Threat Modelling & Analysis Flashcards
Threat modelling, threat categories, attack modelling
Protecting software system security
What do we want to protect?
How? Types of protection
What do we want to protect?
- Software system assets: anything that is valuable in these systems
- E.g., software, hardware, data, communication networks
How? Types of protection:
- Prevention – “taking measures that prevent your assets from being damaged”
- Detection – “taking measures that allow you to detect when an asset has been
damaged, how it has been damaged, and who has caused the damage” - Reaction – “taking measures that allow you to recover your assets or to
recover from damage to your assets”
What is a Threat?
Any circumstance or event with the potential to cause the security of the system to be compromised
What computer security aspect (properties) can be compromised?
Confidentiality
Integrity
Availability
CIA Triad
Confidentiality – prevention of unauthorized disclosure of information
Integrity – prevention of unauthorized modification of information
Availability – prevention of unauthorized withholding of information
or resources
What is Threat Modelling?
Threat Modelling is about using models to find security problems
Four key questions for Threat Modelling
Q1. What are we working on (developing)?
Q2. What can go wrong?
Q3. What are we going to do about it?
Q4. Did we do a good job of threat analysis
Three types of structure approaches to threat modelling
1) Asset-centric:
Focuses on the assets you want to
protect
2) Attacker-centric:
Focuses on different attacker types
3) Software-centric
Focusses on software itself, on
how it works
Data-Flow Diagram
DFD is a model that shows a flow of data through a process or a system
STRIDE
- Spoofing - Impersonating something or
someone else - Tampering - Modifying data or code
- Repudiation - Claiming to have not
performed an action. - Information disclosure - Exposing information to someone not authorized to see it
- Denial of Service - Deny or degrade service to users
- Elevation of Privilege - Gain capabilities without proper authorization
Attack Trees
Attack trees can be used:
1. As a way to find threats
2. As a way to organize threats found with other methods
Attack Tree Modification: Attack-Defense Tree
Attack–defense tree (ADTree) is a “graphical
representation of possible measures an attacker might take in order to attack a system and the defenses that a defender can employ to protect the system