Threat Modeling Flashcards

1
Q

What is a vulnerability?

A

A flaw or weakness in a system’s design, or operation and management that could be exploited to violate the system’s security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an attack?

A

An intentional act by which an entity attempts to evade security services and violate the security policy of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an attacker?

A

A person who executes an attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a threat?

A

A potential for violation of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an asset?

A

A system resource that is

  • required to be protected by a security policy
  • intended to be protected by a countermeasure
  • required for a system’s mission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is risk?

A

An expectation of loss expressed as the probability that a particular threat will exploit a vulnerability with a harmful result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a countermeasure?

A

An action, device, procedure or technique that meets a threat, vulnerability or attack by preventing it, by minimizing its harmful effect or by reporting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name and describe two attacker models for interaction protocols

A

Honest-but-curious users
- follow protocol honestly
- can collude to learn more than they should
- obey all rules
Malicious users
- break rules of the protocol to get information
- more powerful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name six more attacker models and their capabilities

A

Eavesdropping
- eavesdrop on a shared channel

Man-in-the-middle MITM

  • eavesdrop
  • modify
  • delete
  • inject

Man-at-the-end MATE
- has full control over a system

Malware
- can have different purposes and different powers / levels of privilege

Side-Channel
- learn about sensitive information indirectly by observing parameters of a system or its environment

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does STRIDE stand for?

A

The different threats considered in the model:

  • Spoofing
  • Tampering
  • Repudiation
  • Information disclosure
  • Denial of service
  • Elevation of privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 5 steps of threat modeling with STRIDE?

A
  1. Identify Security Objectives
  2. Application Overview
  3. Decompose Application
  4. Identify Threats
  5. Identify Vulnerabilities
    Repeat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different phases modeled in ATT&CK

A

Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 4 questions that help identify security objectives

A

What data do you need to protect?
Do you have compliance requirements?
Do you have specific QoS requirements?
Are there intangible assets that you need to protect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the key components of an application overview?

A
  • End-to-end deployment topology
  • Logical layers
  • Key components
  • Key services
  • Communication ports and protocols
  • Identities
  • External dependencies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which 4 steps help decompose an application?

A
  • Identify Trust Boundaries
  • Identify Data Flows
  • Identify Entry Points
  • Identify Exit Points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which steps help to identify threats / vulnerabilities to an application?

A
  • Start with common threats and attacks
  • Use a question-driven approach
    Topics:
  • Authentication
  • Authorization
  • Input and Data Validation
  • Configuration Management
  • Sensitive Data
  • Session Management
  • Cryptography
  • Exception Management
  • Auditing and Logging
  • Identify Threats Along Use Cases
  • Identify Threats Along Data Flows