Lecture-10program to detect double space
Lecture-10program to detect double space
Lecture # 10
1
Objectives
• Introduction to Threat Modelling.
2
Threat Modelling
• Threat modeling as “an activity to model the thought
processes of an adversary who is trying to achieve a
set of targets with respect to a computer system”.
3
Threat Modelling (Cont..)
• The term threat represents an attacker’s goal.
4
Threat Modelling (Cont..)
• The threat modeling process is performed at the early
stages of the software development life cycle to
identify possible threats that may cause harm to
software applications if exploited.
5
Threat Modelling (Cont..)
• The threat modeling process provides a threat profile
consisting of all the adversary’s goals and a set of
mitigation measures to minimize the effects of
threats.
6
Threat Modelling (Cont..)
• Purpose of threat modeling is to “create security
specifications for software systems and to integrate
these specifications into the design of systems”.
7
Threat Modelling (Cont..)
• Further, threat modeling helps to understand the
threat profile of a system, provides a basis for secure
design and implementation, discovers vulnerabilities
in the system and provides feedback for the
application security life cycle.
8
Threat Modelling (Cont..)
• Also, the threat modeling process improves the
security of the system and confidence in the system
security.
9
The STRIDE Model
• The STRIDE model is a threat categorization model
which covers the main six broad categories of threats
that an application may face.
10
The STRIDE Model (Cont..)
• Also, the threat modeling process improves the
security of the system and confidence in the system
security.
11
The STRIDE Model (Cont..)
• STRIDE threat categories are Spoofing, Tampering,
Repudiation, Information Disclosure, Denial of
Service and Elevation of Privilege.
12
The STRIDE Model (Cont..)
• Spoofing is the process in which an illegal user gets
the identification information of another legal user
through wrong means and pretends to be a legal user.
13
The STRIDE Model (Cont..)
• Repudiation is concerned with the refusal of an action
performed by a legal user.
14
The STRIDE Model (Cont..)
• In information disclosure private and personal data of
users or institution is opened to other users who do
not have rights to access that data.
15
The STRIDE Model (Cont..)
• In denial of service the system resources are made
unavailable to legitimate users.
16
The STRIDE Model (Cont..)
• The STRIDE model is a core component of many
threat modeling tools such as SDL threat modeling
tool and TAM threat modeling tool.
17
The DREAD Model
• The DREAD model is a threat rating model which is
used to calculate risk and risk rating for the threats
identified by applying the STRIDE model.
18
The DREAD Model (Cont..)
• The term DREAD represents five categories: Damage
Potential, Reproducibility, Exploitability, Affected
Users and Discoverability.
19
The DREAD Model (Cont..)
• In damage potential we estimate the damage incurred
in the case of threat execution and attack happening.
20
The DREAD Model (Cont..)
• In reproducibility we estimate the probability of the
reoccurring of attach under the same conditions.
21
The DREAD Model (Cont..)
• In exploitability we estimate the efforts that will be
incurred by the attacker to launch an attack.
22
The DREAD Model (Cont..)
• Affected users measure the number of users that will
be affected if the threat executes and an attack is
launched on the system.
23
The DREAD Model (Cont..)
• Discoverability helps to estimate the effort incurred
by the attacker to find vulnerability in the system
design and launch an attack.
24
Questions
Any Question Please?
25
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
26
Thanks
27