1.11 Undersand and Apply Threat Modeling Concepts Flashcards

1
Q

What is the goal of Threat Modeling?

A

Threat Modeling aims to systematically idenitify threats and their severity, which in turn makes risk management more effective and accurate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What 3 things do Threat Modeling Metholodiges help in terms of threats related to an asset?

A

Can help systematic identification of threats | Enumeration of Threats | and Prioritization of Threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the Three Major Threat Modeling Methodologies?

A

STRIDE (Microsoft) | Process for Attack Simulation and Threat Analysis (PASTA) | DREAD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is STRIDE an acronym for?

A

Spoofing | Tampering |Repudiation | Information Disclosure | Denial of Service | and Elevation of Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Stride is considered a ____ focused methodology.

A

Threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pasta is considered a ____ focused methodology.

A

Attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the seven stages of PASTA threat-modeling?

A

Define Objectives | Define Technical Scope |Application Decomposition | Threat Analysis | Vulnerability and Weakness Analysis | Attack Modeling | Risk and Impact Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In PASTA, what is Define Objectives for?

A

Considering inherent application risks profiles and addressing business impact consideration early.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In PASTA, what is Define Technical Scope for?

A

To decompose the technology stack that supports the application components that realize the business objectives outlined in step 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In PASTA, what is Application Decomposition for?

A

Understanding the data flows among application components and services in the application threat model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In PASTA, what is Vulnerability and Weakness Analysis for?

A

Identifying vulnerabilities and weaknesses within the application design and code and correlates to see if it supports the threat assertions from prior stages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In PASTA, what is Attack Modeling for?

A

Emulating attacks that could exploit identified vulnerabilites and weaknesses from the prior stage. Helps to determine the threat viability via attack patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In PASTA, what is Risk and Impact Analysis for?

A

Remediation of vulnerabilities or weakenesses in code or design that can faciliate threats and underlying attack patterns. May warrant some risk acceptance by broader application owners or development managers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The DREAD Threat Model is primarily used to ____ and ____ the severity of threats.

A

Measure | Rank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can DREAD be implemented to the results of the STRIDE threat model?

A

Dread can be used to rank results of the STRIDE model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does DREAD scope vulnerabilities?

A

On a scale of 1-3 for 5 categories. Ultimately, ranking them on a scale of 5-15.

17
Q

What does DREAD stand for?

A

Damage, Reproducability, Exploitability, Affected Users, and Discoverability.

18
Q

Define purpose of each DREAD stage.

A

Damage: Assess amount of damage a threat can cause.
Reproducability: How easily can a Threat be replicated?
Exploitability: How easy can a threat be exploited?
Affected Users: How many users are affected? Internal, external?
Discoverability: How easy is it to discover the threat?

19
Q

What is Social Engineering?

A

The manipulation of people’s actions through intimidation and/or deception.

20
Q

What is the biggest security weakness to an organization?

A

Their employees.

21
Q

Why is Social Engineering so prevalent?

A

Because it is so effective.

22
Q

Define Intimidation, Deception, and Rapport.

A

Using fear to intimidate someone (Blackmail) | Tricks someone in some manner or another (Lying) | Building gradual relationship with a victim to take advantage of them later on (IT team wanting to help)

23
Q

What is an example of ‘Baiting’ in social engineering.

A

Leaving a USB stick on the ground for someone to pick up and put into their PC.

24
Q

How does Spear Phishing differe from Whaling?

A

Spear Phishing targets a certain individual or group to understand what social engineering technique could be effective for them. Whaling is similar, but targets only the ‘big fish’ like CEOs, CFOs, and COOs.

25
Q

What are methods for preventing social engineering? Name three specific practical steps that can be taken.

A

Awareness, Training, and education can help mitigate social engineering attacks. As well as strong security policies | Request proof of identity, Require callback authorization for sensitive information or network alterations, and contacting a suspicious entity through approved channels such as websites and ledgers.