Threat Modeling Flashcards

1
Q

What is a threat?

A

A potential cause of an unwanted incident that may result in harm to a system, individual, or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can threats only be intentional?

A

No, threats can also be accidental, circumstantial, due to equipment failure, or natural disasters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is it important to consider all types of threats?

A

Because readiness is required for all potential threats, not just specific types like malicious attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of threat modeling?

A

To assess risk by understanding and identifying the various threats to software or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the acronym STRIDE stand for?

A

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the STRIDE model help achieve?

A

It helps identify and categorize various types of threats to assess risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Spoofing in the STRIDE context?

A

Pretending to be someone or something else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Tampering in the STRIDE context?

A

Unauthorized modification or changing of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Repudiation in the STRIDE context?

A

Denying that an action was performed when it was.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Information Disclosure in the STRIDE context?

A

Revealing sensitive or protected information to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Denial of Service in the STRIDE context?

A

Preventing legitimate users from accessing or using a system or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Elevation of Privilege in the STRIDE context?

A

Gaining higher-level access rights or permissions than originally authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the acronym PASTA stand for?

A

Process for Attack Simulation and Threat Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a key characteristic of the PASTA model?

A

It is risk-centric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the initial steps in the PASTA process?

A

Define objectives and define the technical scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What follows scoping in the PASTA process?

A

Decomposing (breaking down) the application and analyzing threats to it.

17
Q

What analysis occurs after identifying threats in PASTA?

A

Looking for vulnerabilities and analyzing the potential severity or frequency of attacks.

18
Q

What is the final outcome calculated in the PASTA process?

A

Risk and impact.

19
Q

Are STRIDE and PASTA the only threat modeling approaches mentioned?

A

No, hybrid threat modeling methods are also mentioned.

20
Q

What framework might hybrid methods use for analysis?

A

The ‘six Ws’ (who, what, when, where, why, how) to analyze threat actions and results.

21
Q

What is the name of a tool mentioned for scoring vulnerabilities?

A

Common Vulnerability Scoring System (CVSS).

22
Q

What does the Common Vulnerability Scoring System provide?

A

A way to know identified vulnerabilities and assess their severity.

23
Q

Why is identifying threats considered a fundamental step?

A

Because one cannot effectively defend against or fight an unknown enemy or threat.

24
Q

Should threat modeling focus only on one type of attack?

A

No, it should consider more than just a single type of attack.