Threat Modeling Flashcards

1
Q

Describe the STRIDE model

A
  • Spoofing
  • Tampering
  • Repudiation
  • Information disclousre
  • Denial of service
  • Escalation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe spoofing in terms of STRIDE and give an example

A
  • using another users credentials without their knowledge
  • simple passwords are vulnerable
  • eg date of birth / 4 digit passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe tampering in terms of STRIDE and give an example

A
  • only authorised users should be able to modify a system
  • example attacker adding or removing functional elements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe repudiation in terms of STRIDE and give an example

A
  • attackers want to hide their actions
  • example: deleting logs, or by spoofing another user credentials
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Information disclosure in terms of STRIDE and give an example

A
  • keeping confidential information secure
  • example: error messages leaking information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe Denial of service in terms of STRIDE and give an example

A
  • attackers may want to prevent users from accessing a system
  • blackmailing / extorting owners of the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Escalation of privilege in terms of STRIDE and give an example

A
  • the tampering of a system to acquire additional privlieges
  • example: spoofing a user or tampering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly