From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Challenge: Threat modeling exercise

Challenge: Threat modeling exercise

(snappy electronic music) - [Instructor] Let's do a challenge. In this challenge, you'll complete a simple, yet insightful threat modeling exercise. Now, threat modeling is important as it helps you to get an idea of where threats could occur so that you can focus your efforts on mitigating the threats and reducing risk. To complete this exercise, you can use the STRIDE method to identify threats. Now, there are other methods, however, the STRIDE method nicely summarizes potential threats. Now, how this works is that if we take a look at each of the first letters of STRIDE, we can then translate that to where possible threats against the system could be, including spoofing, tampering, repudiation, information disclosure, denial of service, or elevation of privilege. To learn more, you can visit this page from Cisco that outlines threat modeling, along with more details on the STRIDE method found on Microsoft's page. So now here's the challenge, here we see a data flow diagram of a…

Contents