- •Тема: «Проведение анализа и оценки возможностей реализации угроз информационной безопасности на объекте по методике С.В. Вихорева»
- •ПОСТАНОВКА ЗАДАЧИ
- •1. Описание предприятия ПАО «Яндекс»
- •2. Ранжирование угроз ИБ
- •Коэффициенты приоритетности целей ИБ
- •3. Ранжирование групп источников угроз ИБ
- •Группа источников угроз ИБ
- •Оценка степени опасности источников угроз ИБ
- •Техногенные внутренние источники угроз
- •Перечень актуальных источников угроз ИБ
- •Нормированные весовые коэффициенты групп методов реализации угроз и взаимосвязи групп методов реализации и источников угроз при равенстве приоритетов целей информационной безопасности
- •Коэффициенты корреляции и промежуточные результаты расчетов
- •Ориентировочная оценка степени опасности уязвимостей
- •Перечень актуальных уязвимостей
- •ВОЗМОЖНЫЕ ВАРИАНТЫ АТАК
- •Реализация угроз «БЛОКИРОВАНИЕ» и «УНИЧТОЖЕНИЕ»
|
|
Перечень актуальных уязвимостей |
|
|
|
|||||
|
|
|
|
|
|
|
|
|||
Код |
|
Уязвимости |
|
(k1)f |
(k2)f |
(k3)f |
(Kоп)f |
|||
[A.II.a.4] |
аппаратные закладки, устанавливаемые |
5 |
5 |
5 |
0,64 |
|||||
в технических средствах |
|
|||||||||
[A.II.b.1] |
вредоносные программы |
|
5 |
5 |
5 |
0,64 |
||||
[A.IV.a.1] |
отсутствие контролируемой зоны |
4 |
5 |
5 |
0,624 |
|||||
[A.IV.a.2] |
наличие прямой видимости объектов |
4 |
5 |
4 |
0,4992 |
|||||
[A.IV.b.2] |
использование |
|
|
глобальных |
5 |
5 |
5 |
0,78 |
||
информационных сетей |
|
|
||||||||
[A.IV.b.3] |
использование арендуемых каналов |
3 |
5 |
4 |
0,37 |
|||||
[B.I.a.2] |
ошибки |
при |
инсталляции |
и загрузке |
3 |
5 |
5 |
0,49 |
||
программного обеспечения |
|
|||||||||
|
|
|
|
|
|
|||||
[B.I.a.3] |
ошибки |
|
при |
эксплуатации |
3 |
5 |
5 |
0,49 |
||
программного обеспечения |
|
|||||||||
|
|
|
|
|
|
|||||
[B.I.b.1] |
ошибки |
при |
включении/выключении |
3 |
5 |
5 |
0,49 |
|||
технических средств |
|
|
||||||||
|
|
|
|
|
|
|
||||
[B.I.c.3] |
ошибки при организации управления |
3 |
4 |
3 |
0,239 |
|||||
потоками обмена информации |
||||||||||
|
|
|
|
|
||||||
[B.I.d.2] |
повреждение (удаление) данных |
5 |
5 |
5 |
0,83 |
|||||
[B.I.d.3] |
повреждение (уничтожение) носителей |
5 |
4 |
4 |
0,53 |
|||||
информации |
|
|
|
|||||||
|
|
|
|
|
|
|
|
|||
[B.II.a.2] |
нарушения доступа |
к |
техническим |
4 |
5 |
5 |
0,62 |
|||
|
средствам |
|
|
|
|
|
|
|
||
[B.II.a.3] |
нарушения |
|
|
соблюдения |
4 |
4 |
4 |
0,39 |
||
конфиденциальности |
|
|
||||||||
[C.I.c.1] |
сбои операционных систем и СУБД |
4 |
5 |
4 |
0,56 |
|||||
[C.I.c.4] |
сбои антивирусных программ |
4 |
4 |
4 |
0,45 |
|||||
Перечень актуальных угроз
k |
Угрозы ИБ |
(КА)k |
1 |
Хищение (копирование) информации и средств ее обработки |
0,19 |
|
|
|
2 |
Уничтожение информации и средств ее обработки |
0,17 |
|
|
|
3 |
Блокирование информации |
0,12 |
|
|
|
ВОЗМОЖНЫЕ ВАРИАНТЫ АТАК
• Реализация угрозы «ХИЩЕНИЕ»
[I.A.2] [M1.A.02] [B.II.a.3] [I.A.2] [M1.B.02] [A.IV.b.2] [I.A.2] [M1.B.02] [A.IV.b.3] [I.A.2] [M1.B.02] [B.II.a.3] [I.A.2] [M1.B.03] [A.IV.b.2] [I.A.2] [M1.B.03] [A.IV.b.3] [I.A.2] [M1.B.03] [B.II.a.2] [I.A.2] [M1.B.03] [B.II.a.3] [I.A.2] [M2.A.04] [A.IV.b.3] [I.A.2] [M2.A.04] [B.I.a.2] [I.A.2] [M2.A.04] [B.I.a.3] [I.A.2] [M2.A.04] [B.I.b.1] [I.A.2] [M2.B.01] [A.IV.a.1] [I.A.2] [M2.B.01] [A.IV.a.2] [I.A.2] [M2.B.01] [B.II.a.2] [I.A.2] [M2.B.02] [A.IV.a.1] [I.A.2] [M2.B.02] [A.IV.a.2] [I.A.2] [M2.B.02] [B.II.a.2] [I.A.2] [M2.B.03] [A.II.a.4] [I.A.2] [M2.B.03] [A.IV.b.2] [I.A.2] [M2.B.03] [A.IV.b.3] [I.A.2] [M2.B.03] [B.II.a.2] [I.A.2] [M2.B.04] [A.IV.b.3] [I.A.2] [M2.B.04] [B.II.a.2] [I.A.2] [M2.B.05] [A.IV.b.3] [I.A.2] [M2.B.05] [B.II.a.2] [I.A.2] [M3.A.01] [A.II.b.1] [I.A.2] [M3.A.01] [A.IV.b.2] [I.A.2] [M3.A.01] [A.IV.b.3] [I.A.2] [M3.A.01] [B.I.c.3] [I.A.2] [M3.A.04] [A.IV.b.2] [I.A.2] [M3.A.04] [B.I.b.1] [I.A.2] [M3.A.04] [B.II.a.2] [I.A.2] [M3.A.05] [A.II.b.1] [I.A.2] [M3.A.05] [A.IV.b.2] [I.A.2] [M3.A.05] [B.I.b.1] [I.A.2] [M3.A.05] [B.II.a.2] [I.A.2] [M3.A.05] [C.I.c.1] [I.A.2] [M3.A.05] [C.I.c.4] [I.A.2] [M3.A.07] [A.IV.b.2] [I.A.2] [M3.A.07] [B.I.c.3] [I.A.2] [M3.A.07] [B.II.a.2] [I.A.2] [M3.A.07] [B.II.a.3] [I.A.2] [M3.A.08] [A.II.b.1] [I.A.2] [M3.A.08] [A.IV.b.2] [I.A.2] [M3.A.08] [B.II.a.2] [I.A.2] [M3.A.09] [A.II.b.1] [I.A.2] [M3.A.09] [A.IV.b.2] [I.A.2] [M3.A.09] [B.I.a.3] [I.A.2] [M3.A.09] [B.I.c.3] [I.A.2] [M3.A.09] [B.II.a.2]
• Реализация угроз «БЛОКИРОВАНИЕ» и «УНИЧТОЖЕНИЕ»
[I.A.2] |
[M2.A.04] |
[A.IV.a.1] |
[I.A.2] |
[M3.A.01] [A.IV.b.3] |
[I.A.2] |
[M3.A.05] [A.IV.b.2] |
[I.A.2] |
[M3.A.07] |
[B.I.c.3] |
||
[I.A.2] |
[M2.A.04] |
[A.IV.b.3] |
[I.A.2] |
[M3.A.01] |
[B.I.c.3] |
[I.A.2] |
[M3.A.05] |
[B.I.b.1] |
[I.A.2] |
[M3.A.07] |
[B.II.a.2] |
[I.A.2] |
[M2.A.04] |
[B.I.a.2] |
[I.A.2] |
[M3.A.04] |
[A.IV.b.2] |
[I.A.2] |
[M3.A.05] |
[B.II.a.2] |
[I.A.2] |
[M3.A.08] |
[A.II.b.1] |
[I.A.2] |
[M2.A.04] |
[B.I.a.3] |
[I.A.2] |
[M3.A.04] [B.I.b.1] |
[I.A.2] |
[M3.A.05] [C.I.c.1] |
[I.A.2] |
[M3.A.08] |
[A.IV.b.2] |
||
[I.A.2] |
[M2.A.04] |
[B.I.b.1] |
[I.A.2] |
[M3.A.04] [B.II.a.2] |
[I.A.2] |
[M3.A.05] |
[C.I.c.4] |
[I.A.2] |
[M3.A.08] |
[B.I.a.3] |
|
[I.A.2] |
[M3.A.01] |
[A.II.b.1] |
[I.A.2] |
[M3.A.05] [A.II.b.1] |
[I.A.2] |
[M3.A.07] [A.IV.b.2] |
[I.A.2] |
[M3.A.08] |
[B.II.a.2] |
||
[I.B.2]
[M3.A.08] [B.II.a.2]
[I.B.2] [M3.A.09] [A.II.b.1] [I.B.2] [M3.A.09] [A.IV.b.2] [I.B.2] [M3.A.09] [B.I.a.3] [I.B.2] [M3.A.09] [B.I.c.3] [I.B.2] [M3.A.09] [B.II.a.2] [I.B.2] [M3.A.10] [A.II.b.1] [I.B.2] [M3.A.10] [A.IV.b.2] [I.B.2] [M3.A.10] [B.I.a.3] [I.B.2] [M3.A.10] [B.II.a.2] [I.B.2] [M3.A.11] [A.II.b.1] [I.B.2] [M3.A.11] [A.IV.b.2] [I.B.2] [M3.A.11] [B.I.a.2] [I.B.2] [M3.A.11] [B.I.a.3] [I.B.2] [M3.A.11] [C.I.c.1] [I.B.2] [M3.A.11] [C.I.c.4] [I.B.2] [M3.A.14] [A.II.b.1] [I.B.2] [M3.A.14] [A.IV.b.2] [I.B.2] [M3.A.14] [A.IV.b.3] [I.B.2] [M4.A.05] [A.IV.a.1] [I.B.2] [M4.A.05] [A.IV.b.3] [I.B.2] [M4.A.05] [B.II.a.2] [I.B.2] [M5.A.01] [A.IV.a.1] [I.B.2] [M5.A.01] [B.II.a.2] [I.B.2] [M5.A.03] [B.II.a.2]
