Threat Modelling

Last Updated :
Discuss
Comments

Question 1

What is the primary purpose of threat modeling?

  • To write security policies

  • To identify and prioritize potential threats early in the design phase

  • To install antivirus software

  • To conduct penetration testing

Question 2

Which step comes FIRST in the threat modeling process?

  • Design mitigations

  • Diagram the system

  • Define scope & objectives

  • Analyze & prioritize risks

Question 3

What does the STRIDE threat model acronym represent?

  • Six categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege

  • Seven risk factors for vulnerabilities

  • Steps for mitigation planning

  • Types of network firewalls

Question 4

What advantage does Process Flow Diagram (PFD) threat modeling have over Data Flow Diagrams (DFD)?

  • PFDs require more security expertise

  • PFDs model from the attacker's perspective, focusing on user interactions rather than just data movement

  • PFDs only work for web applications

  • PFDs ignore trust boundaries

Question 5

Which best practice ensures threat modeling remains effective as systems evolve?

  • Complete it once during initial design

  • Review and iterate regularly, updating diagrams and mitigations as architecture changes

  • Delegate it entirely to security teams

  • Only model external threats

There are 5 questions to complete.

Take a part in the ongoing discussion