Question: Step #1: Read Read the following materials: Sprint 7 - Data Flow / Security / Privacy doc in the Class Notes folder of our Google
Step #1: Read
Read the following materials:
Sprint 7 - Data Flow / Security / Privacy doc in the Class Notes folder of our Google Drive (link on Syllabus).
The November 2006 MSDN Magazine article Uncover Security Design Flaws Using The STRIDE Approach
Actions
Step #2: Complete DFD
The following (incomplete) DFD is derived from the Task #5: Draft System Architecture customer scenario. In this DFD the entire Good To Go system is represented by a single process.
Complete the DFD by labelling the type of data that moves across each of the five bolded data flows (A, B, C, D, E). You can download this diagram as a PDF file
Actions
or a JPG file Download JPG file.
Step #3: Draw trust boundaries
Draw at least four trust boundaries on that DFD.
Step #4: Identify possible threats
Considering those trust boundaries, identify two places where each of the six types of threats described by STRIDE could occur. For each of those 12 instances, briefly describe a threat and how that threat might occur.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
