Create A Set Of Potential Threats Using The STRIDE Threat Model

Simon Tomes's profile
Simon Tomes

Community Lead at Ministry of Testing

Challenge Description

In this challenge, you’ll be provided with a system model diagram and some requirements (links below).

Your goal is to create a set of potential threats using the STRIDE Threat Model.

For example:

  • Spoofing a person. A hacker takes over an account, impersonates someone from the hotel chain and sends a phishing message.
  • Tampering with a network. A hacker modifies data flowing over the network and books 100 rooms on behalf of someone else instead of 1 room, just for the fun of it! 
     

Use the following before and during the challenge:

What you’ll learn
  • Use a model to rapidly create a set of potential threats
Webinar: Turn Riddles into Test Assets image
Unclear requirements equal hidden bugs. Let Keysight Generator with Gen AI parse the acronyms & deliver instant coverage
Explore MoT
The awesome power of shifting left — Software Testing Live image
Software Testing Live: Episode 04
MoT Software Testing Essentials Certificate image
Boost your career in software testing with the MoT Software Testing Essentials Certificate. Learn essential skills, from basic testing techniques to advanced risk analysis, crafted by industry experts.
Leading with Quality
A one-day educational experience to help business lead with expanding quality engineering and testing practices.
This Week in Testing image
Debrief the week in Testing via a community radio show hosted by Simon Tomes and members of the community
Subscribe to our newsletter
We'll keep you up to date on all the testing trends.