threat modeling part 2 - stride

15
Threat Modeling Part 2 – STRIDE Brad Andrews , CISSP, CSSLP North Texas Cyber Security Conference 2015

Upload: north-texas-chapter-of-the-issa

Post on 07-Aug-2015

373 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Threat Modeling Part 2 - STRIDE

Threat ModelingPart 2 – STRIDE

Brad Andrews , CISSP, CSSLPNorth Texas Cyber Security Conference

2015

Page 2: Threat Modeling Part 2 - STRIDE

Long time in the tech field Wide range of jobs – Defense, Online,

Banking, Airlines, Doc-Com, Medical, etc. 20+ Years software development

experience 10+ in Information Security M.S. and B.S. in Computer Science from the

University of Illinois Active Certifications – CISSP, CSSLP, CISM

Who Am I?

Page 3: Threat Modeling Part 2 - STRIDE

Work for one of the largest providers of pharmacy software and services in the country

Serve as Lead Faculty-Area Chair and for Information Systems Security for the University of Phoenix Online Campus

Carry out independent reading and research for my own company, RBA Communications

My Work

Page 4: Threat Modeling Part 2 - STRIDE

The views and opinions expressed in this session are mine and mine alone. They do

not necessarily represent the opinions of my employers or anyone associated with

anything!

My Opinions and Ideas Alone

Page 5: Threat Modeling Part 2 - STRIDE

Part 1 – Threat Modeling Overview Part 2 – Applying STRIDE to a System Part 3 – Applying DREAD to a System

Sessions Today

Page 6: Threat Modeling Part 2 - STRIDE

Types of Exploits / Motivations of Attacker A Guide, not a Firm Taxonomy

SpoofingTamperingRepudiation

Information DisclosureDenial of Service

Elevation of Privelege

What is STRIDE

Page 7: Threat Modeling Part 2 - STRIDE

Pretending to Be Something You are Not

Spoofing

Page 8: Threat Modeling Part 2 - STRIDE

Making Unauthorized Modifications

Tampering

Page 9: Threat Modeling Part 2 - STRIDE

Denying A Past ActionAvoiding Consequences

Repudiation

Page 10: Threat Modeling Part 2 - STRIDE

Unauthorized Data Exposure

Information Disclosure

Page 11: Threat Modeling Part 2 - STRIDE

Preventing Expected Access

Denial of Service

Page 12: Threat Modeling Part 2 - STRIDE

Unauthorized Rights

Elevation of Privilege

Page 13: Threat Modeling Part 2 - STRIDE

Be Involved Don’t Monopolize Work Together

Interactive Time

Page 14: Threat Modeling Part 2 - STRIDE

Find Risks for Chosen Systems

Note Some Risks

Page 15: Threat Modeling Part 2 - STRIDE

Questions?