What is Threat Modeling?
It provides the software development team an attacker’s or hostile user’s viewpoint, as the threat modeling exercise aims at identifying entry and exit points that an attacker can exploit.
Benefits of Threat Modelling
Challenges of Threat Modelling
STRIDE category of threats
Goal |
Description |
|
S |
Spoofing |
Can an attacker impersonate another user or identity? |
T |
Tampering |
Can the data be tampered with while it is in transit or in storage or archives? |
R |
Repudiation |
Can the attacker (user or process) deny the attack? |
I |
Information Disclosure |
Can information be disclosed to unauthorized users? |
D |
Denial of Service |
Is denial of service a possibility? |
E |
Elevation of Privilege |
Can the attacker bypass least privilege implementation and execute the software at elevated or administrative privileges? |
-----In Progress-
NOTE:The Information provided is on "as is" basis, without assurance of any kind.