Threat Modeling Flashcards
What is a defensive approach to Threat Modeling?
Prediction of threats and designing in specific defenses during the coding and crafting process, rather than relying on post deployment mitigation such as patches and updates.
What is FUZZ testing?
Subjecting software to invalid inputs to trigger known software vulnerabilities such as buffer overflows, software crashes, etc.
Name the three types of Threat Modeling?
- Focused on Assets
- Focused on Attackers
- Focused on Software
Name the elements of the STRIDE model (Microsoft).
- Spoofing-bypass security mechanisms with fake credentials
- Tampering- affect the integrity of
- Repudiation-ability to deny accountability
- Information disclosure
- DoS
- Elevation of privilege
What is the purpose of creating a Threat Model Diagram?
Helps detail the function and purpose of each element of a business task, development process or work activity.
What is Reduction Analysis?
Also known as decomposing the application, system, or environment to gain a greater understanding of the logic of products as well as its interactions and external elements.
What are the Key Concepts in Reduction Analysis? (TDIPD)
- Trust Boundaries- where level of trust changes
- Data Flow Paths- Movement of data between locations
- Input Points- Location where external input received
- Privileged Operations- Any activity that requires greater privileges than a standard user
- Details about Security Stance and Approach- Declaration of the security: policy, foundations and assumptions
What is the DREAD system used for?
DREAD is used to rank or rate threats identified in Threat Modeling for prioritization and response
What does DREAD stand for?
D=Damage potential-How sever would damage be
R=Reproducibility-How complicated to reproduce the exploit
E=How hard is it to exploit the attack
A=Affected users-How many users can be affected?
D=Discoverability= How hard for an attacker to discover the weakness
What are three ways to integrate security risk considerations in an acquisition strategy and practice?
- Onsite assessment
- Document and exchange review
- Process/Policy review
What are the elements of a Security Plan?
- Security policy
- Standards
- Baselines
- Guidelines
- Procedures