Fundamentals of Secure Software - Manual Threat Model demo

Fundamentals of Secure Software - Manual Threat Model demo

Assessment

Interactive Video

Information Technology (IT), Architecture, Business

University

Hard

Created by

Quizizz Content

FREE Resource

The video tutorial covers a manual threat modeling exercise for a retail store, detailing the store's system components, including POS systems, HVAC, and CCTV. It explains the architecture, identifies external entities with access, and uses a framework to analyze threats and countermeasures. Examples include cybercriminals targeting credit card data and rival stores causing site outages.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the different components of the retail store's architecture mentioned in the text?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

Who are the external entities that have access to the retail store's systems?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What are the motivations of cybercriminals targeting the retail store?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the countermeasures suggested to protect against skimming on the POS system.

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

What impact does a DDoS attack have on the retail store's e-commerce site?

Evaluate responses using AI:

OFF