{"id":225,"date":"2022-05-15T22:04:49","date_gmt":"2022-05-15T22:04:49","guid":{"rendered":"http:\/\/checkmateq.com\/blog\/?p=225"},"modified":"2023-08-02T09:09:40","modified_gmt":"2023-08-02T09:09:40","slug":"threat-modelling-overview","status":"publish","type":"post","link":"https:\/\/www.checkmateq.com\/blog\/threat-modelling-overview","title":{"rendered":"Threat modelling overview for predicting cyber attacks"},"content":{"rendered":"<p><strong>Threat modelling<\/strong> is a method for proactively identifying, categorising, and analysing potential threats. Threat modelling can be used as a proactive measure during the software design, software development, product release phase or as a reactive measure once a product has been created. In any scenario, the process identifies potential system dangers, their likelihood of occurrence, the priority of concerns, and methods to eliminate or mitigate the hazard.<\/p>\n<p>Threat modelling isn&#8217;t supposed to be a one-time thing. Instead, it&#8217;s intended to begin early in a system&#8217;s design process and continue throughout its existence.<\/p>\n<p>A defensive approach to threat modelling takes place during the early stages of product development, specifically during initial design and specification establishment. <a href=\"https:\/\/www.checkmateq.com\/full-stack-development\">Product development<\/a> may adopt secure development best practices to ensure creditable encryption algorithms are deployed. This method is based on predicting threats and designing specific defences during the coding and crafting processes. In most cases, integrated security solutions are more cost-effective and more successful than those shoehorned in later. While not a formal phrase, this approach to threat management might be termed proactive.<\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-medium wp-image-226\" src=\"http:\/\/checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-300x169.jpg\" alt=\"Cyber Security\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-300x169.jpg 300w, https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-1024x576.jpg 1024w, https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-768x432.jpg 768w, https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-1536x864.jpg 1536w, https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services-1200x675.jpg 1200w, https:\/\/www.checkmateq.com\/blog\/wp-content\/uploads\/2022\/05\/IT-Services.jpg 1920w\" sizes=\"(max-width: 300px) 85vw, 300px\" \/><\/p>\n<p>Unfortunately, not all risks can be expected during the product design process, thus a reactive threat management method is still required to deal with unforeseen situations. This method is sometimes referred to as &#8220;threat hunting&#8221; or an adversarial approach. After a product has been produced and delivered, an adversarial method to threat modelling is used. This deployment could take place in a test or laboratory setting or in the open market.<\/p>\n<p>The underlying notion of ethical hacking, <strong><a href=\"https:\/\/www.checkmateq.com\/application-security\">penetration testing<\/a>, source code review<\/strong>, and <strong>fuzz testing<\/strong> is threat hunting. Although these methods are often effective in identifying defects and threats, they do necessitate more coding time to implement new defences, which are usually published as patches.<span class=\"Apple-converted-space\">\u00a0<\/span>As a result, security patches are less effective (than defensive threat modelling) at the risk of diminished functionality and user-friendliness.<\/p>\n<h3><b>Threat Modeling Agenda<\/b><\/h3>\n<p>Because there are virtually unlimited risks, it&#8217;s critical to adopt a structured IT strategy to effectively identify relevant threats. Some businesses, for example, employ one or more of the following three strategies:<\/p>\n<p><strong>High value asset Identification<\/strong>: <span class=\"Apple-converted-space\">\u00a0 <\/span>This strategy makes use of IT asset appraisal results to try to spot dangers to valued assets.<\/p>\n<p><strong>Attackers Strategy<\/strong>: Based on the attacker&#8217;s objectives, aims, strategies, techniques, and procedures, some companies can detect potential attackers and the threats they pose.<\/p>\n<p><strong>Review Software\u00a0development\u00a0process<\/strong>:<span class=\"Apple-converted-space\">\u00a0 <\/span>When a company develop product, it should consider a deep discussion about potential security vulnerabilities, review <a href=\"https:\/\/www.checkmateq.com\/google-cloud\">cloud<\/a> endpoints, number of third party API calls, database connection entities for software development.<\/p>\n<h3>T<b>hreat Modelling Methodologies<\/b><\/h3>\n<p>Usually, there are seven renowned <b>threat modelling methodologies that are <\/b>helpful to utilise as a guide or reference while trying to inventory and categorise hazards.<\/p>\n<h3><b>7 best threat modeling methodologies<\/b><\/h3>\n<ol>\n<li><strong>STRIDE<\/strong><\/li>\n<li>DREAD<\/li>\n<li>PASTA<\/li>\n<li>VAST<\/li>\n<li>Trike<\/li>\n<li>OCTAVE<\/li>\n<li>NIST<\/li>\n<\/ol>\n<p>Although the <strong>STRIDE<\/strong> threat model was developed by Microsoft to categorise threats, The abbreviation <strong>STRIDE<\/strong> stands for the following:<\/p>\n<p><b>Spoofing:<\/b> <span class=\"Apple-converted-space\">\u00a0 <\/span>An attack with the purpose of getting access to a target system by impersonating someone else. When an attacker impersonates a legitimate or authorised entity, they can often get beyond filters and blockades that prevent illegal access.<\/p>\n<p><b>Tampering:<\/b> Any action that causes unauthorised data alterations or manipulation in transit or storage.<\/p>\n<p><b>Repudiation: <\/b>The ability of a user or attacker to maintain plausible deniability while denying performing an action or activity. Innocent third parties may be blamed for security breaches as a result of repudiation attacks.<\/p>\n<p><b>Information disclosure:<\/b> The revelation or distribution of private, confidential, or controlled information to external or unauthorized entities.<\/p>\n<p><b>Denial of service (DoS)<\/b> is an attack that tries to prevent a resource from being used by authorised users. This can be accomplished by exploiting flaws, overloading connections, or flooding traffic.<\/p>\n<p><b>Elevation of privilege:<span class=\"Apple-converted-space\">\u00a0<\/span><\/b> is a type of attack in which a limited user account is upgraded to one with more privileges, powers, and access.<\/p>\n<p><strong>Author Details<\/strong><\/p>\n<p>This blog is written by Amit Kumar, Head of enginering at <a href=\"https:\/\/www.checkmateq.com\/\">Checkmate Global Technologies<\/a>. You can reach out to him if you planning to adopt secure development best practices or looking for a reliable offshore technology partner for MVP development. You can reach out to our technical consultants. We offer dedicated development to manage entire product engineering operation, including <a href=\"https:\/\/www.checkmateq.com\/devops-engineering\">Cloud DevOps engineering<\/a>,\u00a0 production operation management, Data engineering services and mobile app development. For more details, book a call with our consultants today!<\/p>\n<p>#CyberSecurity #SoftwareDevelopmentOutsourcing #Cloudcomputing #DevOpsmanagment<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threat modelling is a method for proactively identifying, categorising, and analysing potential threats. Threat modelling can be used as a proactive measure during the software design, software development, product release phase or as a reactive measure once a product has been created. In any scenario, the process identifies potential system dangers, their likelihood of occurrence, &hellip; <a href=\"https:\/\/www.checkmateq.com\/blog\/threat-modelling-overview\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Threat modelling overview for predicting cyber attacks&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[3,5,7,8,9,6],"_links":{"self":[{"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/posts\/225"}],"collection":[{"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":8,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"predecessor-version":[{"id":4150,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/posts\/225\/revisions\/4150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/media\/226"}],"wp:attachment":[{"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.checkmateq.com\/blog\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}