本课程由纽约州立大学布法罗分校教授Shambhu J. Upadhyaya讲授。
本模块的目的是教您如何应对发生的安全违规事件。我们将从威胁前景和系统故障入手,研究安全性和可靠性之间的相互作用,这对于构建可靠的系统至关重要。还将描述检测安全漏洞的持续监控机制,以及取证、漏洞响应和恢复的策略。
4.1 违规响应
0:00
[MUSIC] Having studied the security aspects or the key operational technologies, of the digital manufacturing and design process, and knowing the techniques to protect the intellectual property outcomes of DMD in module three. Let us now see how to respond to security breaches when they happen.
研究了安全方面或关键操作技术后,数字化制造和设计过程,并且知道保护第三单元中DMD的知识产权成果。现在,让我们看看当安全漏洞发生时,如何应对。
0:24
We will start with the threat landscape and system failures and investigate the interplay between security and reliability, which are essential for building dependable systems. The mechanism of continuous monitoring to detect security breaches and strategies for forensics, breach response and recovery, will also be described.
我们将从威胁形势开始系统故障,并研究安全性和可靠性,这对于构建可靠的系统是必不可少的。持续监控以检测安全漏洞的机制还将介绍取证、违规响应和恢复策略。
0:48
Upon completion of this module, you will be able to plan appropriate breach response according to the presented threat landscapes.Assess security of a system and suggest ways to detect security breaches. Suggest tools and strategies for intrusion detection and monitoring.
学完本模块后,您将能够规划根据呈现的威胁环境采取适当的违规应对措施。评估系统的安全性,并提出检测安全漏洞的方法。建议入侵检测和监控的工具和策略。
1:09
Participate in discussions with peers on investigating a security breach and cyber forensics. [MUSIC] Threat modeling is the fundamental step for the design of attack detection and response systems. And in the DMD realm, it should be done in both digital and physical domains. The concept of attack surface and how to determine the attack surface will also be described.
参与同行关于调查安全漏洞的讨论,并网络取证。[音乐]威胁建模是攻击检测设计的基本步骤响应系统。在DMD领域,应该在数字和物理领域同时进行。攻击面的概念和还将描述如何确定攻击面。
1:43
Threat landscape refers to collecting and evaluating existing and rising threats in an organization.Threat landscape is a collection of information about emerging and existing threat trends around the world in different organizations. These threats are then rank according to the frequency of their occurrence. The occurrence frequency of a threat is a more important factor than the damage capacity of a threat. Since the former shows the prevalence of emerging threats.
威胁前景是指收集和评估组织中现有的和新出现的威胁。威胁形势是关于新出现的和世界各地不同组织中的现有威胁趋势。然后,根据出现的频率对这些威胁进行排序。威胁的发生频率是一个更重要的因素比威胁的破坏力更大。因为前者显示了新出现的威胁的普遍性。
2:21
Threat landscape helps in the design of strategies to overcome different emerging or existing cyber threats. In this manner, organizations can design better security solutions by considering threat landscape as their aim.Once the defender has a reasonable comprehension of the threat landscape, a precise model of the threat should be developed.A threat is a potential or actual undesirable event that may be malicious or accidental.Threat modeling is a planned activity for identifying and assessing system threats and vulnerabilities.
威胁形势有助于设计克服不同的新兴或现有网络威胁的策略。通过这种方式,组织可以设计更好的安全性将威胁前景视为目标的解决方案。一旦防御方对威胁形势有了合理的理解,应该开发一个威胁的精确模型。威胁是潜在的或可能是恶意或意外的实际不良事件。威胁建模是一项有计划的活动识别和评估系统威胁和漏洞。
3:08
Threat modeling defines an organized procedure for optimizing or improving network or program security of an organization by identifying, assessing, and ranking the threats and vulnerabilities in the system.The assessment of threats and vulnerabilities can be done by utilizing the knowledge of the threat landscape.Thereafter, the counter measure steps can be defined or developed to prevent or mitigate the effect of the security risks identified.Threat Modeling can be combined into the Security Development Lifecycle Model, which we'll refer to as SDLC in module two to detect vulnerabilities in this system.Using threat modeling in SDLC improves the security of a system by multiple folds.
威胁建模定义了一个有组织的过程,用于优化或提高组织的网络或程序安全性,评估和排列系统中的威胁和漏洞。威胁评估和利用对威胁环境的了解可以发现漏洞。此后,可以定义反措施步骤,或者旨在防止或减轻已识别的安全风险的影响。威胁建模可以合并到安全开发生命周期模型中,在模块2中,我们称之为SDLC,用于检测系统中的漏洞。在SDLC中使用威胁建模可以成倍提高系统的安全性。
4:07
Threat model can also be implemented into an existing security system by separating the system design into different components. And then ranking them by assessing threats and vulnerabilities in each component.Let us now put threat modeling in perspective. There are three main steps in the development of a security solution.One, decompose the application or a system into components.Two, determine and rank threats and develop the threat model.
威胁模型也可以在现有安全系统中实现通过将系统设计分成不同的组件。然后通过评估每个组件中的威胁和漏洞对它们进行排序。现在,让我们正确看待威胁建模。开发安全解决方案有三个主要步骤。第一,将应用程序或系统分解成组件。第二,确定威胁并对其进行分级,并开发威胁模型。
4:43
Three, develop counter measures and mitigation strategies using the threat model so developed and using the various security principles studied in this course.Finally, in this lesson, let us try to understand what is an attack surface.
三、制定应对措施使用如此开发的威胁模型的缓解策略,以及使用本课程中学习的各种安全原则。最后,在本课中,让我们试着理解什么是攻击面。
5:04
Attack surface refers to the vulnerable parts or components of a system from which an attacker can gain access to the system or application functions.Starting with an understanding of the threat landscape and the development of a threat model, the attack surface analysis can help you to identify components of the system to determine security vulnerabilities. Identify high risk areas or parts of the system that need higher security. Identify when you have redefined the attack surface and need to do some kind of threat assessment. In conclusion, threat modeling is an essential step of cybersecurity in any process, including digital manufacturing.
攻击面是指系统中易受攻击的部分或组件攻击者可以通过该漏洞访问系统或应用程序功能。从了解威胁形势开始,并威胁模型的开发,攻击面分析可以有所帮助您需要识别系统的组件,以确定安全漏洞。识别系统中需要更高安全性的高风险区域或部分。确定何时重新定义了攻击面,并需要做一些威胁评估。总之,在任何情况下,威胁建模都是网络安全的重要步骤过程,包括数字制造。
5:57
In the cyber domain, this is quite a mature process. Technical approaches have been developed by companies such as Microsoft, and researchers have developed tools such as attack graphs, privilege graphs, fault trees and so on. In the physical domain, the threat modeling is still ad hoc and it is an ongoing research topic.
在网络领域,这是一个相当成熟的过程。微软等公司已经开发了技术方法,研究人员开发了一些工具,比如攻击图,特权图,故障树等等。在物理领域,威胁建模仍然是临时的,是一个正在进行的研究课题。
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...