Week 1 - Hi everyone! I am back!
Have you ever read news about security threat and wonder whether
your home, business, or work network is vulnerable? If you do, then you wonder how you would find
out if your network is protected or not.
Well, I do, and I intend to figure this out. So, follow me …
One way to know if your network is vulnerable to a threat
is by going through a threat analysis process, which is known as threat modeling. There are several types of threat models
available today, including but not limited
to brainstorming, Kill Chain, Common Attack Pattern Enumeration and
Classification (CAPEC), and Spoofing Tampering Repudiation Information Disclosure
Denial of Service and Elevation of Privilege (STRIDE). Brainstorming is a traditional method widely
used by developers. Structured methods
such as Kill Chain, CAPEC, and STRIDE were adopted later. Kill Chain is a method adopted from the military
strategy. It involves four steps:
find the target, fix the target, attack the target, and finish the target. CAPEC uses a collection of known attacks as
the reference to enhance security protection.
STRIDE focuses on six different type of threats that attack six security
properties (authentication, integrity, non-repudiation, confidentiality, availability,
authorization).
STRIDE Mnemonic:
- Spoofing: pretend to be someone or something that has legitimate permission to access the system
- Tampering: change data or code
- Repudiation: deny any wrongdoing
- Information Disclosure: access restricted information without permission
- Denial of Service: cause the system to halt or slow down to a point that it cannot supply the service
- Elevation of Privilege: user can perform action beyond the assigned privileges
STRIDE is a sound structured threat model that address most
of the aspects of security. I found it
suitable to use without years of practice in security.
Comments
Post a Comment