RIS430 - Vulnerability and Threat Analysis

Outline info
Semester
School
Last revision date 2021-01-11 18:32:04.489
Last review date 2021-01-11 18:32:04.49


Subject Title
Vulnerability and Threat Analysis

Subject Description
A variety of instructional techniques will be used including interactive media-rich lectures, problem-based learning, and computer-based lab exercises. Under guidance of faculty, students will apply tools commonly used in industry to test software for vulnerabilities using virtual machines in an isolated security lab, and will look for root causes of these vulnerabilities. Once root causes of vulnerabilities are discovered, students will work in groups to develop mitigation strategies and reports aimed at helping developers make their software more secure.

Credit Status
One credit

Learning Outcomes
Upon successful completion of this subject the student will be able to:

  

  1. Classify software vulnerabilities using industry standards.
  2. Detect vulnerabilities in a distributed computer system.
  3. Explain how vulnerabilities can be exploited to create threats to a system
  4. Explain how to reduce risk from uncovered vulnerabilities in a business system
  5. Develop a vulnerability assessment report including mitigation strategies
  6. Formulate an effective vulnerability management program for an organization

Essential Employability Skills

    •  Communicate clearly, concisely and correctly in the written, spoken and visual form that fulfils the purpose and meets the needs of the audience.

    •  Respond to written, spoken, or visual messages in a manner that ensures effective communication.

    •  Execute mathematical operations accurately.

    •  Apply a systematic approach to solve problems.

    •  Use a variety of thinking skills to anticipate and solve problems.

    •  Locate, select, organize, and document information using appropriate technology and information systems.

    •  Analyze, evaluate, and apply relevant information from a variety of sources.

    •  Show respect for diverse opinions, values, belief systems, and contributions of others.

    •  Interact with others in groups or teams in ways that contribute to effective working relationships and the achievement of goals.

    •  Manage the use of time and other resources to complete projects.

    •  Take responsibility for one's own actions, decisions, and consequences.

Academic Integrity
Seneca upholds a learning community that values academic integrity, honesty, fairness, trust, respect, responsibility and courage. These values enhance Seneca's commitment to deliver high-quality education and teaching excellence, while supporting a positive learning environment. Ensure that you are aware of Seneca's Academic Integrity Policy which can be found at: http://www.senecapolytechnic.ca/about/policies/academic-integrity-policy.html Review section 2 of the policy for details regarding approaches to supporting integrity. Section 2.3 and Appendix B of the policy describe various sanctions that can be applied, if there is suspected academic misconduct (e.g., contract cheating, cheating, falsification, impersonation or plagiarism).

Please visit the Academic Integrity website http://open2.senecac.on.ca/sites/academic-integrity/for-students to understand and learn more about how to prepare and submit work so that it supports academic integrity, and to avoid academic misconduct.

Discrimination/Harassment
All students and employees have the right to study and work in an environment that is free from discrimination and/or harassment. Language or activities that defeat this objective violate the College Policy on Discrimination/Harassment and shall not be tolerated. Information and assistance are available from the Student Conduct Office at student.conduct@senecapolytechnic.ca.

Accommodation for Students with Disabilities
The College will provide reasonable accommodation to students with disabilities in order to promote academic success. If you require accommodation, contact the Counselling and Accessibility Services Office at ext. 22900 to initiate the process for documenting, assessing and implementing your individual accommodation needs.

Camera Use and Recordings - Synchronous (Live) Classes
Synchronous (live) classes may be delivered in person, in a Flexible Learning space, or online through a Seneca web conferencing platform such as MS Teams or Zoom. Flexible Learning spaces are equipped with cameras, microphones, monitors and speakers that capture and stream instructor and student interactions, providing an in-person experience for students choosing to study online.

Students joining a live class online may be required to have a working camera in order to participate, or for certain activities (e.g. group work, assessments), and high-speed broadband access (e.g. Cable, DSL) is highly recommended. In the event students encounter circumstances that impact their ability to join the platform with their camera on, they should reach out to the professor to discuss. Live classes may be recorded and made available to students to support access to course content and promote student learning and success.

By attending live classes, students are consenting to the collection and use of their personal information for the purposes of administering the class and associated coursework. To learn more about Seneca's privacy practices, visit Privacy Notice.

Prerequisite(s)
SPR320 & DCN330

Mode of Instruction
A variety of instructional techniques will be used including interactive media-rich lectures, problem-based learning, and computer-based lab exercises. Under guidance of faculty, students will apply tools commonly used in industry to test software for vulnerabilities using virtual machines in an isolated security lab, and will look for root causes of these vulnerabilities. Once root causes of vulnerabilities are discovered, students will work in groups to develop mitigation strategies and reports aimed at helping developers make their software more secure.

Prescribed Texts
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk
by Andrew Magnusson
Publisher: No Starch Press (September 2020)
ISBN-13: 9781593279882
 
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
by James Forshaw
Publisher: No Starch Press (Dec 8 2017)
ISBN-13: 978-1593277505
 
Hacking, The Art of Exploitation 2nd Edition
by Jon Erickson
Publisher: No Starch Press (February 2008)
ISBN-13: 9781593271442

Reference Material
N/A

Required Supplies
N/A

Student Progression and Promotion Policy
http://www.senecapolytechnic.ca/about/policies/student-progression-and-promotion-policy.html

Grading Policyhttp://www.senecapolytechnic.ca/about/policies/grading-policy.html)

A+90%  to  100%
A80%  to  89%
B+75%  to  79%
B70%  to  74%
C+65%  to  69%
C60%  to  64%
D+55%  to  59%
D50%  to  54%
F0%    to  49% (Not a Pass)
OR
EXCExcellent
SATSatisfactory
UNSATUnsatisfactory

For further information, see a copy of the Academic Policy, available online (http://www.senecapolytechnic.ca/about/policies/academics-and-student-services.html) or at Seneca's Registrar's Offices.(http://www.senecapolytechnic.ca/registrar/gpacalulator.html)


Topic Outline


Content Outline by Topic
Basic Concepts
CIA Triad and vulnerabilities
Vulnerability Management Overview
Vulnerability Management vs Risk Management
Common application vulnerabilities

Sources of Information
Assets
Vulnerabilities
Exploits
Advanced

Vulnerability Scanners
What they do
How they work
Deployment
Results

Automating Vulnerability Management
The automation process
Data collection
Scans and updates
Exploits
CIS controls
     1.* Inventory and control of hardware assets
     2.* Inventory and control of software assets
     3.* Continuous vulnerability scanning
     9.3 Perform automated port scans
     11.3 Use automated tools to verify standard device config.

Dealing with Vulnerabilities
Patching
Mitigation
Systemic Measures
Risk
Defense in depth, vs zero-trust
Control validation, formal testing of changes
Untested change is automatic failure

Organizational Support & Office Politics
Balancing competing priorities
Gaining support

Environment Setup
System setup
Tool installation
Updating

Data Collection Tools
nmap
OpenVAS
cve-search
cwe
visualization

Creating an Asset and Vulnerability Database
database prep
database structure
getting nmap into database
getting OpenVAS into database
cve and cwe
visualization

Maintaining the Database
indexes
keeping data fresh

Generating Asset and Vulnerability Reports
Asset reports
Vulnerability reports

Automating Scans and Reporting
automation process
script planning
script assembly
plugins

Advanced Reporting
Detailed asset reporting
Detailed vulnerability reporting
Exploitable vulnerability reporting

Advanced Topics
REST APIs
Automating exploitation
Using the cloud
Application reverse engineering
The root causes of vulnerabilities
Exploitation and shellcode

Conclusion
Design, build, maintain
Commercial Products
Trends: clouds, containers, zero-trust

 

Modes of Evaluation
Tests, written and practical            20%
Labs                                               25%
Assignments                                  25%
Final project                                   30%

Approved by: Suzanne Abraham