Impact Discussion Risk discussion

102 Copyright © 2009 Open Geospatial Consortium, Inc. information. The likelihood drops dramatically further if interactions to other service are required for the gathering of required information. For example, for all SS actually all OGC Web Services the GetCapabilities request can be submitted by reading the OWS Common specification. The only information required is the service URL, which can often be obtained from a catalogue service or a Google search. But the cancellation of an assignment with the SPS requires knowing a valid task ID. In order to gather a valid task ID, the attacker has to eavesdrop communication with the service with the goal of fetching task IDs. As the attacker cannot know if the wire-taping attack will unveil a task ID at all, an alternative approach might be challenged: By submitting a number of Submit requests to the SPS with invalid parameters, each response will contain a task ID and ―rejected‖. From those responses, the attacker might guess task IDs with a good certainty and start exercising the actual attacks. Another factor is determined by the difficulty of gathering the required information. The easiest way is to read the specification as it is publically available and does contain many examples. If those examples e.g. for task IDs are screenshots from inputoutput from prototype implementations, the attacker has ease of use. If other attacks need to succeed, it is certainly easier to succeed with attacks that do not require compromising the network than attacks that require a specific network configuration tampering.

9.8.2 Impact Discussion

For the outlined attacks from the previous sections, different impacts on the asset can be outlined: No affect on asset but its unveiling The success of the attack does not change the values or state of the affect but makes its values content available to the adversary. For security domains that are required to be protected against sabotage, the attacks with this impact can be tolerated. For a security domain that shall be protected against espionage, this impact is not acceptable. Affect to asset effective immediately or at a later time The success of the attack does change the value or state of the asset at the time when the attack is exercised or at a later time after the attack has succeeded. For the identified attacks of this ER, an example of an attack with later affect is RenewSubscription if the tampered time is further in the future than the actual time. Affect to asset effective to one entity, some entities or all entities The success of the attack does change the value or state of the asset and is effective to a different number of entities. An example where the attack success is affecting one entity is the tampering of the response from the service to the client. For example if the response of the GetStatus of the SPS is tampered by the attacker, the result becomes visible to the active client only. Attacks that use an operation with write characteristics have potential to affect all other clients interacting with the service. However, some attacks might only be effective to some clients only. The success of tampering the Advertise request of the SAS Copyright © 2009 Open Geospatial Consortium, Inc. 103 has influence to all clients that are subscribed to that particular alert. Tampering the InsertSensor request of the SOS is effective to all clients as he SOS cannot provide offerings for the sensor.

9.8.3 Risk discussion

The opening questions is: How long can an attacker exercise attacks before he gets unveiled and how many attacks can an attacker exercise and how many succeeding attacks can an attacker undertake before he gets unveiled?Exercising attacks always carries a certain risk for the attacker to be unveiled. Depending on the kind of the attack and its affect on the asset and its effectiveness, the potential to be unveiled can be determined by the following factors: Does the exercising of an attack require the tampering of the underlying network as it is relevant to attacks leveraging Man-in-The-Middle or ARP spoofing. In these cases, it is very likely that the adversary cannot exercise too many attacks, as he must expect the unveiling at almost any time. For attacks that can be carried out by just executing the service Adversary’s client can execute SS it is much harder for the network admin to differentiate between a normal request and an attack. For a certain attack to succeed, how many other requests must be exercised successfully. The higher that number, the more likely it is that the attacker gets unveiled and suspended from the network, before the actual devastating attack can be exercised. All attacks that are related to espionage typically carry less risk to be unveiled than attacks that are related to sabotage. Therefore attacks that do not result in a change of the asset or its state are perhaps less risky than attacks that affect the asset and is also be effective to more than one user.

9.8.4 Overall Rating