Question
a) Determine where the trust boundaries should be placed in the diagram ( 2 marks , write, for example, a trust boundary should be placed
a) Determine where the trust boundaries should be placed in the diagram(2 marks,write, for example,a trust boundary should be placed between the application Server and the Database on data flows Auth Data and SQL Query)
b) Based on the DFG and the trusted boundaries that you have identified, fill out the STRIDE threat model table below by providing one threat for each threat category. (6 marks)
STRIDE threat type
Associated Security Goal
Definition of the attack
Involved DFG Components
* For the sake of uniformity in the solutions follow the following answer structure for each row of the table that you fill out: STRIDE threat type :.... Security Goal:..... Definition of the attack:.. Involved DFG Components: ....
a) Determine where the trust boundaries should be placed in the diagram(2 marks,write, for example,a trust boundary should be placed between the application Server and the Database on data flows Auth Data and SQL Query)
b) Based on the DFG and the trusted boundaries that you have identified, fill out the STRIDE threat model table below by providing one threat for each threat category. (6 marks)
STRIDE threat type | Associated Security Goal | Definition of the attack | Involved DFG Components |
* For the sake of uniformity in the solutions follow the following answer structure for each row of the table that you fill out: STRIDE threat type :.... Security Goal:..... Definition of the attack:.. Involved DFG Components: ....
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started