Simon Tomes
Community Lead at Ministry of Testing
Challenge Description
In this challenge, you’ll be provided with a system model diagram and some requirements (links below).
Your goal is to create a set of potential threats using the STRIDE Threat Model.
For example:
- Spoofing a person. A hacker takes over an account, impersonates someone from the hotel chain and sends a phishing message.
- Tampering with a network. A hacker modifies data flowing over the network and books 100 rooms on behalf of someone else instead of 1 room, just for the fun of it!
Use the following before and during the challenge:
- Restful Booker Platform System Model Diagram
- Restful Booker Platform Development Board (with Requirements)
What you’ll learn
- Use a model to rapidly create a set of potential threats
Discover how integrating SAST with comprehensive test management enables your team to ship safer software sooner.
Explore MoT
Thu, 1 Oct 2026
Previously known as TestBash, MoTaCon is the new name for our annual conference. It's where quality people gather.
Mitigate security risks by building simple security testing techniques into your daily routine
Debrief the week in Quality via a community radio show hosted by Simon Tomes and members of the community