SlideShare a Scribd company logo
1 of 6
Research Paper on STRIDE
Presented By
Kranthi Sekhar Reddy Kolli
(002832361)
University of Cumberlands
Threat Modeling:
According to Adam Shostack(2017) Threat modeling is about
building models, and using those models to help you think about
what’s going to go wrong. There are models implicit in most
things. For example, in threat intelligence, you often receive IP
addresses, email addresses, and similar “indicators.” Implicit is
that you’ll plug those IPs into your firewall or IDS, or block or
detect those emails at your mail server. There are also important
details rarely discussed: Is your firewall from Palo Alto or
Fortinet Each has a different user interface, but each has a way
to block an IP address.
Threat modeling is essential to becoming proactive and
strategic in your operational and application security. Modern
threat modeling is agile and integrative, building collaboration
between security and other teams. That’s security and
development, security and operations, security and all sorts of
others. Threat modeling is also essential in moving away from
“gut feel” to a disciplined approach to problems (2017).
STRIDE:
Stride is a systematic way to deal with recognizing our
application's advantages and the in all probability threats to
them. What resources would we say we are talking about
precisely? This would be anything that is put away in a
database, CPU influence, and documents situated in a record
framework. When you have set aside the opportunity to assess
your advantages, you would then be able to start to survey the
genuine dangers that issue most to your foundation (Shostack,
2017).
The name STRIDE [Hernan 2006] is an acronym based on
the initials of the six threat categories: Spoofing, Tampering,
Repudiation, Information disclosure, Denial of service, and
Elevation of privilege. These categories are not mutually
exclusive, and complex attacks may involve a combination of
them. However, they provide a useful set that non-security
experts can use to reason about security threats.
Spoofing:
Spoofing is an attack in which people (or programs) represent
themselves as something other than what they truly are, with the
intent of gaining authorized access to resources for which they
should be unauthorized. A successful spoofing attack is one that
allows an attacker to foil or avoid authentication.
Conditions under Which Spoofing Might Occur:
Spoofing can occur when the source or destination of a message
is not properly trusted (e.g., via authentication), but the
requested action in the message is still performed. Spoofing can
be successful if the attacking component can steal another
component’s identity to appear authentic or if other components
do not demand proof of authentication.
Spoofing Risks:
When considering spoofing attacks, we must think about these
general design weaknesses that would allow spoofing to occur:
· There is no authentication, or the authentication mechanism
has been broken or bypassed.
· An external (third-party) component is mistakenly trusted as
authenticated.
Spoofing attacks violate the Authentication Property.
Tampering:
The objective of tampering is to perform unauthorized
modifications to data or services. In a tampering attack, an
attacker makes a modification to change the system’s runtime
behavior through unauthorized access to the data or service.
Conditions under Which Tampering Might Occur:
Tampering could occur if the infotainment system contains data
stores, as it almost certainly will. If the data’s encryption is
strong, the attacking component can attempt to simply corrupt
the data, rendering the system unusable or less usable. If the
encryption is weak (or non-existent), the attacking component
can modify the data, perhaps without being detected. This risk
can also affect data in motion, if it is not adequately encrypted.
Tampering Risks:
When considering tampering attacks, we must think about these
risks:
· If tampering is not detected, any assumptions about system
behavior are invalidated.
· Trust boundaries will affect how components are grouped and
hence where encryption will and will not be applied.
· Trust boundaries will affect when and where an actor is
authenticated or re-authenticated.
Tampering attacks violate the Integrity Property.
Repudiation:
Repudiation can occur when a system does not properly
track and log the actions or changes of users (or other system
actors). In such a case, malicious users may be able to forge an
identity so that their actions (attacks) will be difficult to trace
and might go undetected for an extended period of time.
Conditions Under Which Repudiation Might Occur:
Repudiation could occur if an attacking component changes
data (e.g., state information, driver information) without the
possibility of that change being traced back to that component.
Such changes will be difficult to detect and prevent if, for
example, the components store data without using a data hash.
Repudiation Risks:
When considering repudiation attacks, we must think about
these risks:
· If no logging is being done, repudiation cannot be ensured.
· If authentication is inadequate, logging is meaningless.
Repudiation attacks violate the Non-Repudiation property.
Information Disclosure:
Information disclosure enables an attacker to gain (potentially
sensitive) information about a system, possibly leading to a data
leak, a privacy breach, or the disclosure of information that
could be used to launch additional attacks.
Conditions Under Which Information Disclosure Might Occur:
If an attacker can read a process’s state, capture
information in transit, or break into a system’s database,
sensitive information might be disclosed. For example, if the
system uses the broadcast of messages or publish/subscribe
features, an attacking component might be able to use this
design weakness to steal information in transit. Similarly, if an
attacking component can spoof a recipient’s identity, it could
collect (and steal) poorly protected information intended for the
legitimate recipient.
Information Disclosure Risks:
When considering attacks that could lead to information
disclosure, we must think about these risks:
· Disclosure of operational information can lead to other
security or availability problems.
· Disclosure of customer or user information can lead to a loss
of reputation, as well as increased likelihood of other kinds of
attacks.
Information disclosure attacks violate the Confidentiality
property.
Denial of Service:
A denial of service (DoS) attack is an attempt to make a
computational or network resource unavailable to its intended
(legitimate) users. This attack is typically accomplished by
flooding the system with useless traffic or service requests.
Conditions Under Which Denial of Service Might Occur:
Denial of Service attacks, which are perhaps the most
critical security risk for an automotive system, can affect
safety-critical performance and availability properties. An
attacking component, which may or may not be authorized in
the system, could attempt to saturate the available system
channels with communication requests.
Denial of Service Risks:
A successful Denial of Service attack can affect the
system’s safety-critical properties.
Denial of Service attacks violates the Availability property.
Elevation of Privilege (EoP):
An Elevation of Privilege attack occurs when an attacker
obtains authorization permissions beyond those initially
granted, typically by exploiting a weakness—a programming
error or design flaw—in the system. As a result of this exploit,
the attacker can perform unauthorized actions.
Conditions Under Which Elevation of Privilege Might Occur:
Elevation of Privilege involves an attacking component gaining
access to data or resources beyond what its permissions allow
(in terms of its group membership and data access rights
[read/write/execute]). This unauthorized access can occur due to
“stealing” the identity of another component (via spoofing or
information disclosure) or due to a jailbreak-type attack.
Elevation of Privilege Risks:
Elevation invalidates all the other security properties and
mechanisms built into the system.
Elevation of Privilege attacks violates the Authorization
property.
Reference:
https://misti.com/infosec-insider/threat-modeling-what-why-
and-how (2017)
https://resources.sei.cmu.edu/asset_files/TechnicalReport/2015_
005_001_449522.pdf (2016)

More Related Content

Similar to Research Paper on STRIDEPresented By.docx

Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...karthikasivakumar3
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxyoufanlimboo
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementBhadra Gowdra
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...Alisha Henderson
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyMohammad Febri
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurvkarthi314
 
Information security
Information securityInformation security
Information securityRohit Gir
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack newbie2019
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochQA or the Highway
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Komal Mehfooz
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 

Similar to Research Paper on STRIDEPresented By.docx (20)

Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for...
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...What is penetration testing and why is it important for a business to invest ...
What is penetration testing and why is it important for a business to invest ...
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cybersecurity and Risk Management Technology
Cybersecurity and Risk Management TechnologyCybersecurity and Risk Management Technology
Cybersecurity and Risk Management Technology
 
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavurS.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
S.Karthika,II-M.sc(Computer Science),Bon Secours college for women,thanjavur
 
Information security
Information securityInformation security
Information security
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Application security
Application securityApplication security
Application security
 
46 102-112
46 102-11246 102-112
46 102-112
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz) Security & threats Presentation => (Presenter: Komal Mehfooz)
Security & threats Presentation => (Presenter: Komal Mehfooz)
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 

More from ronak56

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxronak56
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxronak56
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxronak56
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxronak56
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxronak56
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxronak56
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxronak56
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxronak56
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxronak56
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxronak56
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxronak56
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxronak56
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxronak56
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxronak56
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxronak56
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxronak56
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxronak56
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxronak56
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxronak56
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxronak56
 

More from ronak56 (20)

According to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docxAccording to the textbook, the Federal Disaster Assistance Act of 19.docx
According to the textbook, the Federal Disaster Assistance Act of 19.docx
 
According to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docxAccording to the Council on Social Work Education, Competency 5 Eng.docx
According to the Council on Social Work Education, Competency 5 Eng.docx
 
According to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docxAccording to the text, economic outcomes measured by economic gr.docx
According to the text, economic outcomes measured by economic gr.docx
 
According to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docxAccording to the Council on Social Work Education, Competency 5.docx
According to the Council on Social Work Education, Competency 5.docx
 
According to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docxAccording to the Council for Exceptional Children (CEC), part of.docx
According to the Council for Exceptional Children (CEC), part of.docx
 
According to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docxAccording to the article, Answer these two questions. Why did Ma.docx
According to the article, Answer these two questions. Why did Ma.docx
 
According to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docxAccording to Neuman’s theory, a human being is a total person as a c.docx
According to Neuman’s theory, a human being is a total person as a c.docx
 
According to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docxAccording to Rolando et al. (2012), alcohol socialization is the pr.docx
According to Rolando et al. (2012), alcohol socialization is the pr.docx
 
According to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docxAccording to your readings, cloud computing represents one of th.docx
According to your readings, cloud computing represents one of th.docx
 
According to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docxAccording to this idea that gender is socially constructed, answer.docx
According to this idea that gender is socially constructed, answer.docx
 
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docxAccording to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
According to Thiel (2015, p. 40), CSR literature lacks consensus fo.docx
 
According to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docxAccording to recent surveys, China, India, and the Philippines are t.docx
According to recent surveys, China, India, and the Philippines are t.docx
 
According to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docxAccording to Rolando et al. (2012), alcohol socialization is th.docx
According to Rolando et al. (2012), alcohol socialization is th.docx
 
According to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docxAccording to the author, Social Security is an essential program, .docx
According to the author, Social Security is an essential program, .docx
 
According to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docxAccording to Morrish, the blame for the ever-growing problem of disc.docx
According to Morrish, the blame for the ever-growing problem of disc.docx
 
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docxAccording to DuBrin (2015), Cultural intelligence is an outsiders .docx
According to DuBrin (2015), Cultural intelligence is an outsiders .docx
 
According to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docxAccording to Edgar Schein, organizational culture are the shared.docx
According to Edgar Schein, organizational culture are the shared.docx
 
According to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docxAccording to DuBrin (2015), the following strategies or tactics are .docx
According to DuBrin (2015), the following strategies or tactics are .docx
 
According to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docxAccording to DuBrin (2015), the following strategies or tactics .docx
According to DuBrin (2015), the following strategies or tactics .docx
 
Access the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docxAccess the Mental Measurements Yearbook, located in the Univer.docx
Access the Mental Measurements Yearbook, located in the Univer.docx
 

Recently uploaded

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Research Paper on STRIDEPresented By.docx

  • 1. Research Paper on STRIDE Presented By Kranthi Sekhar Reddy Kolli (002832361) University of Cumberlands Threat Modeling: According to Adam Shostack(2017) Threat modeling is about building models, and using those models to help you think about what’s going to go wrong. There are models implicit in most things. For example, in threat intelligence, you often receive IP addresses, email addresses, and similar “indicators.” Implicit is that you’ll plug those IPs into your firewall or IDS, or block or
  • 2. detect those emails at your mail server. There are also important details rarely discussed: Is your firewall from Palo Alto or Fortinet Each has a different user interface, but each has a way to block an IP address. Threat modeling is essential to becoming proactive and strategic in your operational and application security. Modern threat modeling is agile and integrative, building collaboration between security and other teams. That’s security and development, security and operations, security and all sorts of others. Threat modeling is also essential in moving away from “gut feel” to a disciplined approach to problems (2017). STRIDE: Stride is a systematic way to deal with recognizing our application's advantages and the in all probability threats to them. What resources would we say we are talking about precisely? This would be anything that is put away in a database, CPU influence, and documents situated in a record framework. When you have set aside the opportunity to assess your advantages, you would then be able to start to survey the genuine dangers that issue most to your foundation (Shostack, 2017). The name STRIDE [Hernan 2006] is an acronym based on the initials of the six threat categories: Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privilege. These categories are not mutually exclusive, and complex attacks may involve a combination of them. However, they provide a useful set that non-security experts can use to reason about security threats. Spoofing: Spoofing is an attack in which people (or programs) represent themselves as something other than what they truly are, with the intent of gaining authorized access to resources for which they should be unauthorized. A successful spoofing attack is one that allows an attacker to foil or avoid authentication. Conditions under Which Spoofing Might Occur: Spoofing can occur when the source or destination of a message
  • 3. is not properly trusted (e.g., via authentication), but the requested action in the message is still performed. Spoofing can be successful if the attacking component can steal another component’s identity to appear authentic or if other components do not demand proof of authentication. Spoofing Risks: When considering spoofing attacks, we must think about these general design weaknesses that would allow spoofing to occur: · There is no authentication, or the authentication mechanism has been broken or bypassed. · An external (third-party) component is mistakenly trusted as authenticated. Spoofing attacks violate the Authentication Property. Tampering: The objective of tampering is to perform unauthorized modifications to data or services. In a tampering attack, an attacker makes a modification to change the system’s runtime behavior through unauthorized access to the data or service. Conditions under Which Tampering Might Occur: Tampering could occur if the infotainment system contains data stores, as it almost certainly will. If the data’s encryption is strong, the attacking component can attempt to simply corrupt the data, rendering the system unusable or less usable. If the encryption is weak (or non-existent), the attacking component can modify the data, perhaps without being detected. This risk can also affect data in motion, if it is not adequately encrypted. Tampering Risks: When considering tampering attacks, we must think about these risks: · If tampering is not detected, any assumptions about system behavior are invalidated. · Trust boundaries will affect how components are grouped and hence where encryption will and will not be applied. · Trust boundaries will affect when and where an actor is authenticated or re-authenticated. Tampering attacks violate the Integrity Property.
  • 4. Repudiation: Repudiation can occur when a system does not properly track and log the actions or changes of users (or other system actors). In such a case, malicious users may be able to forge an identity so that their actions (attacks) will be difficult to trace and might go undetected for an extended period of time. Conditions Under Which Repudiation Might Occur: Repudiation could occur if an attacking component changes data (e.g., state information, driver information) without the possibility of that change being traced back to that component. Such changes will be difficult to detect and prevent if, for example, the components store data without using a data hash. Repudiation Risks: When considering repudiation attacks, we must think about these risks: · If no logging is being done, repudiation cannot be ensured. · If authentication is inadequate, logging is meaningless. Repudiation attacks violate the Non-Repudiation property. Information Disclosure: Information disclosure enables an attacker to gain (potentially sensitive) information about a system, possibly leading to a data leak, a privacy breach, or the disclosure of information that could be used to launch additional attacks. Conditions Under Which Information Disclosure Might Occur: If an attacker can read a process’s state, capture information in transit, or break into a system’s database, sensitive information might be disclosed. For example, if the system uses the broadcast of messages or publish/subscribe features, an attacking component might be able to use this design weakness to steal information in transit. Similarly, if an attacking component can spoof a recipient’s identity, it could collect (and steal) poorly protected information intended for the legitimate recipient. Information Disclosure Risks: When considering attacks that could lead to information disclosure, we must think about these risks:
  • 5. · Disclosure of operational information can lead to other security or availability problems. · Disclosure of customer or user information can lead to a loss of reputation, as well as increased likelihood of other kinds of attacks. Information disclosure attacks violate the Confidentiality property. Denial of Service: A denial of service (DoS) attack is an attempt to make a computational or network resource unavailable to its intended (legitimate) users. This attack is typically accomplished by flooding the system with useless traffic or service requests. Conditions Under Which Denial of Service Might Occur: Denial of Service attacks, which are perhaps the most critical security risk for an automotive system, can affect safety-critical performance and availability properties. An attacking component, which may or may not be authorized in the system, could attempt to saturate the available system channels with communication requests. Denial of Service Risks: A successful Denial of Service attack can affect the system’s safety-critical properties. Denial of Service attacks violates the Availability property. Elevation of Privilege (EoP): An Elevation of Privilege attack occurs when an attacker obtains authorization permissions beyond those initially granted, typically by exploiting a weakness—a programming error or design flaw—in the system. As a result of this exploit, the attacker can perform unauthorized actions. Conditions Under Which Elevation of Privilege Might Occur: Elevation of Privilege involves an attacking component gaining access to data or resources beyond what its permissions allow (in terms of its group membership and data access rights
  • 6. [read/write/execute]). This unauthorized access can occur due to “stealing” the identity of another component (via spoofing or information disclosure) or due to a jailbreak-type attack. Elevation of Privilege Risks: Elevation invalidates all the other security properties and mechanisms built into the system. Elevation of Privilege attacks violates the Authorization property. Reference: https://misti.com/infosec-insider/threat-modeling-what-why- and-how (2017) https://resources.sei.cmu.edu/asset_files/TechnicalReport/2015_ 005_001_449522.pdf (2016)