Threat Modelling Flashcards

1
Q

Focused on analyzing existing artifact and interviewing individuals

A

Manual Inspection and Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ‘art’ of testing deployed applications remotely without knowledge of its workings

A

Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Manual checking of the source code for problems

A

Source Code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Potential or actual undesirable event that may be malicious or incidental

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DoS attack

A

Malicious Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

failure of a storage device

A

Incidental Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A structured representation of all the information that affects the security of an application

A

Threat model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A process for capturing, organizing, and analyzing information that affects the security of an application

A

Threat Modelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat Modelling Step 1

A

Assessment Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Modelling Step 2

A

System Modelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Modelling Step 3

A

Identify Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Threat Modelling Step 4

A

Evaluation or Impact on the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Modelling Step 5

A

Examining the Threat History

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Modelling Step 6

A

Identify Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Modelling Step 7

A

Developing a Security Threat Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identifying tangible assets and understanding the capabilities provided by the application.

A

Assessment Scope

17
Q

key part of threat model where you characterize the different groups of people who might be able to attack your application.

A

Identify Threat Agents

18
Q

Once you have an understanding of the security in the application, you can then analyze for new vulnerabilities

A

Identify Exploitable Vulnerabilities

19
Q

estimating a number of likelihood and impact factors to determine an overall risk or severity level

A

Prioritize Identified Risks

20
Q

Developed by Microsoft and suggested by OWASP for use

A

STRIDE/DREAD

21
Q

Provides a classification scheme for known threats and the likelihood of realization

A

STRIDE/DREAD

22
Q

S in STRIDE

A

Spoofing Identity

23
Q

T is STRIDE

A

Tampering with Data

24
Q

R is STRIDE

A

Repudiation

25
I is STRIDE
Information Disclosure
26
D is STRIDE
Denial of Service
27
E is STRIDE
Elevation of Privilege
28
1ST D is DREAD
Damage Potential
29
R is DREAD
Reproducibility
30
E is DREAD
Exploitability
31
A is DREAD
Affected users
32
LAST D is DREAD
Discoverability
33
Places developers in the mindset of an attacker. represented as a tree
Threat Graph
34
Risk = ( DAMAGE + REPRODUCIBILITY + EXPLOITABLILITY + AFFECTED USERS + DISCOVERABILITY ) / 5
Average Ranking
34
Goal based approach to threat modelling
Threat List
35
A more scientific approach to computing risk.
Probability x Impact ranking