DFD Based Threat modelling | Set 1 Last Updated : 11 Jul, 2025 Comments Improve Suggest changes Like Article Like Report Prerequisite - Threat Modelling DFD based Threat Modelling is one of the methods to visually represent the system being modelled with the other being Process Diagram based Threat Modelling. By using this approach threat modelling team will be able to identify the key processes in the system and threats to those processes by systematically following the flow of data through the system. This approach has the following steps: View System as an adversaryCharacterize the systemIdentify the threats Let's discuss these steps in detail one by one. 1. View System as an adversary: This is the first and the foremost thing to do while modelling a system using DFD Based approach. This step involves analyzing the system from the eyes of the adversary. Which processes and functions are visible and accessible to the attacker. Using these exposed services adversary formulates the goals to attack the system. Following are the series of steps: Identify the Entry/Exit points - Entry point means the point from where the data enters the application and Exit point means the point from where the data leaves the application. For the purpose of threat modelling following things need to be recorded for Entry/Exit points: Numerical ID: Assign a numerical id to each entry point and to each exit point for cross-referencing with threats and vulnerabilities.Name: Each entry and exit point should be assigned a name and also identify its purpose.Description: write a description explaining what exactly happens at that entry/exit point and also identify the trust levels that exits at that point.Identify the assets - The main goal of an adversary is to gain access to an asset. Assets also act as a pass-through point for an adversary, as one asset often interacts with other assets in the system. Thus it is important to identify the assets that need to be protected in a system from unauthorized access. This task is done by a team of security experts. In order to document the list of assets they collect the following data: Numerical Id: Each asset should be assigned a numerical Id for cross-referencing with threats and vulnerabilities.Name: Assign a name to the asset identified.Description: Write an explanation about why an asset needs protection.Identify the trust levels - Each entry/exit point are assigned trust values in order to define the privileges that an external entity has to access and affect the system. Following data need to be recorded while identifying trust levels: Numerical Id: A numerical Id should be assigned to each trust level for cross-referencing with threats and vulnerabilities.Name: Assign a name to each trust level.Description: Write a description explaining trust levels in more detail with outlining its purpose. 2. Characterize the system: Characterizing the system means gathering background information about the system and identifying the areas that need to be addressed. Following background information need to be gathered: Use scenarios - Identifying use scenarios is very important as neglecting these can result in a vulnerability. Use scenarios are generally identified by architects and end-users. These can be used by the security testing team for security testing and identifying the attack paths. Use scenario means the situation/ environment that how a system will be used or not used or not used in terms of configuration and security goals and non-goals. Following data need to be recorded for use scenarios: Numerical Id: Each use scenario should be given a unique identification number.Description: write a description explaining the following two points. First, a description of the use scenario and the second is to mention whether the use scenario is supported or not.External dependencies - External dependencies means the dependencies on outside resources and security policies. Identifying these is very important as if a threat from an external dependency is ignored it may become a valid vulnerability. Following data need to be recorded: Numerical Id: Each external dependency should be assigned a numerical id.Description: write a description giving details about an external dependency.External Security notes reference: External security notes from one component can be cross-referenced with external dependencies from other components within the application.External security notes - External security notes act as a means to provide users information about the security and integration of the system. External security notes are used to validate external dependencies and can be used as mitigation against a threat . The following information needs to be recorded in case of an external security note: Numerical Id: Each security note should be assigned a unique identification number.Description: Write a description explaining details about the note.Internal security notes: These explains the compromise made while designing and implementing system security. The following information needs to be recorded while identifying internal security notes: Numerical Id: Each identified internal security note should be assigned a unique numerical id.Description: Write a description explaining what security compromise was done and why compromise has been doneImplementation assumptions - These are collected during the design phase, listing the details of features that will be implemented later. Following data need to be recorded while identifying internal implementation assumptions: Numerical Id: Each identified internal implementation assumptionDescription: Write a description explaining the procedure to implement the features.Modelling the system - Most important point to keep in mind while threat modelling a system is to view the system through the adversary's eyes. Visual representation allows viewing the operation of subsystems and how they work together. This section deals with how to model a system using a Data Flow Diagram (DFD). Create Quiz Comment R rashi_garg Follow 0 Improve R rashi_garg Follow 0 Improve Article Tags : Misc Computer Networks Information-Security vulnerability Explore Computer Network BasicsBasics of Computer Networking4 min readTypes of Computer Networks6 min readIntroduction to Internet5 min readNetwork Devices3 min readWhat is OSI Model? - Layers of OSI Model11 min readTCP/IP Model6 min readDifference Between OSI Model and TCP/IP Model2 min readPhysical LayerPhysical Layer in OSI Model3 min readTypes of Network Topology9 min readTransmission Modes3 min readTransmission Media in Computer Networks7 min readData Link LayerData Link Layer in OSI Model4 min readSwitching | Computer Networks2 min readVirtual LAN (VLAN)3 min readFraming in Data Link Layer3 min readError Control in Data Link Layer3 min readFlow Control4 min readPiggybacking in Computer Networks2 min readNetwork LayerNetwork Layer in OSI Model3 min readIntroduction of Classful IP Addressing7 min readClassless Addressing in IP Addressing7 min readWhat is an IP Address?11 min readIPv4 Datagram Header4 min readDifference Between IPv4 and IPv63 min readPublic and Private IP addresses4 min readIntroduction To Subnetting5 min readWhat is Routing?10 min readNetwork Layer Protocols9 min readTransport LayerTransport Layer in OSI Model4 min readTransport Layer Protocols9 min readTransmission Control Protocol - TCP4 min readUser Datagram Protocol - UDP3 min readSession Layer & Presentation LayerSession Layer in OSI model2 min readPresentation Layer in OSI model2 min readSecure Socket Layer (SSL)4 min readPoint-to-Point Tunneling Protocol - PPTP2 min readMultipurpose Internet Mail Extension (MIME) Protocol3 min readApplication LayerApplication Layer in OSI Model4 min readClient-Server Model3 min readWorld Wide Web (WWW)6 min readIntroduction to Electronic Mail4 min readWhat is a Content Distribution Network and how does it work?4 min readProtocols in Application Layer4 min readAdvanced TopicsWhat is Network Security?7 min readQuality of Service and Multimedia5 min readAuthentication in Computer Network3 min readEncryption, Its Algorithms And Its Future6 min readIntroduction of Firewall in Computer Network3 min readMAC Filtering in Computer Network3 min readWi-Fi Standards Explained2 min readWhat is Bluetooth?6 min readGenerations of wireless communication2 min readCloud Networking4 min readPracticeTop 50 Plus Networking Interview Questions and Answers15+ min readTop 50 TCP/IP Interview Questions and Answers 202515+ min readNetwork Fundamentals Interview Questions - Computer Networks15+ min readLast Minute Notes for Computer Networks14 min readComputer Network - Cheat Sheet15+ min read Like