Week 8 - Threat Modelling Flashcards

1
Q

What is threat Modelling?

A

A systematic and structured
approach to determining the
threat landscape for a given
context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is threat modelling important?

A

helps to identify potential threats, assess their impact, and implement mitigation techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What four questions does threat modelling help to answer?

A

1) What are we building? - explain and explore
2) What can go wrong? - Brainstorm threats (STRIDE, cyber kill chains)
3) What will we do about it? - prioritize and fix
4) How did we do (reflection)? -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is STRIDE?

A

A framework for identifying common types of attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does STRIDE stand for?

A

-Spoofing
- Tampering
- Repudiation
- Information
- Disclosure
- Denial of Service
- Elevation of privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is “Spoofing”?

A

it is about authentication and occurs when an attacker pretends to be as someone else

e.g
Phishing emails or websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is “Tampering”?

A

it is about integrity and involves unauthorized modification of data.

e.g
Unauthorized modification of a salary in an HR database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Repudiation?

A

the rejection of responsibility for an action

e.g
Claiming an email wasn’t sent by the owner of the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Information Disclosure?

A

it is about confidentiality and involves
unauthorized release of confidential information.

e.g
Password leaks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Denial of Service?

A

it is about availability and occurs when legitimate users cannot access a service due to attacks like request floods.

e.g
HTTP floods to take down a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Escalation of Privilege?

A

it is about authorisation and occurs when an individual gains unauthorized elevated privileges.

e.g
A user with read-only permissions for a document being able to write to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can devs apply STRIDE?

A
  • assess how these threats might apply to the system
  • record details of threats as you progress
  • record any assumptions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mitigation techniques for STRIDE

A
  • Spoofing - Authentication (MFauth)
  • Tampering - Data protection (encryption)
  • Repudiation - Non-repudiation (digital signatures)
  • Information disclosure - Confidentiality (encryption/ hashes)
  • Denial of Service - Availability (firewalls)
  • Elevation of privileges - Authorisation (appropriate authorization mechanisms)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a limitation of the STRIDE framework?

A

may not cover novel or day-to-day vulnerabilities

and

attacks that occur in large-scale campaigns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Cyber Kill Chain?

A

A framework to identify and prevent cyber intrusions

designed with APT in mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the cyber kill chain stages?

A
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and control
  • actions on objective
17
Q

What is Reconnaissance?

A

Identifying information about the system and its security

18
Q

What is Weaponisation?

A

attackers create malware or other exploit tools to take advantage of the vulnerabilities identified

19
Q

What is Delivery?

A

sending the weaponized malware to the target through methods like phishing emails, social engineering, open ports, or SQL injection.

20
Q

What is Exploitation?

A

attacker executes the malicious code to gain unauthorized access.

21
Q

What is installation?

A

attacker installs additional malware in the system

22
Q

What is command and control?

A

attacker establishes remote access to the target system, often through a backdoor or remote access Trojan,

23
Q

What is Actions on Objectives?

A

attacker achieves their goal, such as stealing data,

24
Q

How can the Cyber Kill Chain be used in defense?

A

an be used to identify and prevent attacks by monitoring each stage

25
Q

What are the five (Ds) actions to break the Cyber Kill Chain?

A
  • Detect (identify the attack)
  • Deny (prevent unauthorized access), - Disrupt (interrupt attacker’s communications or data flow)
  • Degrade (slow down the attack),
  • Deceive (mislead the attacker with false information).
26
Q

What are some methods used to break the Cyber Kill Chain?

A
  • intrusion detection and prevention systems
  • firewalls
  • strong authentication and authorization protocols
  • encryption
  • employee training to mitigate phishing attacks.