Week 4 Threat Modeling & Mitigation Flashcards

1
Q

What is threat modelling?

A

Threat modeling is a structured process with these objectives: identify security requirements, pinpoint security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize remediation methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the benefits of threat modelling?

A
  • Provide an enhanced view of systems. The steps involved in threat modeling–creating data flow diagrams (DFDs) and graphical representations of attack paths, as well as prioritizing assets and risks–help IT teams gain a deeper understanding of network security and architecture.
  • Help enable better collaboration on security. Proper threat modeling requires input from many stakeholders. Participating in the process can help instill cybersecurity consciousness as a core competency for all participants.
  • Facilitate risk prioritization. Businesses can use the threat data provided by modeling to make decisions about which security risks to prioritize–a helpful process for understanding where to allocate people and budget resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps involved in threat modelling?

A
  • Identify assets. An asset could be account data, intellectual property, or simply the reliable functioning of a system.
  • Diagram the system. DFDs provide a high-level, asset-centric view of systems and the data flows of attacks. An attack tree, or graphic representation of an attack path, illustrates the possible origins and paths of attacks.
  • Analyze threats. Use threat modeling methods to further analyze specific threat types, identify potential threats, map dataflows, and quantify risk.
  • Perform risk management and prioritization. Many threat modeling tools produce threat scores and data for calculating risk. Stakeholder input is essential to this step.
  • Identify fixes. Once you identify the areas, assets, or threats that matter most to the organization, the next steps may be apparent. Changing firewall, encryption, or multi-factor authentication settings are examples of steps to address a threat.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do I measure the effectiveness of threat modeling?

A
  • Common Vulnerability Scoring System (CVSS). CVSS produces standardized scores for application vulnerabilities, IT systems and elements, and IoT devices; the scores can be calculated with a free online tool. For additional perspective, scores can be compared against a database of existing scores crowdsourced from similar enterprises.
  • Penetration testing. Sometimes referred to as “ethical hacking,” penetration testing is the process of staging dummy attacks on a system to measure its strengths and weaknesses. Pen tests may require a good deal of time-consuming data analysis, so organizations should be wary of running too many tests, or tests on assets that are not sufficiently high-risk to justify the cost.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the six stages of threat model process?

A
  1. Assemble resources
  2. Decompose the system
  3. Identify threats
  4. Rank the threats
  5. Make a response plan
  6. Mitigate the threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is threat mitigation?

A

Threat mitigation is the process of reducing or removing a threat from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the six fundamental ways of reducing orremoving a threat?

A
  • Prevention
  • Preemption
  • Deterrence
  • Deflection
  • Detection
  • Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly