19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Reporting Your Results<br />

reasons, and you might not be able to afford to eliminate others. Or, simply<br />

enough, your business may have a certain level of risk tolerance. Every situation<br />

is different. You need to factor whether the benefit is worth the effort<br />

and cost. For instance, if you determine that it will cost $30,000 to encrypt<br />

a sales leads database worth $20,000 to the organization, encryption might<br />

not make sense. On the other hand, spending a few weeks worth of development<br />

time to fix cross-site scripting and SQL injection vulnerabilities could<br />

be worth a lot of money. The same goes for mobile devices that everyone<br />

swears contain no sensitive information. You need to study each vulnerability<br />

carefully, determine the business risk, and weigh whether the issue is<br />

worth fixing.<br />

It’s impossible — or at least not worth trying — to fix every vulnerability that<br />

you find. Analyze each vulnerability carefully and determine your worst-case<br />

scenarios. So you have cross-site request forgery (CSRF) on your printer’s web<br />

interface? What’s the business risk? For many security flaws, you’ll likely find<br />

the risk is just not there.<br />

Here’s a quick method to use when prioritizing your vulnerabilities. You can<br />

tweak this method to accommodate your needs. You need to consider two<br />

major factors for each of the vulnerabilities you discover:<br />

✓ Likelihood of exploitation: How likely is it that the specific vulnerability<br />

you’re analyzing will be taken advantage of by a hacker, a malicious<br />

user, malware, or some other threat?<br />

✓ Impact if exploited: How detrimental would it be if the vulnerability<br />

you’re analyzing were exploited?<br />

Refer to The Open Group’s Risk Taxonomy (www.opengroup.org) for more<br />

information on this subject.<br />

Many people often skip these considerations and assume that every vulnerability<br />

discovered has to be resolved. Big mistake. Just because a vulnerability<br />

is discovered doesn’t mean it applies to your particular situation and<br />

environment. If you go in with the mindset that every vulnerability will be<br />

addressed regardless of circumstances, you’ll waste a lot of unnecessary<br />

time, effort, and money, and you can set up your ethical hacking program for<br />

failure in the long term. However, be careful not to swing too far in the other<br />

direction! Many vulnerabilities don’t appear too serious on the surface but<br />

could very well get your organization into hot water if they’re exploited. Dig<br />

in deep and use some common sense.<br />

Rank each vulnerability, using criteria such as High, Medium, and Low or a<br />

1-through-5 rating (where 1 is the lowest priority and 5 is the highest) for each<br />

of the two considerations. Table 16-1 shows a sample table and a representative<br />

vulnerability for each category.<br />

321

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!