Threat Model Report

Student Name: Satyanarayana Maradapa

Student ID: 00305759T

Lecturer: Dr Shahrzad Saremi

Trimester 3 (2020)

Academic Integrity Declaration

I declare that, except where I have referenced, the work I am submitting for this assessment task is my own work, I have read and am aware of the Torrens University Australia Academic Integrity Policy ad procedure viewable online at http://www.torrens.edu.au/policies-and-forms. I am aware that I need to keep a copy of all submitted material and their drafts, and I will do so accordingly.

Contents Introduction 2 Key objectives of computer security 3 Cyber Threats 3 Threat Modelling 4 Cryptography 5 Authentication 6 Real-Time Cyber Threat Detection and Mitigation 6 Intrusion Detection System 6 Intrusion Prevention System 7 Data Flow Diagram 8 Conclusion 10 References 11

List of Figures

Figure 1: Types of Cyber Threats 4

Figure 2: Threat Modelling 4

Figure 3: Stride stages 5

Figure 4: Characteristics of Cryptography 5

Figure 5: Cryptography 6

Figure 6: Types of Authentication 6

Figure 7: Intrusion Detection System 7

Figure 8: Intrusion Prevention System 7

Figure 10: Context Diagram 8

Figure 11: Data Flow Diagram 8

List of Tables

Table 1: Data Flow Table 7


Cybersecurity provides feature or services to protect their system, devices, network, and data from the various malicious attacks done by the attackers or hackers to steal the data and harm the B&C Insurance. With the help of the internet, every system in the company or organization becomes digitized. This means all the business process depends on the internet. It is easy to understand that if the system makes advanced, then the threats and risks are also increasing. So to prevent these threats, the concept of Cybersecurity is introduced in the world. In this section, various types of threats and their prevention are discussed to enhance the Business &Communication Insurance security.

Key objectives of computer security

1. Confidentiality

Confidentiality here refers to the security of the data by eliminating unauthorized and illegal access by the attackers. To improve the data’s security by giving attention to various actions performed by Business &Communication Insurance like encryption and authentication.

2. Integrity

Integrity here refers to the security of the data by protecting the data from accidental and unauthorized change. It helps to maintain the accuracy, validity, and consistency of the system (Lites, 2019).

3. Availability

Availability here refers to the availability of the data and resources to the users and the system.

There are some more critical factors which play a significant role in the Cybersecurity and are expressed below:

1. Asset

It is the data or information which is very valuable for the organizations.

2. Vulnerability

Vulnerability is the weakness that cyber attackers use to damage the data of the organizations (Minnaar, 2016).

3. Threat

The threat is how cyber attackers use to attack the assets of the company or organization.

4. Risk

Risk is a kind of attack which are performed by cyber attackers. If it occurs, then it will cause damage to assets.

5. Countermeasure

Countermeasure is security protection which is usually designed to eliminate the risks, vulnerabilities, and the threat.

Cyber Threats

Cyber Threats are the type of malicious attack done by the individual or attackers to harm or disrupt the data or information present in the computer network or system. These attacks are occurred for stealing the organizations’ sensitive data. It also involves the unauthorized attempt to access files in organizations like B&C insurance (Parn & Edwards, 2019). There are various types of common cyber-attacks are there like malware, denial of service, and phishing attack and can be classified given below:

Figure 1: Types of Cyber Threats(Source: Author)Software Attack: Software attacks are malicious attacks that harm the computer or system to steal the organizations or company data or information associated with B&C Insurance. Some of the software used in the software attacks is Trojan horse, Ransomware, and viruses.Web Attack: If there are severe weaknesses and vulnerabilities present in the system, and then it allows attackers or criminals to illegally access the database to steal the B&C Insurance organization’s sensitive data or information.Network Attack: It is a kind of unauthorized or illegal access in the network of B&C Insurance. The main aim of a network attack is to steal valuable data or information with the help of malicious activity (Sapienza, et al. 2017).Hardware Attack: If there are severe weaknesses and vulnerabilities present in the system, it allows attackers or criminals to attack through the remote or physical access into the system’s hardware.

Threat Modelling

It is a process of enhancing the security of the network by knowing the objectives and issues. Countermeasures are used to define threat modelling to reduce the threat in the system. There are various stages of threat modelling for B&C Insurance which are given below:

Figure 2: Threat Modelling(Source: Author)It is necessary to deal with the cybercrime, so for this, there are various approaches which the organization like B&C Insurance used to deal with cybercrime or attack like Stride, Attack Tree, CVSS, Dread, and Trike (Desmet, et al. 2016). Stride is the most common methodology which was developed by the Microsoft for threat modelling and has six stages which are given below:

Figure 3: Stride stages(Source: Author)


Cryptography is a process used to secure the information, data, and communications through codes that are not understandable by humans (Whiteman & Corps, 2020). These codes are the machine codes and can only be understood by the receiver (Shree, 2017). There are some of the characteristics of the cryptography which are:

Figure 4: Characteristics of Cryptography(Source, Author)

Figure 5: Cryptography(Source: Author)


It is a process of identifying user identity. Authentication can be done with the help of the credentials and helps to make the system secure. There are different types of authentication are there which are given below:

Figure 6: Types of Authentication(Source, Author)

Real-Time Cyber Threat Detection and Mitigation

Intrusion Detection System

IDS, which is also known as Intrusion Detection System, is a device used to monitor or audit malicious and harmful activities on the network or system and respond to you when it detects any kind of attack and is said to be Intrusion Detection System (Vigneswaran, et al. 2018).

Figure 7: Intrusion Detection SystemSource: (Vigneswaran, et al. 2018)

Intrusion Prevention System

IPS, also known as Intrusion Prevention System, is a device used to monitor or audit malicious and harmful activities on the network or system and prevent these attacks (Yılmaz & Gönen, 2018).

Figure 8: Intrusion Prevention SystemSource: (Novokhrestov, 2020)Data Flow Table

Table 1: Data Flow TableExternal EntityData flowFunctionData storageCustomerVehicle ReservationSearch availability, Book Vehicle, Cancel bookingDevice ResponseReceptionistVehicle ReservationCheck AvailabilityDevice Response, Device Request, Update RequestManagerVehicle ReservationVehicle service, Vehicle availability, book VehicleDevice Response, Device Request, Update RequestHr AdminVehicle ReservationHr portal, hiring staffDevice Response, Device Request, Update Request

Figure 10: Context Diagram(Source: Author)

Data Flow Diagram

Figure 11: Data Flow Diagram(Source: Author)The diagram shown above represents the data flow diagram for project Vehicle availability for B&C Insurance. In this diagram, the work is represented in an oval shape, the help of rectangular boxes indicates the entities, and the arrows between the components represent the data flow.Elements used in the data flow diagram:1. Service Availability: At first the customer or the user needs to search the availability of the vehicles so that they will take the vehicles on rent for their work and can use this service fluently.2. Check updates: In thismanager check the availability of the vehicle according to the requirement of the user or the customer and if there is any update are there then informed it to the user or customer.3. Vehicle Service: Vehicle service is provided to the customer or the user on some rent according to the requirements.4. HR Portal: This portal is made for the user or customer for the purpose of requesting the service and if they have any query then they feel free to ask their query on it.5. Vehicle Booking: If the client wants to book the vehicle or want to take the service on rent then they can book their services on it.6. Cancel Booking: This is the better feature for the customer to cancel the booking if they do not want it anymore. Clients who book the vehicles have opportunity to cancel it later if they change their plans.7. Vehicle Reservation: It is the process of reserving the vehicle by the customer or the user. All of these services have given to the user on rent to make the user task easy.


Cyberspace provides facilities or services to protect its systems, devices, networks, and data from various malicious attacks by attackers or hackers stealing data and harming the organization. With the help of the Internet, every system of a company or Business &Communication Insurance goes digital. This means that all business processes depend on the Internet. It is easy to understand that the dangers and risks are also increasing if a system upgrade occurs. Cybersecurity is responsible for providing secure network services to B&C Insurance to meet its business objectives. It improves production speed, business processes, and secures the company’s sensitive data. Many hazards affect the security of the company. Various types of risk and B&C Insurance issues are clearly explained in this report. Threat modelling is the process of analyzing or improving the network’s security by knowing vulnerabilities and objectives, which helps eliminate the impact of threats on the system. Through this threat model report, organizations and companies can easily be able to make their networks secure.


Desmet, L., Jacobs, B., Piessens, F., & Joosen, W. (2016). Threat modelling for web services based web applications. In Communications and multimedia security (pp. 131-144). Springer, Boston, MA.Lites, B. C. (2019). 03. Introduction to CyberSecurity (No. SAND2019-12329C). Sandia National Lab. (SNL-NM), Albuquerque, NM (United States).Minnaar, A. (2016). ‘Crackers’, cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the’new’cybercriminals. Acta Criminologica: African Journal of Criminology & Victimology, 2016(Special Edition 2), 127-144.Novokhrestov, A., Konev, A., Shelupanov, A., & Buymov, A. (2020, March). Computer network threat modelling. In Journal of Physics Conference Series (Vol. 1488, p. 012002).Parn, E. A., & Edwards, D. (2019). Cyber threats confronting the digital built environment. Engineering, Construction and Architectural Management.Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K., & Ferrara, E. (2017, November). Early warnings of cyber threats in online discussions. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 667-674). IEEE.Shree, D. (2017). A review on cryptography, attacks and cyber security. International Journal of Advanced Research in Computer Science, 8(5).Vigneswaran, K. R., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, July). Evaluating shallow and deep neural networks for network intrusion detection systems in cyber security. In 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (pp. 1-6). IEEE.Whiteman, M., & Corps, N. T. I. R. (2020). Cybersecurity (CS 3550): Lecture 9-10: Data Protection & Cryptography.Yılmaz, E. N., & Gönen, S. (2018). Attack detection/prevention system against cyber-attack in industrial control systems. Computers & Security, 77, 94-105.Hardware AttackSoftware AttackWeb AttackNetwork AttackSelect the use case of an applicationConstruct a DFD (Data Flow Diagram)Investigation of IT risksAnalyse each riskSpoofingTamperingInformation DisclosureElevation of privilegeDenial of ServiceRepudiationConfidentialityIntegrityAuthenticationNon-repudiationPoint to Point Authentication ProtocolAAA Architecture ProtocolKerberosWeb Authentication2