Create A Set Of Potential Threats Using The STRIDE Threat Model

Wednesday, 11th May 2022
Simon Tomes
Simon Tomes


In this challenge, you’ll be provided with a system model diagram and some requirements (links below).

Your goal is to create a set of potential threats using the STRIDE Threat Model.

For example:

  • Spoofing a person. A hacker takes over an account, impersonates someone from the hotel chain and sends a phishing message.
  • Tampering with a network. A hacker modifies data flowing over the network and books 100 rooms on behalf of someone else instead of 1 room, just for the fun of it! 

Use the following before and during the challenge:

Learning Outcomes

  • Use a model to rapidly create a set of potential threats


View Solutions