TMIS Vocabulary Flashcards

Threat Modelling and Information Sharing (17 cards)

1
Q

Attack Surface

A

The sum of all possible points where an unauthorized user could try to enter or extract data from a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Flow (DFD)

A

Symbolizes the path and direction of data movement between entities, processes, and data stores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Flow Diagram (DFD)

A

A graphical representation of the data flow through an information system, used to understand the application’s mechanics and identify potential attack surfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Store (DFD)

A

Represents locations where data is stored within the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Doomsday Scenarios

A

Hypothetical worst-case situations used to proactively anticipate and prevent potential catastrophic events for an application and business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ecosystem (of applications)

A

A network of interconnected applications and services that work together to support an organization’s functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External Entity (DFD)

A

Represents any entity outside the application that sends or receives data, interacting with the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mitigation

A

The process of selecting and implementing security controls to defend against identified threats and reduce risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NotebookLM can be inaccurate; please double-check its responses.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Process (DFD)

A

Represents a task within the application that handles data, potentially modifying or acting upon it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Secure Development Lifecycle (SDLC)

A

A framework for integrating security activities into the software development process. Threat modeling is an essential step within this lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

STRIDE

A

An acronym used for identifying threats: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Threat Actors

A

Individuals or groups who pose a threat to an application, categorized by their relationship and trust level with the organization (e.g., Insider trusted, External untrusted).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Threat Modeling

A

A structured activity for identifying and managing application threats, also known as Architectural Risk Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trust Boundary (DFD)

A

An extension of classical DFDs for threat modeling, representing a change of trust levels as data flows through the application and indicating potential attack surfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Validation

A

The final step in threat modeling where the effectiveness of mitigations is reviewed, and residual risks are assessed and managed.

17
Q

Vulnerabilities

A

Weaknesses or flaws in an application that can be exploited by threats.