Web application security - the fast guide 1.1 | Page 60
Chapter 3 - Vulnerabilities and threat models
P a g e | 60
3.9 QUIZ
1. vulnerability is:
a. Potential harm that can affect your assets
b. A weakness point in the system that might be exploited by an
attacker.
c. The most valuable parts of the system from beneficial point of
view
d. None of the above.
2. In Identifying assets in Threat modeling all is true except:
a. Identifying assets is about deciding what is worthy to be protected
b. Assets can be anything from a set of credentials to company
reputation.
c. We need to decide the cost of unavailability, replace and
compromise liability
d. None of the above.
3. You are requested to go through the different stages of threat
modeling and generate the skeleton of all needed outputs for a e
catalogue web application with SQL server back end.
1) First we specify a list of the assets
a) Users accounts information
b) Users credit history
c) Catalogue products information especially price.
d) Catalogue availability
2) From the list of assets, we identify the security objectives:
a) Protect customer account details and customer credit history.
b) Ensure that the application is available 99.99 percent of the time.
c) Prevent unauthorized users from modifying product catalog information,
especially prices.
3) Application and architecture overview:
a) The application is an Internet-facing Web application with a SQL Server back
end. The Web server is located in a perimeter network. Business and data access
logic resides on the Web server. The application enables Internet users to
browse and purchase products from the company's product catalog.