Brad Andrews , CISSP, CSSLP
North Texas Cyber Security Conference
2015
 Long time in the tech field
 Wide range of jobs – Defense, Online,
Banking, Airlines, Doc-Com, Medical, etc.
 20+ Years software development experience
 10+ in Information Security
 M.S. and B.S. in Computer Science from the
University of Illinois
 Active Certifications – CISSP, CSSLP, CISM
 Work for one of the largest providers of
pharmacy software and services in the
country
 Serve as Lead Faculty-Area Chair and for
Information Systems Security for the
University of Phoenix Online Campus
 Carry out independent reading and research
for my own company, RBA Communications
The views and opinions expressed in this
session are mine and mine alone. They do
not necessarily represent the opinions of my
employers or anyone associated with
anything!
 Part 1 – Threat Modeling Overview
 Part 2 – Applying STRIDE to a System
 Part 3 – Applying DREAD to a System
 Types of Exploits / Motivations of Attacker
 A Guide, not a Firm Taxonomy
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privelege
Pretending to Be Something You are Not
Making Unauthorized Modifications
Denying A Past Action
Avoiding Consequences
Unauthorized Data Exposure
Preventing Expected Access
Unauthorized Rights
 Be Involved
 Don’t Monopolize
 Work Together
 Find Risks for Chosen Systems
NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews

NTXISSACSC2 - Threat Modeling Part 2 - STRIDE by Brad Andrews

  • 1.
    Brad Andrews ,CISSP, CSSLP North Texas Cyber Security Conference 2015
  • 2.
     Long timein the tech field  Wide range of jobs – Defense, Online, Banking, Airlines, Doc-Com, Medical, etc.  20+ Years software development experience  10+ in Information Security  M.S. and B.S. in Computer Science from the University of Illinois  Active Certifications – CISSP, CSSLP, CISM
  • 3.
     Work forone of the largest providers of pharmacy software and services in the country  Serve as Lead Faculty-Area Chair and for Information Systems Security for the University of Phoenix Online Campus  Carry out independent reading and research for my own company, RBA Communications
  • 4.
    The views andopinions expressed in this session are mine and mine alone. They do not necessarily represent the opinions of my employers or anyone associated with anything!
  • 5.
     Part 1– Threat Modeling Overview  Part 2 – Applying STRIDE to a System  Part 3 – Applying DREAD to a System
  • 6.
     Types ofExploits / Motivations of Attacker  A Guide, not a Firm Taxonomy Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privelege
  • 7.
    Pretending to BeSomething You are Not
  • 8.
  • 9.
    Denying A PastAction Avoiding Consequences
  • 10.
  • 11.
  • 12.
  • 13.
     Be Involved Don’t Monopolize  Work Together
  • 14.
     Find Risksfor Chosen Systems