OO Threat Modelling (PPT 8.5) Flashcards

1
Q

How should we approach security?

A
  • Identify valuable assets
  • Look at how it could be compromised
  • Loom at how to mitigate threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is threat modelling?

A

It is a structured approach to address the security of an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do we do threat modelling?

A
  • To prevent embarrassing and costly security features
  • Raises the profile of security early on, such as communication, early and ongoing tests and can expose problems early
  • Deliver better (more secure) products
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common threats?

A
  • Denial of service
  • SQL injection
  • Cross-site scripting (XSS)
  • Buffer overflows/ memory compromises
  • Error-handling
  • Spoofing
  • Tampering
  • Web server config issues
  • Infrastructure issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Denial of Service?

A

This is flooding a system with data or requests to slow it down. Can be used as a distraction but often used as a ransom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do we prevent a DoS attack?

A
  • Front end hardware to filter and analyse traffic
  • Resource limits/allocations to throttle requests
  • Blocking source IP addresses
  • SYN cookies (prevents users from leaving a connection half open)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a SQL Injection?

A

Injecting malicious code/scripts into a webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do we prevent SQL injection attacks?

A

-Validation
-Don’t trust user input
-Validate, don’t sanitise
Validate = reject input
Sanitise = remove malicious characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Cross Site Scripting?

A

Injecting malicious code, similar to SQL injection, but it is served up to a legitimate user and may direct them to malicious sites, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a buffer overflow?

A

Force memory overflows in a running application to crash or compromise it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is poor error handling?

A

Hackers may force errors on your website, this may cause information to display which is sensitive and shouldn’t be viewed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are web server config issues?

A
  • Out of date software
  • Configuration files storing plain text passwords
  • Guest accounts not disabled
  • File system no restricted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spoofing?

A
When something is pretending to be something else, e.g. fake website
Could be
-user
-website
-files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do we prevent spoofing?

A

Users

  • Authentication and validation and strong password policies
  • Careful management of session IDs and cookies

URL
-Check security certificates

Files

  • Check file signatures and timestamps
  • Check privileges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Information Disclosure?

A

Sensitive data passing over a network in plain text or stored in plain text or error messages revealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an Insider threat?

A

This is when a person who is hired compromises the system in some way

17
Q

How can we avoid insider threats?

A
  • Have proper recruitment processes
  • Avoid complacency
  • Monitor employee morale
  • Monitor
  • Logging
  • Auditing
  • Identifying behaviours
18
Q

What are abuse and misuse cases?

A

They are a way of identifying threats by looking at ways an unscrupulous actor may choose to harm the system

19
Q

What is Microsoft SDF?

A

Microsoft Security Development Lifecycle
It is a way of approaching threat modelling
Three stages are
-Decompose the application
-Determine and rank threats
-Determine counter measures and mitigation

20
Q

What does the decompose the application stage do?

A
  • identify entities, processes, data stores and data flows between them
  • identify trust boundaries
21
Q

What does the determine and rank threats stage do?

A

-Use STRIDE to determine threats

22
Q

What is Tampering?

A
  • Modifying something you are not supposed to modify

- Countered by: encryption, validation, digital signatures, privileges

23
Q

What is Repudiation?

A
  • Being able to claim you didn’t do something, leave no trace of activities
  • Countermeasures: Logs and times stamps
24
Q

What is Elevation of privilege?

A
  • Gaining access to things you shouldn’t have
  • Counter: disable guest accounts, file access privileges, enforcement of user account policies, adopt a least privilege policy
25
Q

What does STRIDE stand for?

A
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of service
Elevation of privilege