Threat Modeling
Threat Modeling
ID
Course
Instructor
Date
1
Contents
Introduction..............................................................................................................................2
Background...............................................................................................................................3
UML Diagram..........................................................................................................................3
Threats to System.....................................................................................................................9
Conclusion.................................................................................................................................9
References...............................................................................................................................10
2
Introduction
and defining countermeasures to prevent and mitigate the effects of the threats (Xiong &
Lagerström 2019, p. 51). A vulnerability is a weakness in the system that can make it easier
for an attacker to bypass the security measures in place and access confidential information
(Vliet et al. 2016, p. 375). This report aims to identify security threats for Business &
plan to address potential risks and threats from hackers trying to steal information from the
company. This report includes data flow diagrams for the system to show B&C Insurance
management about how data will flow in the proposed system. The report also identifies
threats to the system and how to mitigate them before causing any damage.
Background
B&C Insurance is a private health insurance company whose CEO received a ransom email
from an unidentified company that claims to have access to the company's strategic plans and
personal details of 200,000 clients. This made the CEO appoint a group of expert consultants
to prepare reports identifying threats and vulnerabilities of the system and extrapolate a crisis
management plan to address these weaknesses to avoid consequent attacks. This report
outlines the system's threat model, possible threats, their impact, and their likelihood to occur.
UML Diagram
A UML diagram is a diagram based on the Unified Modeling Language used to represent a
system's main actors, roles, classes, and actions to help understand information about the
system (Cvetković & Cvetković 2019, p. 1351). There are many different types of UML
diagrams including use case diagrams, class diagrams, and component diagrams. There are
3
two main types of UML diagrams; behavioral and structural. Structural UML diagrams show
elements of a system independent of time and convey how these elements relate to each other
(Shirole & Kumar 2013, p. 5). In contrast, behavioral UML diagrams, on the other hand,
depict the dynamic behavior of a system and the factors that change over time.
Structural Behavioral
It emphasizes the static structure of the It emphasizes the dynamic behavior of the
Examples include class diagram, object Examples include use case diagram,
Changes in events will not have any effect Changes in events have an effect on the
UML is used and recognized by most people as one of the best platforms for system
design. UML allows one to customize the modeling elements and interactions to suit
4
Many developers use UML mainly for their tools. UML tools can be used to apply
One does not need too much knowledge to use UML tools. The software is intuitive,
and anyone with knowledge in software design can use it to model a design for their
system.
Planning tool
UML has good planning tools that can generate code based classes in the model. This
helps reduce the overhead tasks during the implementation stage of the System
UML code does not include information about the system; therefore, such information
may be lost.
UML does not define a standard file format. Every vendor stores the representation of
The UML model is limited to what the vendor out of the box.
UML is a large and complex language with many different concepts and imprecise
semantics.
A data flow diagram is a visual representation of how information flows through a process or
system. DFDs include data inputs, outputs, data stores, and processes that the data moves
through (Zhang et al. 2018, p. 41). There are standard symbols and notations used to describe
5
the entities and relationships in the system. The diagram below shows the DFD for the B&C
Insurance system.
Components
1. Insurance Plan
A client applies for a new insurance plan by filling in a form and submitting it to the
system. After submittal, the system automatically captures the data and forwards the
2. Verify details
6
The detailed verification process receives data from the insurance plan process,
verifies it, sends the appropriate staff member to add the customer details, and sends
3. Payment
After the application status is approved, the customer makes payment via credit card.
Once the payment goes through, the system is confirmed, and the customer's
insurance plan is paid for and will take effect according to the policy.
The staff member receives details of the application and adds the customer's details in
7
A trust boundary in threat modeling is a term used to describe the boundary program data or
execution changes its level of trust (Hassan et al. 2020, p. 10). This line defines where data
comes from an untrusted source. This line depicts where it is necessary to implement security
Context Diagram
A context diagram is used to diagrammatically define boundaries between the system and its
environment, showing its entities and how they interact with it (Hong & Song 2013, p. 181).
It is also referred to as level 0 DFD. The B&C Insurance entities include customers, staff
8
Figure 3: Level 0 DFD or Context Diagram for B&C Insurance
DFD level 1
The level 1 DFD of B&C Insurance goes deeper into the Add Identity process and shows its
sub-processes and how they interact. Here, the customer can add identity after their insurance
9
Figure 4: Level 1 DFD for B&C Insurance
(Xiong &
10
Lagerström 2019, p. hang
53).
malware is
used to fake
operations
information to an steal
party inputs.
The attacker
can steal
browser
history from
an insecure
PC.
11
malware
Bugs placed in
the system
listen and
infiltrate
information to
the attacker
malicious activities.
manipulation or
forging the
identification of new
2017, p. 18).
Threats to System
Denial of Service Bulky unwanted messages can make the B&C Insurance
12
system hang or crash temporarily, leading to a lack of
party companies.
Conclusion
This report outlined the threats and threat model for B&C Insurance company and their
impacts on the system. It also covered the different UML diagrams that can be used to model
the system with improved security features that will assist management in ensuring all
vulnerabilities are addressed, and crisis management strategies are in check. Data flow
diagrams are also used to depict the system model and how data flows within processes from
untrusted zones to trusted zones where security features must be implemented. The current
B&C Insurance system is vulnerable to different types of security threats, including spoofing
Implementing the crisis-management strategies in place will reduce the chances of another
References
Chen, C-L, Chiang, M-L, Peng, C-C, Chang, C-H & Sui, Q-R 2017, 'A secure mutual
13
International Journal of Communication Systems, vol. 30, no. 6, 10.1002/dac.3081,
<https://lesa.on.worldcat.org/oclc/6987626883>.
Cvetković, J & Cvetković, M 2019, 'Evaluation of UML diagrams for test cases
<https://lesa.on.worldcat.org/oclc/8156828656>.
Hassan, MM, Hassan, MR, Huda, S & de Albuquerque, VHC 2020, 'A Robust Deep Learning
<https://lesa.on.worldcat.org/oclc/8652198317>.
Hong, O & Song, J 2013, 'A New Method of Understanding Learning in Science Centers:
Context Diagrams of Learning Experiences', Visitor Studies, vol. 16, no. 2, pp. 181-
200, 10.1080/10645578.2013.827021,
<https://lesa.on.worldcat.org/oclc/5160026255>.
Santos, EE, Santos, E, Korah, J, Thompson, JE, Murugappan, V, Subramanian, S, Yan, Z &
Shirole, M & Kumar, R 2013, 'UML behavioral model based test case generation a survey',
ACM SIGSOFT Software Engineering Notes, vol. 38, no. 4, pp. 1-13,
10.1145/2492248.2492274, <https://lesa.on.worldcat.org/oclc/5138552497>.
14
Vliet, VMTH, Wiberg, D, Leduc, S & Riahi, K 2016, 'Power-generation system vulnerability
and adaptation to changes in climate and water resources', Nature Climate Change,
<https://lesa.on.worldcat.org/oclc/8124699258>.
<https://lesa.on.worldcat.org/oclc/8622919685>.
Zhang, H, Liu, W, Xiong, H & Dong, X 2018, 'Analyzing data flow diagrams by combination
<https://lesa.on.worldcat.org/oclc/7807529617>.
15