Question: Step #1: Read Read the following materials: Sprint 7 - Data Flow / Security / Privacy doc in the Class Notes folder of our Google

Step #1: Read

Read the following materials:

Sprint 7 - Data Flow / Security / Privacy doc in the Class Notes folder of our Google Drive (link on Syllabus).

The November 2006 MSDN Magazine article Uncover Security Design Flaws Using The STRIDE Approach

Actions

Step #2: Complete DFD

The following (incomplete) DFD is derived from the Task #5: Draft System Architecture customer scenario. In this DFD the entire Good To Go system is represented by a single process.

Complete the DFD by labelling the type of data that moves across each of the five bolded data flows (A, B, C, D, E). You can download this diagram as a PDF file

Actions

or a JPG file Download JPG file.

Step #3: Draw trust boundaries

Draw at least four trust boundaries on that DFD.

Step #4: Identify possible threats

Considering those trust boundaries, identify two places where each of the six types of threats described by STRIDE could occur. For each of those 12 instances, briefly describe a threat and how that threat might occur.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!