Threat Model Field Research
In this blog post, I will share the findings of my research in the field of threat modeling. What Is Threat Modeling Threat modeling is a process used to identify, assess, and address potential security threats and vulnerabilities in a system. The STRIDE Model There are numerous threat modeling methodologies, and the one I am interested in is the STRIDE model: Category Description Spoofing Impersonating another user or device. For example, IP spoofing: altering the source IP address in a packet header to make it appear as though the packet is coming from a trusted source. Tampering Malicious modification of data. For example, altering the data as it flows between two computers over the internet. Repudiation User denies having performed an action. For example, a user denies making a billion dolar transaction, and the system lacks the evidence to prove the transaction was indeed made by the user. Information Disclosure exposure of information to individuals who are not supposed to have access to it. For example, users read a file that they were not granted access to. Denial of service Denial of service (DoS) attack Elevation of Privilege An unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system. Tooling There are many toolings for threat modeling and here are some of them: ...