What is a defensive approach to Threat Modeling?
Prediction of threats and designing in specific defenses during the coding and crafting process, rather than relying on post deployment mitigation such as patches and updates.
What is FUZZ testing?
Subjecting software to invalid inputs to trigger known software vulnerabilities such as buffer overflows, software crashes, etc.
Name the three types of Threat Modeling?
Name the elements of the STRIDE model (Microsoft).
What is the purpose of creating a Threat Model Diagram?
Helps detail the function and purpose of each element of a business task, development process or work activity.
What is Reduction Analysis?
Also known as decomposing the application, system, or environment to gain a greater understanding of the logic of products as well as its interactions and external elements.
What are the Key Concepts in Reduction Analysis? (TDIPD)
What is the DREAD system used for?
DREAD is used to rank or rate threats identified in Threat Modeling for prioritization and response
What does DREAD stand for?
D=Damage potential-How sever would damage be
R=Reproducibility-How complicated to reproduce the exploit
E=How hard is it to exploit the attack
A=Affected users-How many users can be affected?
D=Discoverability= How hard for an attacker to discover the weakness
What are three ways to integrate security risk considerations in an acquisition strategy and practice?
What are the elements of a Security Plan?