SlideShare une entreprise Scribd logo
1  sur  45
ABUSER STORIES
Judy Neher
Certified Scrum Trainer®
Twitter/LinkedIn @judyneher
What industries are
represented in the
room?
Standing survey!
Judy Neher, CST
• Certified Scrum Trainer® (CST)
• BS Mathematics, University of North Carolina
at Chapel Hill
• MS Computer Science, The Johns Hopkins
University
• Mathematician -> Computer Scientist ->
Software Manager
• Scrum Trainer, Agile coach, trainer, and
consultant
My Goal…
Get you to think like a bad guy!!
Worst Hacks of 2018
Your Travel
• 500 million travelers who
made reservations since 2014
• Undetected until September
8th 2018
• 327 million lost name, address,
phone, email, DOB, gender,
passport number
• One of the largest data
breaches in history.
Your Life Story
• 30 million accounts
• Since July 2017 but
detected Sep 2018
• Using the “View As”
feature, exposed a
diverse treasure trove of
user data
City of Atlanta
• March 2018
• Ransomware attack
• Destabilized municipal
operations
• Months/Millions of dollars
The Olympic
Destroyer
• Retaliation for Russia’s
doping ban
• Knocked out Wi-Fi, the
Olympics website and
network devices
Your Travel Details at
Risk:
• British Airways:
• 21 Aug – 5 Sep: 380,000 reservations
• Names, addresses, email addresses, credit card
information using skimming code
• Cathay Pacific:
• 9.4 million travelers
• 3 months to fend off attackers
• Names, DOBs, addresses, passport numbers
$$ The average cost of a malware attack on a company is $2.4 million. (Accenture)
$$ The average cost per lost or stolen records per individual is $141 — but that cost
varies per country. Breaches are most expensive in the United States ($225) and
Canada ($190). (Ponemon Institute’s 2017 Cost of Data Breach Study)
$$ Damage related to cybercrime is projected to hit $6 trillion annually by 2021.
(Cybersecurity Ventures)
What is this costing?
Shout Out!
How do we reverse
these trends?
USER STORIES
AS A on-line gambler
I WANT TO enter a bet
SO THAT I can play and hopefully win!!
• Player can enter an amount between
$1.00 and $50.00
• Player has a house account
ABUSER STORIES
SECURITY
Implement security for user information.
AS AN <adversary>
I WANT TO <intent>
SO THAT <motivation>
AS A malicious hacker,
I WANT TO steal credit card info
SO THAT I can make fraudulent charges.
AS A Shopper
I WANT to put items in my cart
SO THAT I may purchase the items.
ACCEPTANCE AND
REFUTATION CRITERIA
• Acceptance Criteria
• Acceptance Testing
User
Story
• Refutation
• Demonstrate that described
attacks are impossible
Abuser
Story
GOAL:
Reduce risk to an acceptable level.
AS A Shopper
I WANT to put items in my cart
SO THAT I may purchase the items.
AS A Hacker
I WANT impersonate legitimate shoppers
SO THAT I can access their credit cards.
ESTIMATION AND
PRIORITIZATION
COST =
Loss due to a successful attack or probability
of an attack.
NET BUSINESS VALUE =
Business Value (user story) –
Risk (attack surface created by the user story)
Technology Breakthroughs
Counter measures taken
In prior sprints
More attractive assets
Better funded adversaries
Don’t Hide the Cost of Security!
Explicit
• User registration story
implementing a secure
connection
Not So Explicit
• Defending against a Denial
of Service Attack
• Ensuring Scalability
Writing Good Abuser
Stories!
Who Writes
Abuser
Stories?
Inspiration Source =
Assets
• Intrinsic value (e.g. money in a bank
account)
• Derived value (e.g. revenue generation from
a random process at a gambling site)
Inspiration Source = Attackers
SHOUT OUT!
Who are some of your adversaries?
Connect!
@judyneher
Sources
Cost-Effective Security, Johan Peeters, Paul
Dyson, May/June 2007.
Agile Security Requirements Engineering,
Johan Peeters.
https://www.varonis.com/blog/cybersecurity-
statistics/
https://www.wired.com/story/worst-hacks-2018-
facebook-marriott-quora/
ProjectConEvent.com

Contenu connexe

Similaire à Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers806670
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing Alert Logic
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsGabor Szathmari
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and securityDheeraj Kumar Tiwari
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Steve Poole
 
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jWebinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jNeo4j
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)ameyjakate
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j
 
Fighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterFighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterNeo4j
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 

Similaire à Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities (20)

A delightful way to teach kids about computers
A delightful way to teach kids about computersA delightful way to teach kids about computers
A delightful way to teach kids about computers
 
Recent PCI Hacks
Recent PCI HacksRecent PCI Hacks
Recent PCI Hacks
 
Cybersecurity for Marketing
Cybersecurity for Marketing Cybersecurity for Marketing
Cybersecurity for Marketing
 
Digital Identity (Digital ATL)
Digital Identity (Digital ATL)Digital Identity (Digital ATL)
Digital Identity (Digital ATL)
 
How to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scamsHow to protect your clients and your law firm from money transfer scams
How to protect your clients and your law firm from money transfer scams
 
Internet scams
Internet scamsInternet scams
Internet scams
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Webinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4jWebinar: Stop Complex Fraud in its Tracks with Neo4j
Webinar: Stop Complex Fraud in its Tracks with Neo4j
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4jNeo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
Neo4j GraphTalks - Fighting fraud with Neo4j - Kees Vegter, Neo4j
 
Fighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees VegterFighting Fraud with Neo4j, Kees Vegter
Fighting Fraud with Neo4j, Kees Vegter
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 

Plus de ProjectCon

Acceleration & Focus - A Simple Approach to Faster Execution
Acceleration & Focus - A Simple Approach to Faster ExecutionAcceleration & Focus - A Simple Approach to Faster Execution
Acceleration & Focus - A Simple Approach to Faster ExecutionProjectCon
 
Secrets of the Agile Manifesto
Secrets of the Agile ManifestoSecrets of the Agile Manifesto
Secrets of the Agile ManifestoProjectCon
 
The Agile PMP: What PMPs need to know to compete in today's market
The Agile PMP: What PMPs need to know to compete in today's marketThe Agile PMP: What PMPs need to know to compete in today's market
The Agile PMP: What PMPs need to know to compete in today's marketProjectCon
 
Teaming for Agility
Teaming for AgilityTeaming for Agility
Teaming for AgilityProjectCon
 
Transformation of an Agile Purist to an Agile Mind
Transformation of an Agile Purist to an Agile MindTransformation of an Agile Purist to an Agile Mind
Transformation of an Agile Purist to an Agile MindProjectCon
 
Automated Release Pipelines with Azure DevOps
Automated Release Pipelines with Azure DevOpsAutomated Release Pipelines with Azure DevOps
Automated Release Pipelines with Azure DevOpsProjectCon
 
The Women in Agile Story - History of the Movement through MVP Experiments
The Women in Agile Story - History of the Movement through MVP ExperimentsThe Women in Agile Story - History of the Movement through MVP Experiments
The Women in Agile Story - History of the Movement through MVP ExperimentsProjectCon
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk ManagementProjectCon
 
Day projectcon real-world-scrum
Day projectcon real-world-scrumDay projectcon real-world-scrum
Day projectcon real-world-scrumProjectCon
 
Capturing Lessons Learned Information – Making your current and future projec...
Capturing Lessons Learned Information – Making your current and future projec...Capturing Lessons Learned Information – Making your current and future projec...
Capturing Lessons Learned Information – Making your current and future projec...ProjectCon
 
Mind the Gap - The Tension Between Job Titles and Agility
Mind the Gap - The Tension Between Job Titles and AgilityMind the Gap - The Tension Between Job Titles and Agility
Mind the Gap - The Tension Between Job Titles and AgilityProjectCon
 
Tamika Catchings - AM Keynote
Tamika Catchings - AM KeynoteTamika Catchings - AM Keynote
Tamika Catchings - AM KeynoteProjectCon
 
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?ProjectCon
 
Sonal Sheth Zawahri - Thinking Strategically
Sonal Sheth Zawahri - Thinking StrategicallySonal Sheth Zawahri - Thinking Strategically
Sonal Sheth Zawahri - Thinking StrategicallyProjectCon
 
Sonal Sheth Zawahri - Finding Your Team's Purpose
Sonal Sheth Zawahri - Finding Your Team's PurposeSonal Sheth Zawahri - Finding Your Team's Purpose
Sonal Sheth Zawahri - Finding Your Team's PurposeProjectCon
 
Stevie Borne - Improving Your Listening Mojo
Stevie Borne - Improving Your Listening Mojo Stevie Borne - Improving Your Listening Mojo
Stevie Borne - Improving Your Listening Mojo ProjectCon
 
Scott Ambler - Disciplined Agile: Winning the Race to Business Agility
Scott Ambler - Disciplined Agile: Winning the Race to Business AgilityScott Ambler - Disciplined Agile: Winning the Race to Business Agility
Scott Ambler - Disciplined Agile: Winning the Race to Business AgilityProjectCon
 
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at Home
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at HomeStacey Ackerman - 5 Easy Ways to Get Started with Scrum at Home
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at HomeProjectCon
 
Ryan Ripley & Jessica Soroky - PM Keynote
Ryan Ripley & Jessica Soroky - PM Keynote Ryan Ripley & Jessica Soroky - PM Keynote
Ryan Ripley & Jessica Soroky - PM Keynote ProjectCon
 

Plus de ProjectCon (20)

Acceleration & Focus - A Simple Approach to Faster Execution
Acceleration & Focus - A Simple Approach to Faster ExecutionAcceleration & Focus - A Simple Approach to Faster Execution
Acceleration & Focus - A Simple Approach to Faster Execution
 
Secrets of the Agile Manifesto
Secrets of the Agile ManifestoSecrets of the Agile Manifesto
Secrets of the Agile Manifesto
 
The Agile PMP: What PMPs need to know to compete in today's market
The Agile PMP: What PMPs need to know to compete in today's marketThe Agile PMP: What PMPs need to know to compete in today's market
The Agile PMP: What PMPs need to know to compete in today's market
 
Teaming for Agility
Teaming for AgilityTeaming for Agility
Teaming for Agility
 
Transformation of an Agile Purist to an Agile Mind
Transformation of an Agile Purist to an Agile MindTransformation of an Agile Purist to an Agile Mind
Transformation of an Agile Purist to an Agile Mind
 
The Agile PMO
The Agile PMOThe Agile PMO
The Agile PMO
 
Automated Release Pipelines with Azure DevOps
Automated Release Pipelines with Azure DevOpsAutomated Release Pipelines with Azure DevOps
Automated Release Pipelines with Azure DevOps
 
The Women in Agile Story - History of the Movement through MVP Experiments
The Women in Agile Story - History of the Movement through MVP ExperimentsThe Women in Agile Story - History of the Movement through MVP Experiments
The Women in Agile Story - History of the Movement through MVP Experiments
 
A Guide to Risk Management
A Guide to Risk ManagementA Guide to Risk Management
A Guide to Risk Management
 
Day projectcon real-world-scrum
Day projectcon real-world-scrumDay projectcon real-world-scrum
Day projectcon real-world-scrum
 
Capturing Lessons Learned Information – Making your current and future projec...
Capturing Lessons Learned Information – Making your current and future projec...Capturing Lessons Learned Information – Making your current and future projec...
Capturing Lessons Learned Information – Making your current and future projec...
 
Mind the Gap - The Tension Between Job Titles and Agility
Mind the Gap - The Tension Between Job Titles and AgilityMind the Gap - The Tension Between Job Titles and Agility
Mind the Gap - The Tension Between Job Titles and Agility
 
Tamika Catchings - AM Keynote
Tamika Catchings - AM KeynoteTamika Catchings - AM Keynote
Tamika Catchings - AM Keynote
 
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?
Stacey Ackerman & Stevie Borne - Are you Agile Enough to Reinvent Yourself?
 
Sonal Sheth Zawahri - Thinking Strategically
Sonal Sheth Zawahri - Thinking StrategicallySonal Sheth Zawahri - Thinking Strategically
Sonal Sheth Zawahri - Thinking Strategically
 
Sonal Sheth Zawahri - Finding Your Team's Purpose
Sonal Sheth Zawahri - Finding Your Team's PurposeSonal Sheth Zawahri - Finding Your Team's Purpose
Sonal Sheth Zawahri - Finding Your Team's Purpose
 
Stevie Borne - Improving Your Listening Mojo
Stevie Borne - Improving Your Listening Mojo Stevie Borne - Improving Your Listening Mojo
Stevie Borne - Improving Your Listening Mojo
 
Scott Ambler - Disciplined Agile: Winning the Race to Business Agility
Scott Ambler - Disciplined Agile: Winning the Race to Business AgilityScott Ambler - Disciplined Agile: Winning the Race to Business Agility
Scott Ambler - Disciplined Agile: Winning the Race to Business Agility
 
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at Home
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at HomeStacey Ackerman - 5 Easy Ways to Get Started with Scrum at Home
Stacey Ackerman - 5 Easy Ways to Get Started with Scrum at Home
 
Ryan Ripley & Jessica Soroky - PM Keynote
Ryan Ripley & Jessica Soroky - PM Keynote Ryan Ripley & Jessica Soroky - PM Keynote
Ryan Ripley & Jessica Soroky - PM Keynote
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Abuser Stories: Thinking Like the Bad Guy to Reduce Software Vulnerabilities

Notes de l'éditeur

  1. Education Government Finance Healthcare What else?
  2. At the end of November, the massive hotel chain Marriott announced that as many as 500 million travelers who made a reservation at a Starwood hotel since 2014 had their data compromised. The hack originated at Starwood's reservation system; Marriott acquired that hotel group in September 2016, but the intrusion went undetected until September 8 of this year. Marriott says it blocked attacker access by September 10, but it took until November 19 for the company to fully understand the scale of the breach. Reports have increasingly indicated state-sponsored Chinese hackers were behind the attack, though this attribution has not been officially confirmed. The stolen data would be an espionage bonanza for government hackers, though. About 170 million impacted Marriott customers only had their names and basic information like address or email address stolen, but about 327 million people lost much more. Marriott says that this larger group had different combinations of name, address, phone number, email address, date of birth, gender, trip and reservation information, passport number, and Starwood Preferred Guest account information stolen. The Marriott incident is one of the largest data breaches in history.
  3. At the end of September, Facebook disclosed a data breach in which attackers gained access to 30 million accounts by stealing "user authorization tokens," essentially access badges that get generated after a user successfully logs in. Sites use authorization token schemes so users don't need to sign in multiple times as they move around a platform. In Facebook's case, the attackers coordinated exploitation of three different bugs in the social network's "View As" feature to grab user tokens, gain access to Facebook accounts, and exfiltrate a significant and diverse trove of user data. The vulnerabilities existed in Facebook's platform since July 2017, but the company only detected suspicious activity related to them on September 14 of this year. Eventually, Facebook discovered the flaws and the attack on September 25. Here's how to check whether your Facebook account data was compromised in the breach. The company is investigating with the FBI, and hasn't said who may have been behind the hack. The incident is Facebook's first known data breach—impressive given that the platform has existed for well over a decade. But between the company's increasingly dismal track record on third-party access limits and a recent incident in which a bug exposed 6.8 million users' photos to third-party developers, it's hard to feel like things are going as well as they could on the user privacy and data management front.
  4. In March, a ransomware attack locked down the City of Atlanta's digital systems, destabilizing municipal operations. The recovery took months, not to mention millions of dollars. The notorious SamSam criminal hacking group targeted the city and asked for about $50,000-worth of bitcoin. The ransomware attack affected five of Atlanta's 13 government departments, and undermined services like the Atlanta Police Department's records system, infrastructure maintenance requests, and court networks. Atlanta residents also couldn't pay their water bills for days. At the end of November, the Department of Justice indicted two Iranian men for allegedly carrying out SamSam attacks.
  5. In the lead up to the Pyeongchang Olympics, Russian hackers launched a number of related cyberattacks as retaliation for the country's doping ban from the games. Then, before the opening ceremony of the Olympics in February, they orchestrated a hack that crippled the event's IT infrastructure, knocking out Wi-Fi, the Olympics website, and network devices in the process. Hackers used a worm dubbed Olympic Destroyer to wreak havoc as event technicians raced to restore service. Then in June, the same hackers reemerged—this time in preliminary spear phishing attacks against labs that research biological and chemical threats in France, Germany, Switzerland, Russia, and Ukraine. Specifically, the targeted lab investigating the poisoning of former Russian double agent Sergei Skripal. Those attacks did not turn destructive—although no telling if they might have had security researchers not spotted them first.
  6. At the beginning of September, British Airways revealed a data breach that impacted information from 380,000 reservations made between August 21 and September 5 of this year. The company said that names, addresses, email addresses, and sensitive payment card details were all stolen in the breach. Hackers from the well-known criminal group Magecart pulled off the attack by specifically evaluating the airline's digital systems and tailoring a plan for installing malicious skimming code in its payment data entry forms. That way, any time someone entered information to make a reservation, all the data would silently go to Magecart. Cathay Pacific also announced an even larger data breach perpetrated in March that impacted 9.4 million travelers. The airline first disclosed the breach at the end of October. It then added in November that the intrusion had been even more intense than it originally said, and that it took three months to fend the hackers off. Cathay has been widely criticized for its delayed disclosure and lack of transparency about the incident. Data stolen in the breach included passenger names, dates of birth, addresses, telephone numbers, email addresses, nationalities, passport numbers, frequent flier membership numbers, and other ID numbers. Airlines can be a particularly valuable target for hackers, because they hold both personal and financial data, as well as travel data and passport numbers.
  7. What security relevant acceptance criteria is missing? User logs in with his credentials. k
  8. What’s missing? How can this feature be exploited? What security relevant acceptance criteria is missing? The user authenticates himself Talk at your tables for 5 mins about how this feature can be exploited, what security relevant acceptance criteria should be added and then share.
  9. One way to look at security: typical security requirement How excited would you be about implementing this feature? Functional features tend to overshadow these types of requirments!
  10. Here’s another way…. Identify how attackers may abuse the system and jeopardize stakeholder assets. Help organizations see their products in the same way attackers do. Describe how users can misuse a system with malicious intent. Every time a new requirement, feature is created, someone should spend time thinking about how that feature might be unintentionally or intentionally abused.
  11. Help organizations see their products in the same way attackers do. Describe how users can misuse a system with malicious intent. Every time a new requirement, feature is created, someone should spend time thinking about how that feature might be unintentionally or intentionally abused. Stories are logically equivalent, except from a planning standpoint Estimating value, cost and effort significantly more difficult for the abuser story
  12. Brainstorm some abuser stories for this feature. TIMEBOX = 5 mins
  13. What’s missing? How can this feature be exploited? What security relevant acceptance criteria is missing? The user authenticates himself Talk at your tables for 5 mins about how this feature can be exploited, what security relevant acceptance criteria should be added and then share.
  14. No absolute guarantee that no exploitable vulnerability remains.
  15. What would be some acceptance criteria for this story?
  16. Add refutation criteria to your abuser stories! Timebox = 5 mins What would be some refutation criteria for this story? User cannot login without 2 forms of identification User cannot see credit card information
  17. User stories carry business value. Abuser Stories bring an expected cost = loss due to a successful attack or probability of an attack
  18. Examples: If a design assumes that connections from the Web server to the database server are always valid an attacker will try to make the Web server send inappropriate requests to access valuable data. If the software design assumes that the client never modifies its Web browser cookies before they are sent back to the requesting server (in an attempt to preserve some state), attackers will intentionally cause problems by modifying the cookies. Every sprint should optimize net value!
  19. Abuser stories value and rank can be affected by…. A technological breakthrough may make an attack easier and therefore more likely. Assets may become more attractive targets. Adversaries may become better funded. Similar systems may since have been secured, making the system being developed the weakest in its class. Countermeasures taken in previous sprints may increase the risk of an abuser story because it has become the easiest way to attach the system.
  20. User stories are written by customers. Customers should also be involved in writing abuser stories, as they are attuned to the business assets which need protection. However, to achieve a good threat coverage quickly it is essential to draw on the expertise of the development team because many hands make light work and because developers distinctive areas of expertise tend to make them sensitive to certain types of threats sooner than non-technical authors. Some of the systems assets are, by definition, of a technical nature. In the example of the gambling web site, it is likely that customers will quickly come up with threats to various accounts. For example, they may point out that accounts holding user’s gains must be protected from attack. Threats to the randomness of the gambling process, on the other hand are more readily identified by a developers. So abuser stories depart from traditional agile requirements engineering to the extent that they are no exclusives written by customers, but jointly with the development team. They reinforce the agile principle of involving all team members in a broad spectrum of activities. No one I deemed to have a monopoly on a given area of expertise.
  21. Assets are a good starting point for writing abuser stories. Anything of value to the customer which is potentially accessible through the system, should be considered a target. An asset may have intrinsic value, such as a money in a bank account, or it may derive its value from its role in revenue generation, such as a random process at a gambling site. The latter are harder to identify, but will tend to show up with examining who the attackers are, their motivation, resources and expertise.
  22. The nature of an attack is largely determined by the kind of adversary. I therefore pays to reflect on who protential abusers may be. Pertitnetn factors include the resources they command, their skills, motivation and risk aversion. Predators co-evolve with their prey and hence sensitivity to the species that inhabit the customer’s ecosystem is required. The history of the customer’s industry is typically a good guide to the motivation and even the attack techniques. Skills and resources are, in a certain sense, interchangeable as a resourceful adversary can hire skillful mercenaries. Organized crime is a resourceful adversary. So are intelligence agencies and terrorists. However, their motivations are different and they will go after different targets, use different techniques and have a distinctive risk assessment. Attackers are unlikely to invest many resources unless they have a clear motive. At the other end of the spectrum lie low-investment acts of vandalism. Threats from low-skilled system users may have devastating consequences. Secret gamblers using the example gambling site may rather deny using the site than settle their debts. Customer staff are a rich source of inspiration for potential attackers. The majority of fraud cases occur with inside help.
  23. Add refutation criteria to your abuser stories! Timebox = 5 mins What would be some refutation criteria for this story? User cannot login without 2 forms of identification User cannot see credit card information