03 - Threat Modeling Flashcards

(21 cards)

1
Q

What is threat modeling?

A

A proactive approach to identify, prioritize, and address potential security threats from an attacker’s perspective, analyzing vulnerabilities and planning mitigations early in system design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main purposes of threat modeling?

A
  1. Understand likely attackers, motives, and targets.
  2. Discover vulnerabilities and attack paths.
  3. Prioritize defenses by threat relevance and feasibility.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the four key questions the threat modeling process answers

A
  1. Where are the high-value assets?
  2. Where is the system most vulnerable?
  3. What threats are most relevant?
  4. Are there unnoticed attack vectors?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List four benefits of using threat modeling.

A
  1. Early detection of security issues before coding.
  2. Clarifies security requirements aligned to business goals.
  3. Improves product design and reduces costly redesigns.
  4. Exposes hidden issues not found by other tools.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s the first step in the 4-step threat modeling framework?

A

“What are you building?” — create diagrams (DFD, system context, architecture) and define trust boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In threat modeling, what does STRIDE stand for?

A

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s the second step in the 4-step framework?

A

“What can go wrong?” — apply STRIDE and/or attack trees to enumerate threats against your diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give a mitigation strategy from the third step of threat modeling.

A

Mitigate (reduce likelihood/impact), Eliminate (remove risky feature), Transfer (outsource risk), or Accept (tolerate low/unavoidable risk).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What’s the fourth step of threat modeling?

A

“Did you do a decent job?” — validate diagrams for clarity and completeness, ensure threats are logged, addressed, tested, and resolved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define “Spoofing” in STRIDE.

A

Pretending to be something or someone you are not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define “Tampering” in STRIDE.

A

Modifying something you’re not supposed to modify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define “Repudiation” in STRIDE.

A

Claiming you didn’t do something, regardless of whether you did.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define “Information Disclosure” in STRIDE.

A

Exposing information to unauthorized parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define “Denial of Service” in STRIDE.

A

Attacks designed to prevent a system from providing its services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define “Elevation of Privilege” in STRIDE

A

Gaining abilities beyond those granted (doing things you shouldn’t be able to).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which security goal corresponds to Spoofing?

17
Q

Which security goal corresponds to Tampering?

18
Q

Which security goal corresponds to Repudiation?

A

Non-repudiation.

19
Q

Which security goal corresponds to Information Disclosure?

A

Confidentiality

20
Q

Which security goal corresponds to Denial of Service?

21
Q

Which security goal corresponds to Elevation of Privilege?

A

Authorization