Ask a question from expert

Ask now

Security Architecture and Design | Assignment

5 Pages1009 Words203 Views
   

Added on  2020-03-28

Security Architecture and Design | Assignment

   Added on 2020-03-28

BookmarkShareRelated Documents
Running head: SECURITY ARCHITECTURE AND DESIGNSecurity Architecture and Design: STRIDE ModelName of the student:Name of the university:
Security Architecture and Design | Assignment_1
1SECURITY ARCHITECTURE AND DESIGNAbout the game Elevation of Privilege is a card game that is designed by Adam Shostack but the expertsare not at all aware of the security aspects. In order to engage the users with support and nonthreatening models, utilization of the game props are required to be utilized properly. The gameis designed for 3 to 5 players it means that not more tha5 players can play the game accordingly.The EoP game is consists of 84 cards, including 2 instruction cards, 1 play and strategy flowchartcard, 74 playing cards, 6 reference cards, and an ‘about’ card. Six different suits are associated tthe game such as Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service,and Elevation of Privilege. The STRIDE model is used for modeling the threat. Each of the suitsare consists of different card numbers like the genera play cards starting from 2 and end up to 10,jack, queen, king ad ace. The tempering card starts with 3 as repetition of cards can be avoidedbut due to lack of enough hints this is not possible. Application: The stride Threat ModelSecurity modeling is referred to as one of the most effective and efficient thing that isstrictly required to be considered for minimizing the security issues that affects the normal flowof any system. For fuzzing technique or for any other dynamic testing STRIDE security model isvery much important. In order to theft confidential data from the server or storage differentattackers use different kind of attack mechanisms. Based on the threats and their side effectsthose are required to be differentiated in different names or categories. The STRIDE model isthe derived acronym for different six threats such as spoofing, tempering, repudiation, non-
Security Architecture and Design | Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | Information System Security
|17
|3949
|3

Migrating Business and Cloud Computing Assignment
|19
|6022
|37

Cyber Security - Threats, Vulnerability, Risk, and Control
|13
|2618
|100

Information Leakage in Cyber Security
|19
|1443
|65

Cyber-Physical System Power Point Presentation 2022
|13
|556
|21