You are on page 1of 13

Ch. 2.

Strategies For Threat
Modeling

ZAIN RIZVI

TUT 01 – TU/TH 12:00 – 12:50 ICT 517
TUT 02 – TU/TH 1:00 – 1:50 ICT 517
TUT 03 – MO/WE 4:00 – 4:50 MS 160

 The company stakeholders who access sensitive documents and are not trusted. What’s your Threat Model?  What are you trying to model?  Ex. .  An untrusted network.  A thief who could steal your money.  An attack who could steal your cookie.

 Centered on:  1) Models of assets.  3) Models of software. .  2) Models of attackers. Structured Approaches to Threat Modeling  Different approaches for different type of modeling.

Focusing on Assets Things you Stepping want to stones protect Things attackers want .

Focusing on Attackers  Get into the mind of an attacker and see how they would approach your system.  “Professional attackers” can serve as experts. .  Limited imagination for attackers’ mind.  Former hacker turned security consultant.  Kevin Mitnick.

Focusing on Software  “Best” structured threat modeling approach. .  Be able to identify its strengths and weaknesses.  Be able to identify vulnerable points.  Complete understanding of your system.

. Models of Software  4 ways for visually modeling software.  State Diagrams.  Swim Lane Diagrams.  Data Flow Diagrams (DFDs)  UML Diagrams.

Data Flow Diagrams .

UML .

Swim Lane Diagrams .

State Diagrams .

Trust Boundaries .

Exercise  Form into groups (same as last time?)  Pick a subject (same as last time?)  Decide “What’s your threat model?”  Create your model.  Identify key components. .