Friday, October 24, 2014

STRIDE mechanism to model Threat

Threat Identification can be highly effective if we follow the STRIDE mechanism :

  • Spoofing - It is pretending to be something or someone you are not
  • Tampering - It is modifying something you are not supposed to
  • Repudiation - It means claiming you did not do something
  • Information Disclosure - unauthorized disclosure of Information
  • Denial of Service - attack designed to effect the availability of Information System
  • Elevation of Privilege -when a program or user is technically able to do things they are not supposed to

4 comments:

  1. Just one doubt Deepesh...
    It is Spoofing or Phishing?

    I think when you try some social engineering techniques to gain some unauthorized access by masquerading to someone is called Phising which you want to convey as Spoofing.

    And Spoofing is the creation of TCP/IP packets using somebody else's IP address which means it is related to networking stuffs.

    Am I right?

    ReplyDelete
    Replies
    1. Spoofing in terms of threat modeling is a very wide term.. Spoofing of the packets / spoofing of the network address is one of them..while others are spoofing a person (phishing),spoofing a file on disk,spoofing a program in memory etc.
      so in terms of threat they do lie under spoofing. The catch is in the controls to mitigate them

      Delete
    2. Thank you so much Deepesh for to the point explanation. (y)

      Delete
  2. Spoofing in terms of threat modeling is a very wide term.. Spoofing of the packets / spoofing of the network address is one of them..while others are spoofing a person (phishing),spoofing a file on disk,spoofing a program in memory etc.
    so in terms of threat they do lie under spoofing. The catch is in the controls to mitigate them

    ReplyDelete