{"id":1334,"date":"2023-09-25T16:17:16","date_gmt":"2023-09-25T16:17:16","guid":{"rendered":"https:\/\/matob.web.id\/en\/?p=1334"},"modified":"2023-09-25T16:17:16","modified_gmt":"2023-09-25T16:17:16","slug":"what-is-threat-modeling-process-and-methodologies","status":"publish","type":"post","link":"https:\/\/matob.web.id\/en\/what-is-threat-modeling-process-and-methodologies\/","title":{"rendered":"What is Threat Modeling: Process and Methodologies"},"content":{"rendered":"<p>As hacking incidents continue to increase, cybersecurity has become a top priority in today&#8217;s digital world. With more aspects of our lives moving online, both businesses and individuals have a lot to lose from security breaches.<\/p>\n<p>To address this concern, cybersecurity professionals are utilizing a variety of defenses and countermeasures to protect sensitive information and transactional data. Given the vast number and types of attacks currently available, this is a monumental task.<\/p>\n<p>To address this challenge, threat modeling has emerged as a crucial component in the <a href=\"https:\/\/matob.web.id\/en\/top-10-cybersecurity-trends-to-watch-out\/\">field of cybersecurity.<\/a> In this article, we will delve into the concept of threat modeling in cybersecurity, its importance, and the various methodologies available.<\/p>\n<h2><strong>Intro to Threat Modelling<\/strong><\/h2>\n<p>Threat Modeling is a method of optimizing network security by finding vulnerabilities, identifying objectives, and developing countermeasures to prevent or reduce the effects of <a href=\"https:\/\/matob.web.id\/en\/10-types-of-cyber-attacks-you-should-be-aware\/\">cyber attacks<\/a> on systems.<\/p>\n<p>While security teams on duty within the organization can perform Threat Modeling from any point during development, doing so early in the project is best practice. This way, threats can be identified quickly and dealt with before they become problems.<\/p>\n<h2><strong>Threat Modeling Process<\/strong><\/h2>\n<p>The Threat Modeling process consists of defining enterprise assets, identifying the functions used in each application in the grand scheme, and building a security profile for each application.<\/p>\n<p>The process continues by identifying and prioritizing potential threats, then documenting the hazardous events and what actions should be taken to resolve them.<\/p>\n<p>In layperson&#8217;s terms, Threat Modeling is taking a step back to assess an organization&#8217;s digital and network assets, identify weak points, determine existing threats, and determine future plans to protect or recover.<\/p>\n<p>While the term Threat Modeling may sound foreign, you would be surprised how little attention is paid to security in some sectors.<\/p>\n<p>We&#8217;re talking about a world where some people use &#8220;Password&#8221; as a password yet still leave their mobile devices unattended.<\/p>\n<p>With that said, it&#8217;s no surprise that many organizations and businesses still need to consider the idea of Threat Modeling.<\/p>\n<h2><strong>Threat Modelling Methodology<\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">There are many ways to fight cybercrime from several types of cyber attacks. One of them is by using the Threat Modeling methodology. Here are the ten most popular Threat Modeling methodologies currently in use.<\/span><\/p>\n<h3><strong>1. STRIDE<\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">The methodology developed by Microsoft for Threat Modeling, STRIDE, is used to identify security threats where the threats are divided into six categories, namely:<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Spoofing:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Intruders impersonating other users, components, or system features that contain identities in the modeled system.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Tampering: Alteration of data in systems to achieve malicious purposes.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Repudiation:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0The ability of an intruder to deny that they are carrying out some malicious activity in the absence of sufficient evidence.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Information Disclosure:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Expose protected data to unauthorized users to view.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Denial of Service:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Intruders use unauthorized means to obtain services so that other users cannot access these services.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Elevation of Privilege: Allows intruders to execute unauthorized commands and functions.<\/span><\/p>\n<h3><strong>2. DREAD<\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">It was proposed as a methodology for Threat Modeling, but Microsoft discontinued it in 2008 due to inconsistent methodology ratings. But OpenStack and many other organizations today still use DREAD. This methodology is basically a way to rank and assess security risks which are divided into five categories, namely:<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Damage Potential: Measures the level of damage resulting from exploited weaknesses.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Reproducibility:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Measures the ease with which an attack can reproduce.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exploitability: Measures the effort required to launch an attack.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Affected Users:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Measures how many users were affected if the exploit became widely available.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Discoverability:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Measures how easy it is to find threats.<\/span><\/p>\n<h3><strong>3. PASTE<\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">PASTA stands for Process for Attack Simulation and Threat Analysis. This methodology has seven steps centered on risk.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">This methodology is used for dynamic threat identification, enumeration, and assessment processes. Once the experts have detailedly analyzed the identified threats, the developer can develop an asset-centric mitigation strategy by analyzing the application through an attacker-centric view.<\/span><\/p>\n<h3><strong>4. Trikes<\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Trike focuses on using threat modeling as a risk <a href=\"https:\/\/matob.web.id\/en\/project-management-app-showdow-most-popular-tools\/\">management tool.<\/a> The threat model is built based on the requirements model and establishes an &#8216;acceptable&#8217; risk level determined by stakeholders to be assigned to each asset class.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Requirements model analysis generates a threat model in which threats are identified and assigned a risk score. The completed threat model is then used to build a quantifiable risk model, factor in action, asset, role, and risk exposure.<\/span><\/p>\n<h3><strong>5. VAST<\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">VAST stands for Visual, Agile, and Simple Threat. This methodology provides actionable output for the specific needs of various stakeholders such as <a href=\"https:\/\/matob.web.id\/en\/become-a-cyber-security-architect\/\">application architects<\/a> and developers, cyber security personnel, etc.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">VAST offers unique application and infrastructure visualization planning so that the creation and use of threat models do not require particular expertise in security.<\/span><\/p>\n<h3><strong>6. Attack Tree<\/strong><\/h3>\n<p>The Tree methodology is a conceptual diagram that shows how an asset or target can be attacked consisting of a root node with branching nodes that can be added.<\/p>\n<p>A child node is a condition that must be met to make the parent node immediately value true. Each node is directly related to the child nodes below it.<\/p>\n<p>This methodology has &#8216;AND&#8217; and &#8216;OR&#8217; options, which describe alternative steps<a href=\"https:\/\/matob.web.id\/en\/what-is-a-project-objectives-and-goals\/\"> to achieve a goal.<\/a><\/p>\n<h3><strong>7. Common Vulnerability Scoring System (CVSS)<\/strong><\/h3>\n<p>This method provides a way to capture the key characteristics of a vulnerability and assign a numerical score (ranging from 0-10, with 10 being the worst) indicating how severe it is.<\/p>\n<p>Scores are then translated into qualitative representations (e.g., Low, Moderate, High, and Critical). This representation helps organizations effectively assess and prioritize unique vulnerability management processes.<\/p>\n<h3><strong>8. T-MAP<\/strong><\/h3>\n<p>T-MAP is commonly used in Commercial Off the Shelf (COTS) systems to calculate attack path weights. This model incorporates UML class diagrams, including access classes, vulnerabilities, target assets, and affected values.<\/p>\n<h3><strong>9. OCTAVE<\/strong><\/h3>\n<p>The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) process is a risk-based strategic assessment and <a href=\"https:\/\/matob.web.id\/en\/project-planning-creating-project-management-plan\/\">planning method<\/a>. OCTAVE focuses on assessing organizational risk only and does not address technology risk. OCTAVE has three phases, namely:<\/p>\n<ol>\n<li>Build an asset-based threat profile. (Organizational evaluation).<\/li>\n<li>Identify infrastructure vulnerabilities. (Information infrastructure evaluation).<\/li>\n<li>Develop and plan security strategy. (Risk evaluation of critical assets and corporate decision-making.).<\/li>\n<\/ol>\n<h3><strong>10. Quantitative Threat Modeling Method<\/strong><\/h3>\n<p>This hybrid method combines attack trees, STRIDE, and CVSS methods. This methodology addresses some pressing issues with Threat Modeling for cyber-physical systems that contain complex interdependencies within each component.<\/p>\n<p>The first step is to build a component that attacks trees for the STRIDE category. These trees describe dependencies in attack categories and component attributes at a low level. Then the CVSS method is applied to calculate the scores of all tree components.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As hacking incidents continue to increase, cybersecurity has become a top priority in today&#8217;s digital world. With more aspects of our lives moving online, both businesses and individuals have a lot to lose from security breaches. To address this concern, cybersecurity professionals are utilizing a variety of defenses and countermeasures to protect sensitive information and [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":1507,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1334","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"_links":{"self":[{"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/posts\/1334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/comments?post=1334"}],"version-history":[{"count":0,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/posts\/1334\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/media\/1507"}],"wp:attachment":[{"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/media?parent=1334"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/categories?post=1334"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/matob.web.id\/en\/wp-json\/wp\/v2\/tags?post=1334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}