SlideShare a Scribd company logo
1 of 5
Which is a privacy analog to security threat modeling?
a.
Privacy impact statement
b.
Disclosure
c.
Privacy ratchet
d.
Slider
Sending an email with confidential information to the wrong
email address is an example of which component of STRIDE?
a.
Spoofing
b.
Information disclosure
c.
Repudiation
d.
Elevation of privileges
Failure to review privileges after a corporate reorganization is
an example of which component of STRIDE?
a.
Elevation of privilege
b.
Denial of service
c.
Tampering
d.
Spoofing
Which of the following steps are not part of developing an
attack tree?
a.
Create subnodes
b.
Decide on representation
c.
Attack the system
d.
Consider completeness
Forgery of an email header so that the message appears to have
originated from someone or somewhere other than the actual
source is an example of which component of STRIDE?
a.
Denial of Service
b.
Tampering
c.
Spoofing
d.
Elevation of privileges
Flooding a website with requests is an example of which
component of STRIDE?
a.
Elevation of privilege
b.
Tampering
c.
Spoofing
d.
Denial of service
Having no proof after the fact of the principals involved in a
transaction is an example of which component of STRIDE?
a.
Elevation of privileges
b.
Tampering
c.
Repudiation
d.
Spoofing
Which is a comprehensive dictionary and classification
taxonomy of known attacks that can be used by analysts,
developers, testers, and educators to advance community
understanding and enhance defenses?
a.
KUPCHAK
b.
CPAP
c.
PAYCHECK
d.
CAPEC
Modification of a file that is owned by another user is an
example of which component of STRIDE?
a.
Tampering
b.
Elevation of privileges
c.
Spoofing
d.
Denial of service
What type of an attack tree requires the state of the node to
depend on all sub nodes to be true?
a.
IIF Tree
b.
NEUTRAL Tree
c.
AND Tree
d.
OR Tree
Which is a privacy analog to security threat modelinga.Priv

More Related Content

Similar to Which is a privacy analog to security threat modelinga.Priv

Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
Yulian Slobodyan
 
Report - Final_New_phishila
Report - Final_New_phishilaReport - Final_New_phishila
Report - Final_New_phishila
Ashwin Palani
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
HHoko1
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 

Similar to Which is a privacy analog to security threat modelinga.Priv (9)

Null bachav
Null bachavNull bachav
Null bachav
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
312 50-demo
312 50-demo312 50-demo
312 50-demo
 
Report - Final_New_phishila
Report - Final_New_phishilaReport - Final_New_phishila
Report - Final_New_phishila
 
4_5769479639445540375.pptx
4_5769479639445540375.pptx4_5769479639445540375.pptx
4_5769479639445540375.pptx
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
1- Worms are able to self-replicate- A- True B- False 2- You have crea.docx
1- Worms are able to self-replicate- A- True B- False 2- You have crea.docx1- Worms are able to self-replicate- A- True B- False 2- You have crea.docx
1- Worms are able to self-replicate- A- True B- False 2- You have crea.docx
 
Protecting Your Organizational Data.pdf
Protecting Your Organizational Data.pdfProtecting Your Organizational Data.pdf
Protecting Your Organizational Data.pdf
 
PRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docxPRELIM EXAMINATION Empowerment TECH.docx
PRELIM EXAMINATION Empowerment TECH.docx
 

More from jonghollingberry

The Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docxThe Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docx
jonghollingberry
 
The American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docxThe American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docx
jonghollingberry
 
The accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docxThe accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docx
jonghollingberry
 
The 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docxThe 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docx
jonghollingberry
 
Thats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docxThats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docx
jonghollingberry
 
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docxTerrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
jonghollingberry
 

More from jonghollingberry (20)

The annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docxThe annotated bibliography must consist of 8–10 references (primar.docx
The annotated bibliography must consist of 8–10 references (primar.docx
 
The Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docxThe Americas were not a wasteland from 900-1500. In fact, they were .docx
The Americas were not a wasteland from 900-1500. In fact, they were .docx
 
The American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docxThe American CenturyNext week, we are going to start on a paper ab.docx
The American CenturyNext week, we are going to start on a paper ab.docx
 
The American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docxThe American Nazi Party established a website on Yahoo promoting Naz.docx
The American Nazi Party established a website on Yahoo promoting Naz.docx
 
The aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docxThe aim of risk assessment in auditing standards is to improve the q.docx
The aim of risk assessment in auditing standards is to improve the q.docx
 
The 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docxThe 4th amendment of the U.S. Constitution is challenged often when .docx
The 4th amendment of the U.S. Constitution is challenged often when .docx
 
The AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docxThe AICPA Code of Professional ConductIn this Discussion, you will.docx
The AICPA Code of Professional ConductIn this Discussion, you will.docx
 
The accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docxThe accounting profession has for a long time relied on certain acco.docx
The accounting profession has for a long time relied on certain acco.docx
 
The 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docxThe 2 methods of calculating the Federal Income Tac withholding is t.docx
The 2 methods of calculating the Federal Income Tac withholding is t.docx
 
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docxThe Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
The Affordable Care Act changed the landscape of U.S. healthcare. Ma.docx
 
The 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docxThe 21st century manager is a person who can implement the leade.docx
The 21st century manager is a person who can implement the leade.docx
 
thats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docxthats the description of the class This course will introduce you.docx
thats the description of the class This course will introduce you.docx
 
The 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docxThe 1950sThere are really two views of the 1950s One considers it.docx
The 1950sThere are really two views of the 1950s One considers it.docx
 
The 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docxThe 1920s was a decade full of contradiction. It was a time of optim.docx
The 1920s was a decade full of contradiction. It was a time of optim.docx
 
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docxThe (Navajo) tribe lives on reservations in northeastern Arizona and.docx
The (Navajo) tribe lives on reservations in northeastern Arizona and.docx
 
Thats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docxThats what did you do you just wrote on sentences i need more detail.docx
Thats what did you do you just wrote on sentences i need more detail.docx
 
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docxTextbooksTenth Edition Labor Relations and Collective Bargaining .docx
TextbooksTenth Edition Labor Relations and Collective Bargaining .docx
 
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docxTerrorism, Crime and Public PolicyTerrorism, Crime and P.docx
Terrorism, Crime and Public PolicyTerrorism, Crime and P.docx
 
Test the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docxTest the operation of the ports of your Development board as follows.docx
Test the operation of the ports of your Development board as follows.docx
 
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docxTerms[1]  Describe the facts relating to the eventplacepersongr.docx
Terms[1]  Describe the facts relating to the eventplacepersongr.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Which is a privacy analog to security threat modelinga.Priv

  • 1. Which is a privacy analog to security threat modeling? a. Privacy impact statement b. Disclosure c. Privacy ratchet d. Slider Sending an email with confidential information to the wrong email address is an example of which component of STRIDE? a. Spoofing b. Information disclosure c. Repudiation d. Elevation of privileges Failure to review privileges after a corporate reorganization is an example of which component of STRIDE? a. Elevation of privilege b.
  • 2. Denial of service c. Tampering d. Spoofing Which of the following steps are not part of developing an attack tree? a. Create subnodes b. Decide on representation c. Attack the system d. Consider completeness Forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source is an example of which component of STRIDE? a. Denial of Service b. Tampering c. Spoofing d. Elevation of privileges
  • 3. Flooding a website with requests is an example of which component of STRIDE? a. Elevation of privilege b. Tampering c. Spoofing d. Denial of service Having no proof after the fact of the principals involved in a transaction is an example of which component of STRIDE? a. Elevation of privileges b. Tampering c. Repudiation d. Spoofing Which is a comprehensive dictionary and classification taxonomy of known attacks that can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses? a. KUPCHAK
  • 4. b. CPAP c. PAYCHECK d. CAPEC Modification of a file that is owned by another user is an example of which component of STRIDE? a. Tampering b. Elevation of privileges c. Spoofing d. Denial of service What type of an attack tree requires the state of the node to depend on all sub nodes to be true? a. IIF Tree b. NEUTRAL Tree c. AND Tree d. OR Tree