Question

In: Computer Science

Describe the STRIDE model and give an example of how to mitigate each of the threats.  

Describe the STRIDE model and give an example of how to mitigate each of the threats.  

Solutions

Expert Solution

  • STRIDE is a model developed byMicrosoft for identifying computer security threats.
  • STRIDE is a model which is used by security or softwae engineers to identify all types of threats on server
  • STRIDE is model or tool which is mainly used to classify threats
  • The full form of Stride is mainly an acronym for types of threats.
  • STRIDE stands for Spoofing,Tampering,Repudiation,Information Discllosure,Denial of Servise(DOS),Escalation of Previlagage.
  • STRIDE is a threat model, or threat risk model.
  • Threat Model is a process that reviews the security of any web-based system, identifies problem areas, and determines the risk associated with each area.
  • By identifying Vulnerabilities,security objectives or identifying threats the Threat model can be established.

Now Lets discuss what STRIDE model is made for:

  1. Spoofing: A user try to become another user or try to pretend another user to get an access to server or database is called as spoofing.Here Authentication is violated.
  2. Tamering:If an attacker is able to tamper or try to modify the system data is called as Tampering.Here integrity is violated.
  3. Repudiation:Here attacker is try to claiming to have not performed an action by erasing them from the logs, or by spoofing the credentials of another user.
  4. InformaLon Disclosure:Many systems contain confidential information, and attackers often aim at getting hold of it. Here Confidentiality is violated.
  5. Denial of Service:Crashing Windows or a web site, sending a packet and absorbing seconds of CPU Lme, or rouLng packets into a black hole is called DOS attack.
  6. ElevaLon of Privilege:Any attacker try to access additional previlage which he may not be granted to access is called Elevation of privilage.

The ways or example to mitigate or avoid this kinds of threats can be:

  1. By using technology to prevent a Hacks For example, for preventing tamperingwe can use  Digital signatures, cryptographic integrity tools, crypto tunnels such as SSH or IPsec. this techologie can be use to mitigate threats to server or system
  2. For preventing ElevaLon of privilege we can use technologies like Roles, privileges, input validationon for purpose, (fuzzing*).we can also use sandbox and firewalls to prevent this.
  3. for preventing Denial of services we can use ElasLc cloud design.For example:Load balancers

Thank You!


Related Solutions

Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
Identify Information Security threats for “Autonomous vehicles” and how a business could mitigate these?
Describe related models to explain why cities exist. Give an example for each model. ( 50...
Describe related models to explain why cities exist. Give an example for each model. ( 50 marks) i. Model 1: Backyard production – a region without cities ii. Model 2: Trading city iii. Model 3: Factory town
describe how the various types of protozoans move, and give an example of each type
describe how the various types of protozoans move, and give an example of each type
Describe the four scales of measurement and give an example of how each could be applied...
Describe the four scales of measurement and give an example of how each could be applied in agriculture.
2. Discuss how to mitigate the risks. Give examples.
2. Discuss how to mitigate the risks. Give examples.
Describe how the various types of protozoans move, and give an example of each type. What...
Describe how the various types of protozoans move, and give an example of each type. What type of algae are believed to be closely related to the first plants? Why? How might diseases like malaria, which are transmitted via mosquitoes, be affected by global warming? Explain the difference between pollination and fertilization in plants. What features are seen in angiosperms that are not seen in gymnosperms? How do they contribute to the success of angiosperms? Which plant group provides the...
Describe the rationale behind the retail discounting model. Give your own example of how you can...
Describe the rationale behind the retail discounting model. Give your own example of how you can maximize your own savings if you know the game. Thank you
Describe the “Intracellular Receptor Model” and describe completely a specific example of how this model works.
Describe the “Intracellular Receptor Model” and describe completely a specific example of how this model works.
. Give an example (i.e., the name) of an accounting and measurement model based on each...
. Give an example (i.e., the name) of an accounting and measurement model based on each type of capital maintenance.
Give an example of privacy and confidentiality and describe how they differ.
Give an example of privacy and confidentiality and describe how they differ.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT