03 - Threat Modeling Flashcards
(21 cards)
What is threat modeling?
A proactive approach to identify, prioritize, and address potential security threats from an attacker’s perspective, analyzing vulnerabilities and planning mitigations early in system design.
What are the three main purposes of threat modeling?
- Understand likely attackers, motives, and targets.
- Discover vulnerabilities and attack paths.
- Prioritize defenses by threat relevance and feasibility.
Name the four key questions the threat modeling process answers
- Where are the high-value assets?
- Where is the system most vulnerable?
- What threats are most relevant?
- Are there unnoticed attack vectors?
List four benefits of using threat modeling.
- Early detection of security issues before coding.
- Clarifies security requirements aligned to business goals.
- Improves product design and reduces costly redesigns.
- Exposes hidden issues not found by other tools.
What’s the first step in the 4-step threat modeling framework?
“What are you building?” — create diagrams (DFD, system context, architecture) and define trust boundaries.
In threat modeling, what does STRIDE stand for?
Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.
What’s the second step in the 4-step framework?
“What can go wrong?” — apply STRIDE and/or attack trees to enumerate threats against your diagrams.
Give a mitigation strategy from the third step of threat modeling.
Mitigate (reduce likelihood/impact), Eliminate (remove risky feature), Transfer (outsource risk), or Accept (tolerate low/unavoidable risk).
What’s the fourth step of threat modeling?
“Did you do a decent job?” — validate diagrams for clarity and completeness, ensure threats are logged, addressed, tested, and resolved
Define “Spoofing” in STRIDE.
Pretending to be something or someone you are not.
Define “Tampering” in STRIDE.
Modifying something you’re not supposed to modify.
Define “Repudiation” in STRIDE.
Claiming you didn’t do something, regardless of whether you did.
Define “Information Disclosure” in STRIDE.
Exposing information to unauthorized parties.
Define “Denial of Service” in STRIDE.
Attacks designed to prevent a system from providing its services
Define “Elevation of Privilege” in STRIDE
Gaining abilities beyond those granted (doing things you shouldn’t be able to).
Which security goal corresponds to Spoofing?
Authenticity
Which security goal corresponds to Tampering?
Integrity
Which security goal corresponds to Repudiation?
Non-repudiation.
Which security goal corresponds to Information Disclosure?
Confidentiality
Which security goal corresponds to Denial of Service?
Availability
Which security goal corresponds to Elevation of Privilege?
Authorization