CH10 Threat Modelling Flashcards
Developers must consider in Threat Modelling
The valuability of the asset being secured
The strength/durability of the encryption/security used on the asset
Where on the asset the protection is provided (what attack vectors are being covered)
Threat modelling is often a structured way of brain-storming
STRIDE in Threat Modelling
expansion of CIA (confidentiality, integritt, availability) threat types
Spoofing Identity
Tampering with data
Repudiation
Information Disclosure
Denial of Service
Elevation of Privelege
Spoofing Identity
example: illegally accessing (like shoulder surfing) and then using another user’s authentication information
Tampering with Data
involves the malicious modification of data. Examples include unauthorised changes made to persistent (stored) data, such as held in a database
Repudiation
associated with users who deny performing an action without other parties having any way to prove otherwise
Information Disclosure
involve the exposure of information to individuals who are not supposed to have access to it
Denial of Service (DoS)
deny service to valid users - e.g. by making a web server temporarily unavailable or unusable
overload requests
ISP throttling
Persistent XSS
Elevation of Privilege
an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system.
(Qualitative/) Risk calculation
Risk = (1/easiness-of-attack) * impact
Subjective RIsk Model: DREAD
Damage
Reproducibility
Exploitability
Affected Users
Discoverability
What is needed in threat modelling
business: knowledge what the system should do
- scenarios
- use cases
Architectural: knowledge how information/data “flows” in the system
- block/component diagrams
- data-flow diagrams
Functional Security: how to defeat an attack
- planned security technologies/checks/processes
Attacker Goals
A team of experts
structered process
for each identified threat, the following should be documented
threat category
description of the threat
likelihood of the threat (easiness of attack)
impact/severity of the threat
either a mitigation strategy or an explicit acceptance of the threat (sign-off)
If a mitigation has been defined, a strategy for validating its implementation