
well, not done by the right people 
• VA myths & blunders 
• Poor or not-existent Chain of Custody for procured 
hardware & software
Warning: Chain of Custody 
The 
importance 
of 
a 
cradle-­‐to-­‐grave, 
secure 
chain 
of 
custody: 
Most 
security 
devices 
(locks, 
tags, 
seals, 
access 
control 
& 
biometrics 
devices, 
monitoring 
equipment, 
etc.) 
can 
usually 
be 
compromised 
in 
~15 
seconds, 
at 
the 
factory 
or 
vendor, 
on 
the 
loading 
dock, 
in 
transit, 
in 
the 
receiving 
department, 
before 
or 
aler 
being 
installed. 
Most 
“security” 
and 
nuclear 
safeguards 
devices 
have 
liJle 
built-­‐in 
security 
or 
significant 
ability 
to 
detect 
intrusion/tampering.
Nuclear & Radiological Security Problems 
from a Vulnerability Assessor’s Perspective 
• Security as a last-minute “Band-Aid” 
• Lack of insider threat mitigation 
• Lack of research-based practice 
• Few countermeasures for groupthink & cognitive dissonance 
• Compliance-Based Security and “Security by Obscurity” 
• Confusing Safety & Security
Safety & Security are 2 Relatively Unrelated Problems! 
Example: March 2012 Recall of 900,000 
Safety 1st Push N’ Snap Cabinet Locks 
140 reports of babies/toddlers defeating 
the locks, resulting in 3 poisonings 
Security: All about intentional nefarious adversaries. 
Safety: No adversaries.
Problem: Lack of Research-Based Security Practice" 
The Journal of Physical Security 
A free, non-profit, online 
peer-reviewed R&D journal 
http://jps.anl.gov
For More Information… 
rogerj@anl.gov 
http://www.ne.anl.gov/capabilities/vat

More Related Content

What's hot

Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Enterprising Non-Profits
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...Marcin Ludwiszewski
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat MitigationRoger Johnston
 
Risk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility SolutionsRisk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility SolutionsDean Calhoun
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...Clare Nelson, CISSP, CIPP-E
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Smart Assessment
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modelingsedukull
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsRoger Johnston
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTSimone Onofri
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Managementjpubal
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013beltface
 

What's hot (20)

Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)Social Enterprise Learning Toolkit (Risk Management Module)
Social Enterprise Learning Toolkit (Risk Management Module)
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...2020 11-15 marcin ludwiszewski - purple, red, blue  and others - rainbow team...
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
 
Insider Threat Mitigation
 Insider Threat Mitigation Insider Threat Mitigation
Insider Threat Mitigation
 
Risk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility SolutionsRisk assessment Presentation by Affygility Solutions
Risk assessment Presentation by Affygility Solutions
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
Webinar Excerpts: How to do a Formal Risk Assessment as per PCI Requirement 1...
 
NIST 800 30 revision Sep 2012
NIST 800 30 revision  Sep 2012NIST 800 30 revision  Sep 2012
NIST 800 30 revision Sep 2012
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Risk Assessment and Threat Modeling
Risk Assessment and Threat ModelingRisk Assessment and Threat Modeling
Risk Assessment and Threat Modeling
 
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear SafeguardsVulnerability Assessment, Physical Security, and Nuclear Safeguards
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
 
Using the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modelingUsing the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modeling
 
Cyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APTCyber Defense - How to be prepared to APT
Cyber Defense - How to be prepared to APT
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
 

Viewers also liked

Peterson 1klass2
Peterson 1klass2Peterson 1klass2
Peterson 1klass2qwasar1
 
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret   pgs.ts le kieuThi cong coc khoan nhoi va coc barret   pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret pgs.ts le kieuĐỗ Quang Định
 
Stanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park PlanStanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park PlanPerla Ni
 
Top 8 chief business development officer resume samples
Top 8 chief business development officer resume samplesTop 8 chief business development officer resume samples
Top 8 chief business development officer resume samplesporichfergu
 
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh HóaĐề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóaschoolantoreecom
 
KCB May 2008 Cover
KCB May 2008 CoverKCB May 2008 Cover
KCB May 2008 Coverrsmacintosh
 
Because i believe i can
Because i believe i canBecause i believe i can
Because i believe i cansaurabh gupta
 
Sweden Presetasion
Sweden PresetasionSweden Presetasion
Sweden Presetasionoldusel
 
Rba impian-guide-sept-20132
Rba impian-guide-sept-20132Rba impian-guide-sept-20132
Rba impian-guide-sept-20132burhan fuady
 
Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27Nikos Kaklamanos
 
Pour les enfants du monde entier
Pour les enfants du monde entierPour les enfants du monde entier
Pour les enfants du monde entiersatelite1
 
Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2Paul Pivec
 
360Gate Business Objects portal
360Gate Business Objects portal360Gate Business Objects portal
360Gate Business Objects portalSebastien Goiffon
 
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...MD. SAJJADUL KARIM BHUIYAN
 
Cisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routersCisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routers3Anetwork com
 
Earned value management lecture 2009e my31
Earned value management lecture 2009e my31Earned value management lecture 2009e my31
Earned value management lecture 2009e my31rongo620
 

Viewers also liked (20)

C11 nhandangtamgiac
C11 nhandangtamgiacC11 nhandangtamgiac
C11 nhandangtamgiac
 
Peterson 1klass2
Peterson 1klass2Peterson 1klass2
Peterson 1klass2
 
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret   pgs.ts le kieuThi cong coc khoan nhoi va coc barret   pgs.ts le kieu
Thi cong coc khoan nhoi va coc barret pgs.ts le kieu
 
Stanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park PlanStanford/Arrillaga El Camino Menlo Park Plan
Stanford/Arrillaga El Camino Menlo Park Plan
 
Top 8 chief business development officer resume samples
Top 8 chief business development officer resume samplesTop 8 chief business development officer resume samples
Top 8 chief business development officer resume samples
 
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh HóaĐề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
Đề thi thử Đại học lần 1 năm 2016 THPT Bỉm Sơn Thanh Hóa
 
Managic presentation english
Managic presentation englishManagic presentation english
Managic presentation english
 
KCB May 2008 Cover
KCB May 2008 CoverKCB May 2008 Cover
KCB May 2008 Cover
 
Infinity plus one
Infinity plus oneInfinity plus one
Infinity plus one
 
Because i believe i can
Because i believe i canBecause i believe i can
Because i believe i can
 
Sweden Presetasion
Sweden PresetasionSweden Presetasion
Sweden Presetasion
 
Rba impian-guide-sept-20132
Rba impian-guide-sept-20132Rba impian-guide-sept-20132
Rba impian-guide-sept-20132
 
Tambah
TambahTambah
Tambah
 
Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27Yliko pake geniko_meros_201105.20-27
Yliko pake geniko_meros_201105.20-27
 
Pour les enfants du monde entier
Pour les enfants du monde entierPour les enfants du monde entier
Pour les enfants du monde entier
 
Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2Engage Workshop Berlin09 Part2
Engage Workshop Berlin09 Part2
 
360Gate Business Objects portal
360Gate Business Objects portal360Gate Business Objects portal
360Gate Business Objects portal
 
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
On needle settings of tuck stitch fully fashioned,22rib diamond design fully-...
 
Cisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routersCisco 3900 and cisco 2900 series routers
Cisco 3900 and cisco 2900 series routers
 
Earned value management lecture 2009e my31
Earned value management lecture 2009e my31Earned value management lecture 2009e my31
Earned value management lecture 2009e my31
 

Similar to Focusing on the Threats to the Detriment of the Vulnerabilities

Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment MythsRoger Johnston
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability Resolver Inc.
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxImXaib
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptxsafetygoodwe
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management IIzapp0
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk managementDr. Lasantha Ranwala
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringPoornachanranKV
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 

Similar to Focusing on the Threats to the Detriment of the Vulnerabilities (20)

Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptxthreat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
threat_and_vulnerability_management_-_ryan_elmer_-_frsecure.pptx
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
12._SGW-_Risk_Assessment__Job_Safety_Analysis.pptx
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Health information security session 4 risk management
Health information security session 4 risk managementHealth information security session 4 risk management
Health information security session 4 risk management
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 
Introduction to Ethical Hacking
Introduction to Ethical HackingIntroduction to Ethical Hacking
Introduction to Ethical Hacking
 
Vuln_Man_91003.ppt
Vuln_Man_91003.pptVuln_Man_91003.ppt
Vuln_Man_91003.ppt
 
Vuln.ppt
Vuln.pptVuln.ppt
Vuln.ppt
 
OWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptxOWASP Risk Rating Methodology.pptx
OWASP Risk Rating Methodology.pptx
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
Module 6.pptx
Module 6.pptxModule 6.pptx
Module 6.pptx
 

More from Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityRoger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Roger Johnston
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyRoger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentRoger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability AssessmentsRoger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments Roger Johnston
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityRoger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security DevicesRoger Johnston
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Roger Johnston
 

More from Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
Security Assurance
Security AssuranceSecurity Assurance
Security Assurance
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 

Recently uploaded

Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformKweku Zurek
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...Ahmedabad Escorts
 
Pharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingPharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingArunagarwal328757
 
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...narwatsonia7
 
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Nehru place Escorts
 
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...rajnisinghkjn
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...narwatsonia7
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...rajnisinghkjn
 
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment Booking
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment BookingCall Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment Booking
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment BookingNehru place Escorts
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsMedicoseAcademics
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknownarwatsonia7
 
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...narwatsonia7
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 

Recently uploaded (20)

Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy Platform
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...
Air-Hostess Call Girls Madambakkam - Phone No 7001305949 For Ultimate Sexual ...
 
Pharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingPharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, Pricing
 
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
 
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
Call Girls Service in Virugambakkam - 7001305949 | 24x7 Service Available Nea...
 
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
Dwarka Sector 6 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few Cl...
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
 
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
 
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment Booking
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment BookingCall Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment Booking
Call Girls Service Nandiambakkam | 7001305949 At Low Cost Cash Payment Booking
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes Functions
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
 
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...
Russian Call Girls Gunjur Mugalur Road : 7001305949 High Profile Model Escort...
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
 

Focusing on the Threats to the Detriment of the Vulnerabilities

  • 1. Talk for the NATO Advanced Workshop on Preparedness for Nuclear and Radiological Threats Focusing on the Threats to the Detriment of the Vulnerabilities: A Vulnerability Assessor’s Perspective Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne Na=onal Laboratory 630-­‐252-­‐6168 rogerj@anl.gov hJp://www.ne.anl.gov/capabili=es/vat
  • 2. This is a plea for more, earlier, better, and more imaginative vulnerability assessments for nuclear and radiological security/safeguards and emergency response.
  • 3. Argonne Vulnerability Assessment Team The VAT has done vulnerability assessments on over 1000 different security and safeguards devices, systems, & programs. Sponsors • DOE • DoD • DOS • IAEA • NNSA • private companies • intelligence agencies • public interest organiza:ons
  • 4. Argonne Vulnerability Assessment Team • biometrics • courier bags • GPS spoofing • access control • cargo security • reverse engineering • warehouse security • product tampering • product counterfei=ng • medical device security • consul=ng & training • physical security R&D • security guard turnover • insider threat mi=ga=on • security of sealed sources • security of drug test kits • human factors in security • vulnerability assessments • tamper/intrusion detec=on • RFID spoofing/counterfei=ng • tags & tamper-­‐indica=ng seals • microprocessor & wireless systems • elec=on & vo=ng machine security • countermeasures to security theater • countermeasures to perceptual blindness • nuclear safeguards & monitoring equipment • countermeasures to sleight-­‐of-­‐hand & misdirec=on
  • 5. Definitions Threat: Who might attack, why, when, and how, and with what resources and probabilities. Threat Assessment (TA): Attempting to identify threats.
  • 6. Definitions Vulnerability: A security weakness that can be exploited to cause undesirable consequences. Vulnerability Assessment (VA): Discovering and demonstrating ways to defeat a security device, system, or program. Often includes suggesting countermeasures and security improvements.
  • 7. Things That Often Get Confused with Vulnerabilities ² Assets ² Threats ² Attack Scenarios ² Delay Paths ² Features
  • 8. Threats vs. Vulnerabilities Threat Assessments (TAs) are speculations about groups and people who may or may not exist, their goals, motivations, and resources. TAs are often reactive in nature, i.e., focused on past incidents. Vulnerabilities are right in front of you (if you will open your eyes and mind), and are often testable. VAs are typically proactive in nature. Oddly, however, TAs are usually much more reproducible than VAs!
  • 9. Purpose The purpose of a VA is to: 1. Improve security or emergency response. 2. Serve as one of the inputs to overall Risk Management.
  • 10. • list of assets to protect • asset valua=on/priori=za=on • overall security goals • consequences of successful aJack(s) • threat assessment • vulnerability assessment • available resources & possible security measures • general security philosophy/strategy • psychological tolerance for risk • various es=mated/guessed probabili=es • acceptable tradeoffs in produc=vity vs. security, reputa=on vs. security, morale vs. security, safety vs. security, and liberty/privacy vs. security Modern Risk Management • What INPUT PARAMETERS OUTPUT PARAMETERS: to protect • How to protect it • How à to deploy security resources op=mally DECISION MAKING PROCESS Value Judgments Objec=ve Analysis Subjec=ve Analysis Experience & Exper=se Intui=on & Hunches
  • 11. Not the Purpose The purpose of a VA is not to: • “Validate” • Pass a test • Generate metrics • Justify the status quo • Praise or accuse anybody • Check against some standard • Claim there are no vulnerabilities • Engender warm & happy feelings • Test security or do performance testing • Rationalize the research & development • Apply a mindless, bureaucratic stamp of approval • Endorse a security product or program, or certify it as “good” or “ready for use”
  • 12. Techniques Often Mistaken for VAs • security survey (walking around with a checklist) • security audit (are the rules being followed?) • feature analysis • threat assessment • Design Basis Threat • fault or event tree analysis (from safety engineering) • Delphi Method (method for getting a decision from a panel of experts)
  • 13. Techniques Often Mistaken for VAs • vulnerability “modeling” • software assessment tools • 3D representations of the facility • CARVER Method (DoD & law enforcement) • performance testing • Risk Management • delay path analysis
  • 14. Vulnerabilities Are the Threat Maxim: Security (and emergency response) typically fails not because the threats were misunderstood, but because the vulnerabilities were not recognized and/or not mitigated.
  • 15. Vulnerabilities Trump Threats Maxim: If you understand your threats but are clueless about your vulnerabilities, you’re in trouble. One the other hand, if you understand your vulnerabilities and try to mitigate them, you might be ok, even if you get your threats wrong (which is quite possible).
  • 16. Examples of Vulnerabilities Being the Problem • Hurricane Katrina, 2005 • Breach of the Y-­‐12 nuclear facility by an 82-­‐year-­‐old nun and two other protesters, 2012 • Target stores credit card hack, 2013 • White House fence jumper, 2014
  • 17. Michener’s Maxim: We are never prepared for what we expect.
  • 18. Waylayered Security Maxim: Layered security will fail stupidly.
  • 19. For 170 other security maxims: https://www.scribd.com/doc/46333208/Security-Maxims-October-2014
  • 20. So why are threats more popular • There than vulnerabilities? are fewer threats than vulnerabili=es • TAs are reproducible & reac=ve • Formalis=c, objec=ve methods work fairly well for TAs • VAs require imagina=on, subjec=ve judgment, and “thinking like the bad guys” • No security or emergency response program claims zero threats, but there is strong cogni=ve dissonance about vulnerabili=es • Vulnerabili=es depend cri=cally on local details
  • 21. Thinking Like the Bad Guys Bad Guys Don’t Do: TAs, DBT, security audits, etc. They do something closer to VAs. So if we are going to predict what they might do, we need to do creative VAs as well!
  • 22. Creative Vulnerability Assessments! • Perform a mental coordinate transformation and pretend to be the bad guys (or VAers). (This is much harder than you might think.) • Be much more creative than the adversaries. They need only stumble upon 1 vulnerability, the good guys have to worry about all of them.
  • 23. Creative Vulnerability Assessments! • Don’t let the good guys & the existing security infrastructure and tactics define the problem. • Gleefully look for trouble, rather than seeking to reassure yourself that everything is fine.
  • 24. We need to be more like these expert fault finders. They find problems because they want to find problems, and because they are skeptical: • bad guys • therapists • movie critics • computer hackers • scientific peer reviewers • mothers-in-law
  • 25. Where Vulnerability! Ideas Come From! The Vulnerability Pyramid
  • 26. Warning! “Fear of NORQ” is not a valid reason to try to force-fit formalistic methods onto VAs! The… Non-­‐Objec=ve Non-­‐Reproducible Non-­‐Quan=fiable NORQ All effec=ve security and risk management is ul=mately subjec=ve, no maJer how much we may wish to pretend it isn’t.
  • 27. Emergency Response Two Kinds of Vulnerabilities: - flaws in the response - vulnerability to attacks on the response Are we properly prepared for attacks during emergency response, attacks by the original attackers or by a different set of attackers? (Wait & Pounce is a very effective attack strategy!)
  • 28. Nuclear & Radiological Security Problems from a Vulnerability Assessor’s Perspective • Poor tags & seals, poor use protocols, poor tamper detection for monitoring and security devices • Confusing inventory functions with security functions: why GPS, RFIDs, MC&A programs often provide poor security • VAs not done, not done early, not done iteratively, not done well, not done by the right people • VA myths & blunders • Poor or not-existent Chain of Custody for procured hardware & software
  • 29. Warning: Chain of Custody The importance of a cradle-­‐to-­‐grave, secure chain of custody: Most security devices (locks, tags, seals, access control & biometrics devices, monitoring equipment, etc.) can usually be compromised in ~15 seconds, at the factory or vendor, on the loading dock, in transit, in the receiving department, before or aler being installed. Most “security” and nuclear safeguards devices have liJle built-­‐in security or significant ability to detect intrusion/tampering.
  • 30. Nuclear & Radiological Security Problems from a Vulnerability Assessor’s Perspective • Security as a last-minute “Band-Aid” • Lack of insider threat mitigation • Lack of research-based practice • Few countermeasures for groupthink & cognitive dissonance • Compliance-Based Security and “Security by Obscurity” • Confusing Safety & Security
  • 31. Safety & Security are 2 Relatively Unrelated Problems! Example: March 2012 Recall of 900,000 Safety 1st Push N’ Snap Cabinet Locks 140 reports of babies/toddlers defeating the locks, resulting in 3 poisonings Security: All about intentional nefarious adversaries. Safety: No adversaries.
  • 32. Problem: Lack of Research-Based Security Practice" The Journal of Physical Security A free, non-profit, online peer-reviewed R&D journal http://jps.anl.gov
  • 33. For More Information… rogerj@anl.gov http://www.ne.anl.gov/capabilities/vat