Chapter 4: Approaching and Planning the Test
In this chapter, we will go through the security properties that are necessary to ensure that a system (an alarm, a connected doorbell, and so on) is secure enough. Not every property will exist in every system since they may not be relevant to particular systems. This chapter will also introduce the STRIDE methodology, which allows you to map threats that are relevant to the system. In a real-world test, this can be used to build the attack scenarios that your client will want you to execute.
The following topics will be covered in this chapter:
- The STRIDE methodology
- Applying the methodology to the example system
- Basic security properties
- Planning the test
Let's get started!