Information systems
threat modeling
VGTU 2015
About me
Audrius Kovalenko | @slicklash
NOT Computer Security Expert
Just a developer
Which one is more secure?
Which one is more secure?
INSECURE*
87% INSECURE
INSECURE
(IN)SECURE
link
link
link
What’s a “secure” system?
What’s a “secure” system?
Good security = Prevention + Detection + Response
Security properties
Authentication
Integrity
Non-repudiation
Confidentiality
Availability
Authorization
Security threats
Authentication Spoofing
Integrity Tampering
Non-repudiation Repudiation
Confidentiality Information Disclosure
Availability Denial of Service
Authorization Elevation of Privilege
STRIDE
Spoofing
STRIDE
Tampering
STRIDE
Dr. David Warren
Repudiation
STRIDE
Information disclosure
STRIDE
Hacked Same Password Success
Denial of service
STRIDE
Elevation of privilege
STRIDE
Lack of security design
last minute fixes
Securing the design
threat modeling
What are you building?
data flow diagram
Decomposition
roles
User Roles
Name Description Authentication
Admin Administrators have complete and unrestricted access to Notices, Partner Accounts and Logs. Windows
Partner Partners can create, read and update Notices. Basic
User Users can read and update Notices. Forms
Service Roles
Name Description Authentication
APP Role Identity APP is running as. Windows Integrated (ApplicationPoolIndentity)
SVC Role Identity SVC is running as. Windows Integrated (Local System)
MSMQ Role Identity MSMQ is running as. Windows Integrated (Network Service)
Decomposition (2)
components
Components
Name Roles Type Run As Communication Channel Technology Uses
APP Admin
User
Website APP Role HTTPS C#, ASP.NET MVC 5 Cryptography,
File I/O
API Partner Website API Role HTTPS C#, ASP.NET MVC 5 Cryptography,
File I/O
SVC MSMQ Windows
Service
SVC Role TCP/IP C# Cryptography,
File I/O
Decomposition (3)
data
Data
Name Description Data Elements Data Stores
Form Defines structure of a Notice Fields Database
Access Control
Role Access Control Remarks
Admin C R U D
Partner R Limited information. Form must be published.
User
What can go wrong?
card games
What can go wrong? (2)
checklists
CAPEC
https://capec.mitre.org/data/index.html
OWASP ASVS
https://www.owasp.org/index.php/Category:OWASP_Application_Security_Verification...
OWASP AppSensor
https://www.owasp.org/index.php/AppSensor_DetectionPoints
How to prioritize?
convert threat to risk
Risk
Loss event
frequence
Loss
magnitude
Threat event
frequence
prob. Threat agent actions
result in loss
How to mitigate?
raise the cost
Time
Skills
Money
etc.
capability
How to make it work for you?
Practice
Experience
Reflection
Theory
find your own way
Books
http://www.cl.cam.ac.uk/~rja14/book.html
Books
FAIR STRIDE PASTA
Resources
STRIDE
http://blogs.microsoft.com/cybertrust/2007/09/11/stride-chart
OWASP Cornucopia
https://www.owasp.org/index.php/OWASP_Cornucopia
EoP Card Game
https://www.microsoft.com/en-us/SDL/adopt/eop.aspx
FAIR
http://www.risklens.com/what-is-fair
SAFECode
http://www.safecode.org/publications
QA

More Related Content

PDF
This World of Ours
PDF
Introduction to Threat Modeling
PPTX
Owasp Community in Lviv
PPTX
Microservices Security
PDF
Virtual Networking Security - Network Security
PPTX
Overview of Microsoft Sql Server Security
PDF
Azure 13 effective security controls for iso 27001 compliance
PPT
Kevin wharram
This World of Ours
Introduction to Threat Modeling
Owasp Community in Lviv
Microservices Security
Virtual Networking Security - Network Security
Overview of Microsoft Sql Server Security
Azure 13 effective security controls for iso 27001 compliance
Kevin wharram

What's hot (20)

KEY
개발자가 알아야 할 보안
PPT
Pattern For Ws Security
PDF
Web Security
PDF
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
PPTX
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
PDF
30 Cybersecurity Skills You Need To Become a Windows Security Pro
PDF
Atelier Technique - F5 - #ACSS2019
PPTX
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
PDF
Identity theft: Developers are key - JFokus 2017
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PDF
Security Risks & Vulnerabilities in Skype
PDF
Virtual Networking Security - Perimeter Security
PPTX
Web tools ppt
PDF
Internship brochure
PPTX
Redefining Security
PDF
OFFICE 365 SECURITY
PPTX
Mobile App Security: Enterprise Checklist
PDF
Top Ten Hacks of 2007
PPTX
Security automation in virtual and cloud environments v2
DOCX
Zach_Crawford_Brief
개발자가 알아야 할 보안
Pattern For Ws Security
Web Security
Skyport Systems: Securing Your Biggest IT Risk: Microsoft Active Directory
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
30 Cybersecurity Skills You Need To Become a Windows Security Pro
Atelier Technique - F5 - #ACSS2019
Ryan Smith's talk from the AWS Chicago user group May 22 - Security
Identity theft: Developers are key - JFokus 2017
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Security Risks & Vulnerabilities in Skype
Virtual Networking Security - Perimeter Security
Web tools ppt
Internship brochure
Redefining Security
OFFICE 365 SECURITY
Mobile App Security: Enterprise Checklist
Top Ten Hacks of 2007
Security automation in virtual and cloud environments v2
Zach_Crawford_Brief
Ad

Similar to VGTU Intro to Threats 2015 (20)

PPTX
Security engineering 101 when good design & security work together
PDF
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PPTX
20181206 sps geneve we are moving to the cloud what about security
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PPTX
ciso-workshop-3-identity-protection.pptx
PDF
Zero Passwords, Maximum Security The Future of Digital Identity.pdf
PDF
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
PDF
Security Testing for Test Professionals
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PPTX
Unit-I PPT.pptx
PDF
Just Enough Authentication
PPTX
3_Microsoft Security Overview.pptx revisiones
PDF
Security Testing for Test Professionals
PPTX
20181213 - wazug protecting your data with azure ad
PDF
The 15 best cloud security practices
PPTX
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Security engineering 101 when good design & security work together
Identity and Data protection with Enterprise Mobility Security in ottica GDPR
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
20181206 sps geneve we are moving to the cloud what about security
ScotSecure Cyber Security Summit 2025 Edinburgh
ciso-workshop-3-identity-protection.pptx
Zero Passwords, Maximum Security The Future of Digital Identity.pdf
2020-03-05 Secure IT day 2020 Abalon - comment protéger votre environnement ...
Security Training: #3 Threat Modelling - Practices and Tools
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Security Testing for Test Professionals
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Unit-I PPT.pptx
Just Enough Authentication
3_Microsoft Security Overview.pptx revisiones
Security Testing for Test Professionals
20181213 - wazug protecting your data with azure ad
The 15 best cloud security practices
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Ad

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Modernising the Digital Integration Hub
PDF
STKI Israel Market Study 2025 version august
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
The influence of sentiment analysis in enhancing early warning system model f...
DOCX
search engine optimization ppt fir known well about this
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
Five Habits of High-Impact Board Members
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPT
Geologic Time for studying geology for geologist
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
Module 1.ppt Iot fundamentals and Architecture
Modernising the Digital Integration Hub
STKI Israel Market Study 2025 version august
Zenith AI: Advanced Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Benefits of Physical activity for teenagers.pptx
Developing a website for English-speaking practice to English as a foreign la...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
sustainability-14-14877-v2.pddhzftheheeeee
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Chapter 5: Probability Theory and Statistics
The influence of sentiment analysis in enhancing early warning system model f...
search engine optimization ppt fir known well about this
Enhancing emotion recognition model for a student engagement use case through...
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Five Habits of High-Impact Board Members
Custom Battery Pack Design Considerations for Performance and Safety
Geologic Time for studying geology for geologist
OpenACC and Open Hackathons Monthly Highlights July 2025

VGTU Intro to Threats 2015