Module 2: Security Requirements Gathering

 
安全用例來自濫用案例


1.In the Derived Approach, what we don't include?
A) Abuse Case
B) Security Use Case
C) Abuse Stories
D) Octave




Octave (Operationally Critical Threat, Asset, and Vulnerability Evaluation), a risk-based strategic assessment and planning technique, is not included in the Derived Approach for system security.





2.Abuse Case is derived from______.
A) Use Case
B) Abuse Case
C) Security Use Case
D) Abuse Stories

Abuse Case is a derivative of Use Case. It refers to a scenario where an application may be used in harmful ways by adversaries. So, it is derived from the Use Case by testing the extent to which it can be exploited.

A Security Use Case deals with potential security threats, it doesn't give the scenarios in which an application can be used unfavorably. Hence, it can't be the origin of an Abuse Case.

Abuse Stories, like User Stories in agile development, detail nefarious actions towards a software system. However, they aren't used to derive an Abuse Case; instead, they are more of a narrative of a hypothetical abuse scenario.
https://chengyu.home.blog/2019/07/06/security-use-cases/
這張圖綠色方塊到橘色方塊上半部屬於需求分析階段,下半部屬於Design階段





3.The threaten relationship is used to describe________
A) Use Case
B) Abuse Case
C) Security Use Case
D) Abuse Stories

The threaten relationship is used to describe the relationship between an attacker and a system. It is used to identify the potential threats that an attacker may pose to a system. An abuse case is a specific type of threat relationship that describes a particular attack scenario. It is used to identify the steps an attacker may take to exploit a system and the potential consequences of the attack.


4.Which of the following relationship is used to describe security use case scenario?

A. Threatens Relationship
B. Extend Relationship
C. Mitigates Relationship
D. Include Relationship

以下競價系統的Use Case示意圖
其中Etends屬於來自Security Use Case反向箭頭






5.Ted is an application security engineer who ensures application security activities are being followed during the entire lifecycle of the project. One day, he was analyzing various interactions of users depicted in the use cases of the project under inception. Based on the use case in hand, he started depicting the scenarios where attacker could misuse the application. Can you identify the activity on which Ted is working?

A. Ted was depicting abuse cases
B. Ted was depicting abstract use cases
C. Ted was depicting lower-level use cases
D. Ted was depicting security use cases


Ref:





留言

這個網誌中的熱門文章

何謂淨重(Net Weight)、皮重(Tare Weight)與毛重(Gross Weight)

(2021年度)駕訓學科筆試準備題庫歸納分析_法規是非題

經得起原始碼資安弱點掃描的程式設計習慣培養(五)_Missing HSTS Header