0
0
Cybersecurityknowledge~20 mins

Threat modeling (STRIDE, DREAD) in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Threat Modeling Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding STRIDE Categories

Which of the following correctly matches a STRIDE category with its primary threat type?

ARepudiation - Denying actions or transactions
BInformation Disclosure - Exposing sensitive information
CTampering - Modifying data without authorization
DSpoofing - Pretending to be someone else to gain unauthorized access
Attempts:
2 left
💡 Hint

Think about what each STRIDE letter stands for and the kind of threat it represents.

📋 Factual
intermediate
2:00remaining
DREAD Risk Assessment Components

Which component of the DREAD model evaluates how easily an attacker can exploit a vulnerability?

AExploitability
BReproducibility
CDamage Potential
DDiscoverability
Attempts:
2 left
💡 Hint

Consider which factor measures the effort or skill needed to carry out an attack.

🚀 Application
advanced
2:00remaining
Applying STRIDE to a Scenario

A web application allows users to upload files without checking the file type. Which STRIDE threat does this vulnerability most directly relate to?

ATampering
BInformation Disclosure
CElevation of Privilege
DSpoofing
Attempts:
2 left
💡 Hint

Think about what an attacker could do by uploading malicious files.

🔍 Analysis
advanced
2:00remaining
Interpreting DREAD Scores

A vulnerability has the following DREAD scores: Damage Potential=8, Reproducibility=7, Exploitability=9, Affected Users=6, Discoverability=5. What is the average risk score?

A7.5
B7
C7.0
D8
Attempts:
2 left
💡 Hint

Calculate the average by adding all scores and dividing by the number of components.

Reasoning
expert
2:00remaining
Choosing the Correct STRIDE Threat for a Given Attack

An attacker intercepts and reads sensitive data sent between a user and a server without altering it. Which STRIDE threat does this represent?

ADenial of Service
BInformation Disclosure
CRepudiation
DTampering
Attempts:
2 left
💡 Hint

Focus on what the attacker does with the data.