Network Security SS19 51 Threat Modeling Part1
Network Security SS19 51 Threat Modeling Part1
Automotive Security
Summer Term 2019
Dr. Rahamatullah Khondoker
Contents
Summary
Pen Testing
Threat Modeling
Whiteboard Diagrams
Brainstorming
UML Diagrams
State Diagrams
Swim Lane Diagram State Machine Diagram
STRIDE
Attack Trees
Attack Libraries
Privacy Tools
Spoofing
Denial of Service
Elvation of Privilege
Spoofing
Elvation of Privilege
Spoofing
Elvation of Privilege
Spoofing
Tampering
Threat: Information Disclosure
Property: Confidentiality
Repudiation
Definition: Exposing information to someone not
Information authorized to see it
Disclosure Example: Allowing someone to read the windows OS
source code, publishing a list of customers
Denial of Service to a web site
Elvation of Privilege
Spoofing
Spoofing
OR
Root node is a threat
With a Key Without a Key
Starting the
Threat
Planning Implementing Iteration
Modeling
Project
Risk = Probability x
Impact Accepting
Risks
Accept To accept the risk due to certain reasons such as cost, lack of manpower
Ignore Risk can be ignored due to certain reasons, however, not recommended
Avoid To avoid the risk by eliminating the factors that generate the risk