Aşağıda threats, spyware, ve anti-virus için risk seviyesini belirlemek için kullanılan tablo bulunmaktadır. Bu tablo aracılığı ile risk seviyelerini hesaplayabilirsiniz. Orijinal yapısı bozulmaması için olduğu gibi sunuyorum.
Technology
Technology | Description |
---|---|
network-protocol | An application that is generally used for system to system communication that facilitates network operation. This includes most of the IP protocols. |
client-server | An application that uses a client-server model where one or more clients communicate with a server in the network. |
peer-to-peer | An application that communicates directly with other clients to transfer information instead of relying on a central server to facilitate the communication. |
browser-based | An application that relies on a web browser to function. |
Characteristics
Characteristic | Description |
---|---|
Capable of File Transfer | Likely has more than 1,000,000 users. Has the capability to transfer a file from one system to another over a network. A streaming app that has no other mechanism to transfer files other than the video or audio streaming should not be flagged as able to transfer files. |
Used by Malware | Malware has been known to use the app for propagation, attack, or data theft, or is distributed with malware. |
Excessive Bandwidth Use | Consumes at least 1 Mbps on a regular basis through normal use. |
Evasive | Uses a port or protocol for something other than its originally intended purpose with the hope that it will traverse a firewall. |
Pervasive | Likely has more than 1,000,000 users. |
Known Vulnerabilities | Has publicly reported vulnerability. For web-based apps, it should also be set to yes, as HTTP always has vulnerability. |
Prone to Misuse | Often used for nefarious purposes or is easily setup to expose more than the user intended. |
Tunnels Other Apps | Is able to transport other applications inside its protocol. |
File-type ident | Should be set if app can upload or download a file-type over a decodable protocol (e.g. http). |
Spyware-ident | Should be set if the app can upload or download an executable file over a decodable protocol. |
Virus-ident | Same as spyware ident. |
Vulnerability-ident | For web-based apps, the vulnerability-ident should always be yes, since they are http and http always has some vulnerabilities. |
deny-action | For web-based apps,deny-action should be set to drop-reset (unless there is some issues with the app receiving tcp-reset). |
Risk Calculation
Weights
Characteristic | Factor |
---|---|
Evasive | 3 |
Excessive Bandwidth Use | 1 |
Used by Malware | 4 |
Capable of File Transfer | 3 |
Known Vulnerabilities | 3 |
Tunnels Other Apps | 2 |
Prone to Misuse | 2 |
Pervasive | 1 |
Total | 19 |
Risk Assignment
Risk | Range |
---|---|
1 | 0–3 |
2 | 4–6 |
3 | 7–9 |
4 | 10–13 |
5 | 14+ |