preview

Factors Affecting The Threat Agent Involved

Better Essays

A: LIKELIHOOD:
There are several factors that can help determine the likelihood. The first set of factors are related to the threat agent involved. The goal is to estimate the likelihood of a successful attack from a group of possible attackers.

A1. Threat Agent Factors
The first set of factors are related to the threat agent involved. The goal here is to estimate the likelihood of a successful attack by this group of threat agents. Use the worst-case threat agent.
A1.1: Skill level required to exploit a vulnerability:
Many tools exist to automate the exploitation of SQL injection vulnerabilities and their functions range from mining database access to gaining command execution via specific database packages. An attacker with basic …show more content…

(7.0 - High)
A1.4: Size: XSS and SQL Injection attacks can be carried out an individual or a team of attackers. Nothing stops a lone attacker to exploit XSS and SQL Injection vulnerabilities. (9.0 - High)
A.2: VULNERABILITY FACTORS
A.2.1: Ease of discoverability: For both vulnerabilities, it is extremely easy to be discovered by threat agents as automated tools available freely on internet. (8.5 - High)
A.2.2: Ease of exploit: Again, automated tools available to exploit these vulnerabilities so this is extremely easy to pull off. (9.0 - High)
A.2.3: Awareness: SQLi was first publicly disclosed around 17 years ago, and still on Top of the OWASP list. It is very well known vulnerability. Same goes for the XSS it is very well known among hackers. (9.0 - High)
A.2.4: Intrusion detection: Yes, there are tools available to detect XSS and SQL Injection like SNORT and other black box tools. (3.0 - Low)

Average Score of all factors = Likelihood = 7.5 High

B: IMPACT:
Before estimating the overall impact of an attack, it is important to address that there are two kinds of impacts. Technical impact on system/application and Business impact on the Business/Company.

B.1: Technical Impact Factors
B.1.1: Loss of confidentiality: By exploiting points of SQL Injection in the application an attacker can gain access to all Critical Data Assets connected to the Company Portal application and backend database

Get Access