Saturday, January 25, 2020

Analysis of Attack Tree Process

Analysis of Attack Tree Process When analyzing the security threats to a system the system analyst is forced to rely on an Ad hoc brainstorming process (Schneier, 2004, p. 318) to try and conceptualize what purposes an attacker could have in targeting a system and the methods they could use to carry out their attack. The limitation to the ad hoc approach is that the analyst could miss an area of potential vulnerability or even focus available resources on an attack that is extremely unlikely leaving the door wide open for more likely attacks to occur. The Attack Tree process developed by Bruce Schneier seeks to replace existing ad hoc processes with one that provides a process for evaluating the threats of an attack against a system and what procedures can be put in place to prevent them (p. 318). The process seeks to first identify an attackers goal and then analyzes the methods they could use to accomplish their goal so resources are assigned appropriately. In an Attack Trees, attacks against a system are represented by a tree structure with the goal as the root node and different ways of achieving that goal as leaf nodes (p. 318). The Importance of Using an Attack Tree Process An Attack Tree process is a useful tool to try and analyze the different ways an attacker could achieve their goal. There are several benefits / advantages that can be attributed to a well developed process in the case of Attack Trees you could: Create an multi input iterative process: An Attack Tree enables a system analyst to implement a process where people with different backgrounds / skill sets can add their input to help analyze possible threats and what can be done to negate these threats. Since the process is also iterative you can ensure that it is continually improved upon, this is important because it is unlikely that the attackers are not continually improving their methods. Capture and reuse the process for future projects: In capturing the information created from a process you could ensure that the next time a system is being developed you will have a repository to look to for reference on potential security threats and methods of dealing with them. Since the system analyst is not working from scratch there is a saving of time and money. In creating and reusing a process you also help ensure consistency and reliability. Compute the risk of a type of attack: Different attacks have different probabilities of occurring as well as have different costs associated with them. If an attack is low gain but has a high cost of prevention it wont be worth it to prevent against it (Buldas, Laud, Priisalu, Saarepera and Willemson, 2006) Can be broken down in to multiple pieces: By creating a scalable process you dont have to have someone who is an expert in every single area instead you could have subject matter experts look at the system and offer their input. The Latest Developments in Attack Tree Processes Since Schneier introduced the concept of Attack Trees (1999) several other researchers have worked to fine tune the process. Buldas et al. have offered a more accurate estimate of the probability of an attack and how it in turn influences the cost of preventing against such an attack (2006). By exploring what sort of profit an attacker could gain from conducting the attack (e.g. stealing a competitors designs) and weighing the profit against the cost of the attack (e.g. going to jail) the system analyst will be able to see if reward is proportional to the risk the attacker takes. If an attacker feels that the reward is not proportional to the risk involved, then the probability of an attack occurring is reduced and in turn the resources required to protect the system from such an attack could be reduced as well. Practical examples of industries that could benefit from using an Attack Tree methodology have also been outlined. Sommestad, Ekstedt and NordstrÃÆ'Â ¶m (2009) have written a framework for the practical application of using Attack Trees along with other processes to manage the security of power communication systems. Since power generation is a cornerstone of societys critical infrastructure (Sommestad et al., 2009, p. 1) the protection of the Wide Area Networks that support them is a top priority. However security for such a system is complicated by factors such as; systems of varying age, different levels of criticality and geographical positioning of such systems. Attack Trees in Relation to My Personally Experience When I took a course in Project Management I read an article Secrets to Creating the Exclusive Accurate Estimate. The author mentioned that a project manager should know that a project without risk analysis is useless (Gray, 2001). Before we set up countermeasures to mitigate the risks, we need to know what the threats are. The fundamental concept of an Attack Tree process is to analyze the relation between cause and consequence of malicious attraction. Analyzing the cause and effect of an action is a skill I frequently use to make effective decisions. I list all possible options, analyze the outcome of each option, and estimate the cost I will pay for choosing a particular option. For instance, I would like to eliminate the mice in my apartment. I can use mouse poison, a glue trap, or hire a professional. There are various brands of mouse poisons and glue traps available on the shelves. I might need do some research to analyze their effectiveness and the environmental impact once I used them. Also, if I dont want to see or dispose of the body of the mouse, the glue trap might not be a good choice. Hiring a professional could be an efficient option, but it might cost me a lot. Based on my budget and other relative factors, I can build up an Attack Tree for my Mouse War and use it to assist me to make the best decision. However, the true value of an Attack Tree lies in its ability to assist people in analyzing factors of vulnerability and estimating the feasibility of practices with more complex circumstances such as the incorporation of a networking system. Moreover since Attack Trees provide a systematic methodology which is traceable and reusable it means that not only will the analyst who developed the Attack Tree process be able to utilize it, but they could also hand down the process to others (Network Security Technologies, I., 2005). Once a basic template has been completed such as an Attack Tree for a virus attack, this Attack Tree could be reused as a branch in a more complex model. The analyst doesnt have to rebuild it iteratively. The Potential of Attack Trees to Impact Business The IT industry, today, is expanding at an immense rate. Meanwhile, the tricks used by attackers improve at a pace beyond which we can imagine. Not only do businesses that are heavily invested in IT have to evolve to fight these malicious threats, but also all business are supposed to equip themselves with the ability to deal with emerging threats. Intuition and experience can help a security analyst anticipate a vicious attack and reduce the damage from it (Ingoldsby, T. R., 2009). However, the modes of attack are innovating quickly and both intuition and experience are hard to pass to others. So, business needs a process-based tool such as an Attack Tree to analyze threats. Moreover, Attack Trees could be a bridge to connect an experienced analyst with others (Ingoldsby, T. R., 2009). An analyst created Attack Tree could explain the rationale behind their process and people could learn and extract intelligence from the Attack Trees. As a result of adopting an Attack Tree process, security analysts could build a more efficient communication mechanism. In addition, one of the features of Attack Trees is reusability, while performing risk-analysis, it is not necessary to re-build a new Attack Tree process. A security analyst just needs to retrieve a comparative already designed Attack Trees process and trim it to fit the new mission. For a business this procedure not only saves time and money, but also helps improves the process. Since we are creating an Attack Tree based on old one, it is a way to accumulate experience to make the new Attack Tree more comprehensive. Companies no matter if they are IT related or not, are concerned about internet security issues. Some of them will look to an IT consulting firm for advice. Therefore, some IT consulting firms introduce Attack Tree to their clients. You can easily surf their website and acquire the explicit knowledge of Attack Tree, for instance, the website of Amenaza (http://www.amenaza.com/methodology_2.php). Moreover, some companies have developed a unique Threat Risk Analysis (TRA) methodology based on the Attack Tree process (Amenaza Technologies Limited, 2009). Although this could be perceived as an extension of Attack Trees, these consulting firms possess exclusive knowledge of Attack Tree processes which will help them build up their reputation. Conclusion Malicious internet attacks happen every day. The best approach to protect yourself is to forecast an attackers behavior before the disaster happens. There could be thousands of types of feasibility threats, such as; virus infections, a hacking attack, an internal attack, etc so we need a methodology to manage the TRA. An Attack Tree could be a powerful tool if it is properly implemented. References Schneier, B. (2004). Secrets and lies: digital security in a networked world. Wiley. Buldas, A, Laud, P, Priisalu, J, Saarepera , M, Willemson, J. (2006). Rational Choice of Security Measures via Multi-Parameter Attack Trees. Critical Information Infrastructures Security, 4347. Sommestad, T, Ekstedt, M, NordstrÃÆ'Â ¶m, L. (2009). modeling security of power communication systems using defense graphs and influence diagrams. IEEE Transactions on Power Delivery, 24(4), Schneier, B. (1999). Attack trees. Dr. Dobbs journal , 24(12), Gray, N. S. (2001, August). Secrets to Creating the Exclusive Accurate Estimate. PM Network, 4. Network Security Technologies, I. (2005). Attack Tree/Threat Modeling Methodology. from http://www.netsectech.com/services/attack_tree_methodology.pdf Ingoldsby, T. R. (2009, Jan., 16). Attack Tree Analysis. Red Team, from http://redteamjournal.com/2009/01/attack-tree-analysis/ Amenaza Technologies Limited. (2009). Amenaza SecurlTree. from http://www.amenaza.com/downloads/docs/SCMagazine20-Nov2009-Amenaza.pdf

Friday, January 17, 2020

Da Vinci Code Reaction paper

The movie intro led in a murder scene inside the Louvre museum and clues in Da Vinci paintings lead to the discovery of a religious mystery protected by a secret society for two thousand years which could shake the foundations of Christianity. The Novel itself received both positive and negative reviews from critics, and it has been the subject of negative appraisals concerning its portrayal of history. It’s writing and historical accuracy were reviewed negatively by â€Å"The New Yorker† When I first saw it in 2006 I was amazed how the movie made so much sense specially the scene where they talk about the secret of the Holy Grail.In the novel Leigh Teabing explains to Sophie Neveu that the figure at the right hand of Jesus in Leonardo da Vinci's painting of â€Å"The Last Supper† is not the apostle John, but actually Mary Magdalene. Leigh Teabing says that the absence of a chalice in Leonardo's painting means Leonardo knew that Mary Magdalene was the actual Holy Grail and the bearer of Jesus' blood. Leigh Teabing goes on to explain that this idea is supported by the shape of the letter â€Å"V† that is formed by the bodily positions of Jesus and Mary, as â€Å"V† is the symbol for the sacred feminine.The absence of the Apostle John in the painting is explained by knowing that John is also referred to as â€Å"the Disciple Jesus loved†, code for Mary Magdalene. The book also notes that the color scheme of their garments are inverted: Jesus wears a red tunic with royal blue cloak; Mary Magdalene wears the opposite. In my personal opinion as a believer of God, I think Dan Brown is a genius. The Da Vinci Code is one of the greatest stories ever told. The real draw for Brown’s novel is how his highly polemical basis†¦ that Christianity is not what it is purported to be, little more than an age-old instrument of oppression.

Thursday, January 9, 2020

Genocide The Worst Humanitarian Disaster Essay - 2655 Words

Genocide: The Worst Humanitarian Disaster I am not a refugee. I am a white, middle-class, female American. I am a student at a public high school in the suburbs. My country is not being torn apart by genocide. My parents haven’t been killed. My government does not rape me. My family does not live in a tent in the middle of the desert. My community does not get by on a $1.00 per week for food, but my desires and passions connect to those who do. There are hundreds of us spread out on the lawn of the Washington Monument. There is plenty of room, but we all crowd together, helping and encouraging each other. We are kneeling on the grass, creativity pouring out of us and into our posters- the sounds of markers constantly being capped and†¦show more content†¦People on the street stopped, stared, took pictures, honked, and chanted along with us. Employees came running out of their stores and came to the windows to see what all the pandemonium was. So as we are marching down Pennsylvania Ave, past the white house, with our police-on-horseback escorts, we make sure we are heard. We all storm down different streets, with our stomping and chanting rising above the all-important buildings of the nation’s capitol.One! Two! Three! Four! End the genocide in Darfur! Five! Six! Seven! Eight! Any longer, it’s too late! Barack! Obama! We will work to help you! Barack! Obama! They need change in Sudan too!† I am a voice for the victims of Darfur, I am a voice for the innocent, silenced victims being killed and tortured every day by genocide and the ones who have been forced to face it in the past. As genocide unfolds in the 21st century at this very moment; it is crucial to understand the underlying causes in history’s past genocides as their daunting memories linger on and gain global attention to ultimately end this horrific humanitarian disaster today. The terrible act of genocide has been happening for centuries now, killing millions of innocent civilians while the world watches and refuses to say its name. A United Nations Special Reporter on the subject stated, Genocide is the ultimate crime and the gravest violation of human rights it is possible to commit. (Janikowski) Genocide is a unique crime that is not directedShow MoreRelatedThe Legal Foundation For Humanitarian Intervention Essay1219 Words   |  5 PagesThe legal foundation for humanitarian intervention was established in the United Nations Universal Declaration of Human Rights and the Convention on the Prevention of Genocide and Punishment of the Crime of Genocide (Lecture 11/15/16). Genocide, as decided by the, Convention on the Prevention and Punishment of the Crime of Genocide: genocide, whether committed in time of peace or in time of war, is a crime under international law which they (contracted members) undertake to prevent and to punishRead More Humanitarian I ntervention Essay992 Words   |  4 PagesHumanitarian Intervention Hypothesis: That despite the incidents where humanitarian interventions have proved seemingly unsuccessful, they are, nonetheless, a vital tool in alleviating the human suffering that so plagues contemporary society. The post-Cold war world is one that has been riddled with conflict, suffering and war. In the face of such times, the issue of humanitarian intervention and about who, when and how it should be employed, has become hotly debated. While some critics declareRead More The Horror of Genocide Essay997 Words   |  4 Pagesbut definitely possible. The word genocide, which is also known as ethnic cleansing, is certainly not uncommon to anyone living in this not so perfect world, full of violence, hatred and discrimination. Throughout the decades, genocide has taken place in more than one occasion, causing wars, slaughters and mass destruction of cities and towns. I think that genocide is by far the worst crime in humanity. Hatred, superiority and personal memories are all behind genocide. Everyday, I get more surprisedRead More Rwanda: Genocide and Refugee Crisis Essay example3469 Words   |  14 Pagesof extremists, 800,000 men, women, and children gone because of a more serious problem rooted in social prejudice and inequality, 800,000 killed in a genocide that the world could do nothing about until it was too late. Almost 50 years after the world pledged to never let anything like the holocaust occur again, the world had to watch as a genocide unfolded in Rwanda. Between April of 1994 and July of 1994 some 800,000 Tutsi and moderate Hutus were systematically killed as Rwanda fell into politicalRead MoreKazakhstan Is One Of The Largest States Economy And A Stable Political Situation1227 Words   |  5 Pagesinflicted severe damages to cultural memory. The first a half of the XX century was marked for Kazakhstan by the difficult, erratic events which lead to almost irreversible consequences for the Kazakh’s cultural identity: collectivisation, Famine-Geno cide, mass political repressions. Destruction of ethnic consciousness at the most different levels resulted in loss of national nomadic space, deaths of thousands of Kazakhs – bearers of traditions and calculated destruction of intellectual elite by governmentRead MoreEssay On Global Aid1610 Words   |  7 Pagesmilitary personnel. However our greatest victory for us Canadians was the capture of Vimy Ridge on April 9th 1917 which had unnervingly withstood all attacks for the precedented two years. These were Canadian morals that weren’t neglected when faced the worst. Instead we toughened and held on the hope that our insufferable circumstances would all soon be for the greater good in the rebirth of our new world. Values that we practise and honor today: international integrity, freedom of life, liberty and securityRead MoreGenocide : The Worst Crimes Against Humanity And It Still Continues Today2115 Words   |  9 PagesApril 2016 Genocide: Genocide is one of the worst crimes against humanity and it still continues today. The definition of the word genocide is the deliberate killing of a large group of people, especially those of a particular ethnic group or nation. Compared with war crimes and crimes against humanity, genocide is generally regarded as the most offensive crime. Unlike war, where the attack is general and the object is often the control of a geographical or political region. Genocide attacks goRead MoreEthnic Groups Of South Sudan2158 Words   |  9 Pageswidespread inequality such as the distribution of the Sudanese oil wealth (GSDRC, n.d). Sudan is rich in oil and it is said to be worth 98% of the country’s revenue. Another significant factor in the series of conflicts that Sudan has faced is the ‘genocide’ of 2003 in the western region of Darfur. The debate over whether the government of Sudan sponsored the deaths of more than 70,000 of mainly black ethnic Sudanese (Foreign Aff airs, 2005). Sudan’s president Omar al-Bashir ordered troops to â€Å"eliminateRead MoreThe Issue of Transnational Aid Intervention3074 Words   |  12 Pagesemphasize humanitarian issues, developmental aid and sustainable development (Willetts). An NGO is defined as a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose (Willetts 1). Currently, NGOs play a crucial role in providing mechanisms which enhance global human progress. To understand the work of NGOs one must know the history of humanitarian aid and developmental assistance. History of Humanitarian Aid andRead MoreThe Congo Free State Essay1984 Words   |  8 PagesOver the course of human history, many believe that the â€Å"Congo Free State†, which lasted from the 1880s to the early 1900s, was one of the worst colonial states in the age of Imperialism and was one of the worst humanitarian disasters over time. Brutal methods of collecting rubber, which led to the deaths of countless Africans along with Europeans, as well as a lack of concern from the Belgian government aside from the King, combined to create the most potent example of the evils of colonialism in

Wednesday, January 1, 2020

Ancestry of George W. Bush - Bush Family Tree

Originating in Columbus, Ohio, the Bush family has developed into one of the most accomplished political families of the 20th century. Other important individuals in the Bush family tree include the Spencer family that produced Diana, Princess of Wales, which makes George W. Bush a 17th cousin to Prince William of Wales. The great great great grandmother of President George W. Bush, Harriet Smith (wife of Obidiah Newcomb Bushs wife) and her descendants, are distant cousins of John Kerry. First Generation 1. George Walker BUSH was born on 6 Jul 1946 in New Haven, Connecticut. George Walker BUSH married: Laura Lane Welch on 5 November 1977 in the First United Methodist Church of Midland, Texas. Laura WELCH was born on 4 November 1946 to Harold Bruch WELCH and Jenna Louise (Hawkins) WELCH. Second Generation 2. George Herbert Walker BUSH was born on 12 Jun 1924 in Milton, Massachusetts.1 George Herbert Walker BUSH and Barbara PIERCE were married on 6 Jan 1945 in Rye, Westchester County, New York.1 3. Barbara PIERCE was born on 8 Jun 1925 in Rye, Westchester County, New York. George Herbert Walker BUSH and Barbara PIERCE had the following children: 1 i. George Walker BUSHii. Pauline Robinson BUSHiii. Jeb BUSHiv. Neil BUSHv. Marvin BUSHvi. Dorothy BUSH Third Generation 4. Prescott Sheldon BUSH was born on 15 May 1895 in Columbus, Ohio.2 Between 1952 and 1963 he was an U.S. Senator. He died of lung cancer on 8 Oct 1972 in New York City, New York.2 Prescott Sheldon BUSH and Dorothy WALKER were married on 6 Aug 1921 in Kennebunkport, Maine.2 5. Dorothy WALKER3,4 was born on 1 Jul 1901 in Missouri.2 She died on 19 Nov 1992 in Greenwich, Connecticut.2 Prescott Sheldon BUSH and Dorothy WALKER had the following children: i. Prescott Sheldon (Pres) BUSH Jr was born on 10 Aug 1922.22 ii. George Herbert Walker BUSH.iii. Nancy BUSH was born on 3 Feb 1926.2iv. Jonathan James BUSH was born on 6 May 1931.2v. William Henry Trotter (Buck or Bucky) BUSH was born on 14 Jul 1938.2 6. Marvin PIERCE was born on 17 Jun 1893 in Sharpsville, Mercer County, Pennsylvania. He died on 17 Jul 1969 in Rye, Westchester County, New York. Marvin PIERCE and Pauline ROBINSON were married in Aug 1918. 7. Pauline ROBINSON was born in Apr 1896 in Ohio. She died from injuries suffered in a car accident on 23 Sep 1949 in Rye, Westchester County, New York. Marvin PIERCE and Pauline ROBINSON had the following children: i. Martha PIERCE was born in 1920.ii. James Robinson PIERCE was born in 1921.3 iii. Barbara PIERCE Fourth Generation 8. Samuel Prescott BUSH2 was born on 4 Oct 1863 in Brick Chuch, New Jersey.2 He died on 8 Feb 1948 in Columbus, Ohio. Samuel Prescott BUSH and Flora SHELDON were married on 20 Jun 1894 in Columbus, Ohio. 9. Flora SHELDON was born on 17 Mar 1872 in Franklin Co, Ohio. She died on 4 Sep 1920 in Watch Hill, Rhode Island. Samuel Prescott BUSH and Flora SHELDON had the following children: 4 i. Prescott Sheldon BUSH 10. George Herbert WALKER was born on 11 Jun 1875 in St. Louis, Missouri. He died on 24 Jun 1953 in New York City, New York. George Herbert WALKER and Lucretia (Loulie) WEAR were married on 17 Jan 1899 in St. Louis, Missouri. 11. Lucretia (Loulie) WEAR was born on 17 Sep 1874 in St. Louis, Missouri. She died on 28 Aug 1961 in Biddeford, Maine. George Herbert WALKER and Lucretia (Loulie) WEAR had the following children: 5 i. Dorothy WALKER 12. Scott PIERCE was born on 18 Jan 1866 in Sharpsville, Mercer County, Pennsylvania.3 Scott PIERCE and Mabel MARVIN were married on 26 Nov 1891. 13. Mabel MARVIN was born on 4 Jun 1869 in Cincinnati, Ohio. Scott PIERCE and Mabel MARVIN had the following children: 6 i. Marvin PIERCE. ii. Charlotte PIERCE was born on 30 Sep 1894.4 She died on 15 Aug 1971 in Dayton, Ohio.4 14. James Edgar ROBINSON was born on 15 Aug 1868 in Marysville, Ohio. He died in 1931. James Edgar ROBINSON and Lula Dell FLICKINGER were married on 31 Mar 1895 in Marion County, Ohio. 15. Lula Dell FLICKINGER was born in Mar 1875 in Byhalia, Ohio. James Edgar ROBINSON and Lula Dell FLICKINGER had the following children: 7 i. Pauline ROBINSON