Evaluation of Threat Models
Evaluation of Threat Models
https://doi.org/10.22214/ijraset.2023.49311
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
Abstract: Information system security is the integrity and safety of its resources and activities. In the cyber world, it can be
almost impossible to trace sophisticated attacks to their true source. The anonymity enjoyed by the malicious user or cyber
attackers pose a grave threat to the global information society.
Cyber threat modelling is an analytical process that is used to identify the potential threats against a system or an
organization. It is a core activity and a fundamental practice in the process of building trusted technology. Threat modelling
has been identified as one of the best "return on investment" activities in order to identify and address design flaws. Some
threat model methods focus on identifying threats and security issues while some methods also perform assessment of the
resulting risk.
I. INTRODUCTION
1) Threat Modelling: A threat model is a structured representation of all the information that can affect the security of the
system. Identification of security requirement, pointing out security threats potential vulnerabilities, qualifying threat and
vulnerability and prioritizing solutions are the objectives of threat modelling. Threat modelling is a process for capturing,
organizing, and analysing all of this information. Applied to software, it enables informed decision-making about
application security risks. In addition to producing a model, typical threat modelling efforts also produce a prioritized list
of security improvements to the concept, requirements, design, or implementation of an application. Threat modelling
works by identifying the types of threat agents that cause harm to an application or computer system. It adopts the perspective
of malicious hackers to see how much damage they could do. Threat modelling technique furnishes security teams and
organizations in a way to distinguish potential threats and can be see equivalent balance on a functional level. When conducting
threat modelling, organizations perform a thorough analysis of the software architecture, business context, and other artifacts
(e.g., functional specifications, user documentation). Generally, developers perform threat modelling in five steps:
2) Threat Assessment: A threat assessment analyses your system to find out what attacks are currently happening or which
attacks are being threatened. Threat assessments can gather knowledge on attacks before they happen, which can help
determine the extent and danger of a threat and how it might affect an enterprise. It’s more of a reactive approach to IT
security, and a helpful option for companies who need to know what’s going on in their system and what issues need to be
resolved right away.
Threat assessments can catch digital threats like:
a) Vulnerabilities in applications that can be used to attack your network
b) Malware or viruses present
c) Current phishing attacks that put your enterprise at risk for a breach
d) Misuse of information (especially relevant to financial and health sectors)
e) Employee, vendor, and individual risks (detecting anyone with malicious intent)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 809
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 810
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
It is a risk based strategic assessment and planning technique developed by Computer Emergency Response Team (CERT).
OCTAVE is self-directed approach, meaning that people from an organization assume responsibility for setting the
organization’s security strategy.
Octave method focuses on three phases:
1) Phase 1: Identifying critical assets of the organization and the threats to those assets.
2) Phase 2: Identifying the vulnerabilities, both organizational and technological, identifying risk to the organization.
3) Phase 3: Developing a practiced based protection strategy and risk mitigation plans.
The framework has gone through several evolutionary phases, but the basic principles and goals have remained the same.
Two versions exist:
a) OCTAVE-S, a simplified methodology for smaller organizations or those with single level structures.
b) OCTAVE Allegro, a more comprehensive version for large organizations or those with multilevel structures.
Though OCTAVE threat model method provides a robust, asset-centric view, and organizational risk awareness, the
documentation can become voluminous. OCTAVE lacks scalability – as technological systems add users, applications, and
functionality, a manual process can quickly become unmanageable.
This method is most useful when creating a risk-aware corporate culture. The method is highly customizable to an
organization’s specific security objectives and risk environment.
The output of each stage acts as the input of the next stage.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 811
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
Beyond its more systematic methodology, TRIKE is different from other existing approaches to threat modelling in that it focuses
on modelling threats from a defensive perspective, not that of an attacker. It has automated components to implement. It has vague,
insufficient documentation. It also has built-in prioritization of mitigation.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 812
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
The third criteria is Applicability. Methods must be able to be applied recursively and account for the relationship among sub
systems. They must also address hardware-software dependencies and safety-security interdependencies.
V. CONCLUSION
Threat modelling can help to make organization more secure and trustworthy. Desired output should govern an organization’s
choice of threat model method. While all threat model methods, maybe capable of identifying potential threat and the type of threats
identified vary significantly. This paper consists of five threat model methods. Some can be used alone while some can be used in
conjunction with others.
PASTA modelling method can be used in the basis of framework. Whereas the components STRIDE and LINDDUN can be used.
PASTA also mitigates the threat explosion weakness of STRIDE and LINDDUN by utilizing risk and impact analysis. PASTA also
uses Attack Tree and CVSS (Common Vulnerability Scoring system). Choosing what method is best for a project depends upon the
specific areas where the user wants to target that target can be risk, security or privacy or how long the user can perform threat
model, how much experience the user has with threat model.
REFERENCES
[1] N. Shevchenko, B. Frye, C. Woody, “THREAT MODELING: EVALUATION AND RECOMMENDATIONS”, September 2018
[2] J. Brown-White, L. Cobb, J. DelGrosso, E. Foroughi, A. Ganjali, S. Moghnie, N. Ozmore, R. Padmanabhan, B. Schoenfield, I. Taradach, “Tactical Threat
Modeling”, SAFECode, 2017
[3] McGraw, Gary, and John Viega. Building Secure Software: How to Avoid Security Problems the Right Way. San Francisco: Addison-Wesley, 2002, 0-201-
72152-X.
[4] Swiderski, Frank and Window Snyder. Threat Modeling. Redmond, WA: Microsoft Press, 2004, 0-7356-1991-3
[5] Alberts, Christopher J. and Audrey J. Dorofee. OCTAVESM Criteria, Version 2.0. Pittsburgh, PA: Carnegie Mellon Software Engineering Institute, 2001,
http://www.cert.org/archive/pdf/01tr016.pdf.
[6] Common Criteria Development Board. Common Criteria for Information Technology Security Evaluatio2005,
http://www.commoncriteriaportal.org/public/expert/index.php?menu=3.
[7] Threatmodeler, “Security threat modeling methodologies: Comparing stride, vast & more,” ThreatModeler, 24-Aug-2022. [Online]. Available:
https://threatmodeler.com/threat-modeling-methodologies-overview-for-your-business/. [Accessed: 25-Feb-2023].
[8] (PDF) threat modeling methodologies for network security Available at: https://www.researchgate.net/publication/350891779_Threat_
Modeling_Methodologies_for_Network_Security (Accessed: February 25, 2023).
[9] Omar A. Turner, C.I.S.S.P. Privacy threat modeling with the linddun framework, LinkedIn. Available at: https://www.linkedin.com/pulse/privacythreat-
modeling-linddun-framework-omar/ (Accessed: February 25, 2023).
[10] Linddun LINDDUN. Available at: https://www.linddun.org/linddun (Accessed: February 25, 2023)
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 813