Activity 01
Inquiry Circle: Threat Modeling Workshop
Groups receive a simple web application architecture diagram , a user, a web server, a database, and an external API. Using the STRIDE framework (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege), they systematically identify one potential threat per category. Groups share their models and compare which threats they identified and which they missed.
How can developers build security into the software lifecycle rather than adding it at the end?
Facilitation TipDuring the Threat Modeling Workshop, ask each group to present their top threat to the class and explain why it matters to their fictional business.
What to look forStudents work in small groups to design a security strategy for a fictional small business. After drafting their plan, groups swap plans with another group. Each group then provides written feedback on the other's plan, specifically addressing: Are the technical controls appropriate? Are the human elements clearly defined? Are there any obvious gaps?