top of page
71OMr0D4FrL._SL1500_.jpg
119159849_10158061653118813_5314694876572739015_n.jpg
71eSH5cSYiL._SL1377_.jpg
final.png

CISSP Study Plan – Day 45 of 55 | The STRIDE Model


“STRIDE and threat modeling — essential CISSP topics to know FULLY!” – Luke Ahmed


Today is Day 45 of Yihenew’s CISSP study plan, focusing on the STRIDE Model — one of the most recognized threat modeling frameworks in cybersecurity.

Developed by Microsoft, STRIDE helps identify, categorize, and mitigate potential security threats during system design. For CISSP candidates, understanding STRIDE is critical because it aligns directly with risk management, software security, and threat identification — three pillars of the exam’s mindset.


Key Areas Covered in the CISSP Study Plan

  • Purpose of STRIDE:A structured way to evaluate system designs for vulnerabilities by mapping common threat types against security objectives (the CIA Triad and beyond).

  • The STRIDE Categories:

    1. Spoofing Identity – Pretending to be another user or process.

      • Mitigation: Strong authentication, MFA, identity validation.

    2. Tampering with Data – Modifying information without authorization.

      • Mitigation: Hashing, integrity checks, digital signatures.

    3. Repudiation – Denying actions or transactions.

      • Mitigation: Logging, auditing, non-repudiation controls.

    4. Information Disclosure – Unauthorized access to sensitive data.

      • Mitigation: Encryption, access controls, data classification.

    5. Denial of Service (DoS) – Making resources unavailable.

      • Mitigation: Redundancy, throttling, load balancing.

    6. Elevation of Privilege – Gaining higher access rights than authorized.

      • Mitigation: Privilege separation, least privilege, secure coding practices.

  • STRIDE vs CIA Mapping:

    • Spoofing → Authentication

    • Tampering → Integrity

    • Repudiation → Non-repudiation

    • Information Disclosure → Confidentiality

    • Denial of Service → Availability

    • Elevation of Privilege → Authorization


CISSP Exam Tie-In

STRIDE can appear in CISSP questions about software development security, risk assessment, or threat modeling.The exam often provides a scenario and asks which part of STRIDE is being violated.


If the question describes:

  • Impersonation → Spoofing

  • Unauthorized modification → Tampering

  • No audit trail → Repudiation

  • Data exposure → Information Disclosure

  • Service unavailability → Denial of Service

  • Privilege misuse → Elevation of Privilege


Recognizing these mappings instantly gives you an edge.


Quick CISSP Practice Question

Which of the following STRIDE categories refers to an attacker pretending to be a legitimate user or system?

A. Tampering

B. Spoofing

C. Repudiation

D. Elevation of Privilege


Correct Answer: B. Spoofing

Explanation:Spoofing involves falsifying identity — such as IP, email, or user credentials — to gain unauthorized access. It violates authentication, one of the core principles of information security.


Think Like a Manager:When evaluating designs or controls, always ask: “What can go wrong, who can do it, and what would it cost the business?” STRIDE helps you answer those questions systematically.


Check out Yani's TikTok or see Day 44 or Day 46.


👉 Can you take the Yani Challenge?


55 days of consistent CISSP prep, tackling one domain at a time, using only the resources below:


Course

Luke's CISSP Course (2 months access, $89.98)

One-to-one Zoom sessions with Luke Ahmed (2 weeks before exam)


Books, Notes, and Practice Questions

Sybex 10th Edition (Around $52.55)



Total Cost: approxiamately $250 depending on your geographic location. Yani is located in East Africa.


📚 Study Plan (55 Days of Dedication):

- Weekdays: 2–3 hours of focused study—late nights and early mornings (5 AM).

- Weekends: 5–6 hours of deep study sessions.


Pass CISSP in first attempt within 100 questions.


Yani's biggest expense was his time, committment, consistency, and dedication! It was worth it because he passed first attempt in 100 questions using the above resources only.


If Yihenew could do it, so can you.


All the best Future CISSP. You can feel free to contact me anytime as well.


Thank you.

Luke Ahmed


 
 
  • Youtube
  • Instagram
  • Linkedin
  • Facebook
  • TikTok
bottom of page