Fundamentals of Secure Software - Manual Threat Model demo

Fundamentals of Secure Software - Manual Threat Model demo

Assessment

Interactive Video

Information Technology (IT), Architecture, Business

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers a manual threat modeling exercise for a retail store, detailing the store's system components, including POS systems, HVAC, and CCTV. It explains the architecture, identifies external entities with access, and uses a framework to analyze threats and countermeasures. Examples include cybercriminals targeting credit card data and rival stores causing site outages.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the main components of the retail store's infrastructure discussed in the threat modeling exercise?

Inventory system, POS systems, kiosks, HVAC management, surveillance systems

Inventory system, POS systems, kiosks, HVAC management, customer service

Inventory system, POS systems, kiosks, HVAC management, marketing tools

Inventory system, POS systems, kiosks, HVAC management, employee training

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which external entity is responsible for the remote management of the HVAC system?

Store management

Joe's HVAC

Security staff

Cleaning staff

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of identifying external entities in the threat modeling process?

To improve customer service

To determine who can access the system

To increase sales

To enhance marketing strategies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary motivation for cybercriminals targeting the POS system?

To gain access to employee data

To steal credit card numbers for profit

To disrupt store operations

To access inventory information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What countermeasure is suggested to protect against a DDoS attack by a rival store?

Implementing stronger passwords

Conducting regular audits

Using a CDN

Installing firewalls