SlideShare a Scribd company logo
DOUBLE-CLICK TO INSERT SHORT TITLE (50
CHARACTERS OR LESS) 1
DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50
CHARACTERS OR LESS) 2This Is Your Title: It Should Be
Less Than Twelve Words
Your Name
Course Name
College Name
Abstract
The abstract is on its own page. The first paragraph of the
abstract should not be indented. It is typically 150 to 250 words
and summarizes the main points of the paper. It should include
your thesis and summarize your main points and results. Do not
include quotations here. Define any abbreviations and acronyms
you use in the paper here. You might want to write it after
you’ve written the rest of your paper, so that it’s easy to
summarize.
In academic publishing, writing a good abstract is important,
because it is the first, and sometimes only, bit of information
your readers get to help them decide whether they should read
or buy your article. After this paragraph, there is a page break
that forces the beginning of your paper onto its own page: You
will want to keep it there.
This Is Your Title: It Should Be Less Than Twelve Words
This is your introduction and thesis paragraph. The introduction
should be about five or six sentences and provide some
background or context for your topic. Do not use I or you in
academic writing. When appropriate, include recent events
relating to the topic. For example, if you are writing about
cyber warfare, you might mention Russia using cyber-attacks to
influence the last US presidential election. Your thesis should
be one sentence and outline the main points of the paper.
Literature Review or Background
Summarize and quote the important research on this topic that
has gone before you. Define subject-specific vocabulary or
related theory. Usually, you want to look at books for
background. You might want to use your textbook or an
encyclopedia to find the names of researchers or theories that
are important to the topic, then, search for those names on the
library website. Use keywords when research of your topic in
databases (example: cyber warfare or cyber attack) to find
related articles and books. Need help? Ask A Librarian.
Anytime you summarize what someone else has said, include
the author’s last name and year either in the text or in
parentheses at the end. If you quote someone else, include the
author’s last name, year, and page number either in the text or
in parentheses at the end. If an article has three to five authors,
write their last names out the first time, then cite only the first
author’s last name followed by “et al.” If an article has six or
more authors, include only the first author’s last name followed
by “et al.” If the source does not have an author, such as a
website, put the name of the article or webpage in parentheses
at the end.
The whole point of in-text citations is so your reader can find
the correct source in your References, so make sure authors or
titles match both in-text and in References. Find out more about
in-text citation on the Hagan Memorial Library Citation Help
page.
Business sources are not standard APA citations; See Purdue
Owl for more information.
Discussion
The discussion should be the largest part of your paper and
include your argument, research, and experiences (for example,
through Service-Learning). Each main point of your paper
should start its own paragraph with a strong first sentence.
Again, do not use I or you in academic writing.
Remember to introduce quotations with who said it and/or why
it’s important. Make sure quotes fit seamlessly in your paper.
Include short quotations (40 words or less) in-text with
quotation marks. Use ellipsis (...) when omitting sections from a
quote and use four periods (....) if omitting the end section of a
quote.
This is a longer quote, which is 40 or more words. Indent the
quote a half-inch from the left margin and double-space it with
no quotation marks. To get the right format, just click on
“Quote” in the Styles area on the Word frame above. In
parentheses, include the author’s last name, year, and page
number.
Conclusion
The conclusion restates the thesis and summarizes the main
arguments or points of the article, so that your reader could just
read the conclusion to generally understand the paper. What is
important to learn from reading your paper? If you know of
areas in this topic that need further study, mention them. After
this paragraph, there is a page break that forces References onto
its own page: You will want to keep it there.
References
American Psychological Association. (year). Article title. Name
of Journal, volume, pages.
Author(s). (year). Book title. Where published: Publisher.
Retrieved from URL of book
Author(s) of essay or chapter. (year). In Author (Ed.), Book
title (pages of essay or chapter). Where published: Publisher.
Retrieved from URL of chapter or essay
Freud, S. (year). Article title. Name of Journal, volume (issue),
pages. Retrieved from journal URL
Jung, C., & Freud, S. (year). Article title. Name of Journal,
volume (issue), pages. Retrieved from article URL if poor
navigation on site
Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E.,
… Prinzker, T. (year). Book title (edition if given). Where
published: Publisher.
Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page
title. Retrieved from URL of Web page
Skinner, B. F. (year). Article title. Name of Journal, volume,
pages. doi:xx.xxxxxxxxxx
ISOL 536
Security Architecture and Design
Threat Modeling
Session 3
“What Can Go Wrong?”
Agenda
• STRIDE (in depth!)
• Reading: Chapter 3
Approach
• “What can go wrong” & “what to do about it”
are often (and reasonably) tied together in
practice
• This course splits them because they are
distinct questions & skills
Security mavens Experts in
other areas
STRIDE Trees Libraries
STRIDE
STRIDE Agenda
• Recap: A mnemonic for finding threats
• Details as examples
• Variants
STRIDE (review)
Threat Property
Violated
Definition Example
Spoofing Authentication Impersonating
something or someone
else.
Pretending to be any of Bill Gates, Paypal.com or
ntdll.dll
Tampering Integrity Modifying data or code Modifying a DLL
on disk or DVD, or a packet as it
traverses the network
Repudiation Non-repudiation Claiming to have not
performed an action.
“I didn’t send that email,” “I didn’t modify that
file,” “I certainly didn’t visit that web site, dear!”
Information
Disclosure
Confidentiality Exposing information
to someone not
authorized to see it
Allowing someone to read the Windows source
code; publishing a list of customers to a web
site.
Denial of Service Availability Deny or degrade
service to users
Crashing Windows or a web site, sending a
packet and absorbing seconds of CPU time, or
routing packets into a black hole.
Elevation of Privilege Authorization Gain capabilities
without proper
authorization
Allowing a remote Internet user to run
commands is the classic example, but going
from a limited user to admin is also EoP.
Spoofing
By Lego Envy,
http://www.eurobricks.com/forum/index.php?showtopic=64532
Spoofing On the Local Machine
Threat Example What the Attacker Does Notes/Examples
Spoofing a process Creates a file before the
real process
Then your process relies on
it
Abuses names Create a version of “sudo”
and alter PATH
Spoofing a filename Creates a file in the local
directory
Library, executable or
config file
Creates a link, changes it Also called ‘race condition’
or TOCTOU
Creates many files in a
target directory
Code can easily create all
possible /tmp/foo.random
Spoofing Over a Network
Threat Example What the Attacker Does Notes/Examples
Spoofing a machine ARP spoofing
IP spoofing
DNS spoofing
DNS compromise Can be at the TLD, registrar
or DNS server
IP redirection
Spoofing a person Take over account “Stranded in London”
Set the display name
Spoofing a role Declares themselves to be
that role
Sometimes opening a
special account, setting up
a domain/website, other
“verifiers”
Tampering
http://pinlac.com/LegoDSTractorBeam.html
Tampering with a File
Threat Example What the Attacker Does Notes/Examples
Modifying a file… … which you own and you
rely on
… which they own and you
rely on
Modifying a file on a
server…
…you own
…they own (or take over)
Modifies links or redirects Redirects are super-
common on the web, and
often rot away
Tampering with Memory
Threat Example What the Attacker Does Notes/Examples
Modifying code Changes your code to suit
themselves
Hard to defend against if
the attacker is running
code inside the trust
boundaries
Modifying data they’ve
supplied
Supplies data to a pass by
reference API, then
changes it
Works because of TOCTOU
issues
Supplies data into a shared
memory segment, then
changes it
Tampering with a Network
Threat Example What the Attacker Does Notes/Examples
Redirects the flow of data
to their machine
Uses an attack at some
network layer to redirect
traffic
Pakistan/YouTube
Modifies data flowing over
the network
Easier (and more fun) with
wireless networks
Uses network tampering to
improve spoofing attacks
RepudiationRepudiation
By Seb H
http://www.flickr.com/photos/[email protected]/8531040850/
Repudiation
Threat Example What the Attacker Does Notes/examples
Repudiating an action Claims to have not
clicked
Maybe they did, maybe they
didn’t, maybe they’re honestly
confused
Claims to not have
received
1. Electronic or physical
2. Receipt is strange; does a client
downloading email mean you’ve
seen it? Did a network proxy pre-
fetch images? Was a package left
on a porch?
Claims to be a fraud
victim
Uses someone else’s
account
Repudiation Attacks on Logs
Threat Example What the Attacker Does Notes/Examples
Discovers there are no logs
Modifies data flowing over
the network
Puts data in the logs to
confuse you
</tr></html>
Information Disclosure
Photo by Simon Liu http://www.flickr.com/photos/si-
mocs/6999508124/
Information Disclosure
(and impact)
Information Disclosure (Processes)
Threat Example What the Attacker Does Notes/Examples
Extracts user data Exploits bugs like SQL
injection to read db tables
Can find this by looking to
data stores, but here the
issue is the process
returning data it shouldn’t
Reads error messages
Extracts machine secrets Reads error messages Cannot connect
to
database ‘foo’ as user ‘sql’
with password ‘&IO*(^&’
Exploits bugs “Heartbleed”
Information Disclosure (Data
Stores)
Sub-category What the Attacker Does
Permissions Take advantage of missing or inappropriate ACLs
Take advantage of bad database permissions
File files protected by obscurity
Security Find crypto keys on disk or in memory
Get data from logs/temp files
Get data from swap files
See interesting information in filenames/directory names
Network See data traversing a network
Misc Obtain device, boot in new OS
Information Disclosure (Data Flow)
Sub-category What the Attacker Does
Network Read data on a network
Redirects traffics to enable reading data on the network
Metadata Learns secrets by analyzing traffic
Learns who talks to whom by watching the DNS
Learns who talks to whom by analyzing social network
information
Denial of Service
Model by Nathan Sawaya
http://brickartist.com/gallery/han-solo-in-carbonite/
Denial of Service
Threat Example What the Attacker Does Notes/Examples
Against a process Absorb memory (ram or disk)
Absorb CPU
Uses a process as an amplifier
Against business logic “Too many login
attempts”
Against a data store Fills the data store
Makes enough requests to slow the
system
Against a data flow Consumes network resources
Can be temporary or
persistent
Elevation of Privilege
http://www.flickr.com/photos/prodiffusion/
Elevation of Privilege (“EoP”)
Threat Example What the Attacker Does Notes/Examples
EoP Against process via
corruption
Sends inputs the code
doesn’t handle properly
Very common, usually high
impact
Gains read/write access to
memory
Writing memory more
obviously bad
EoP via misused
authorization checks
EoP via buggy
authorization checks
Centralizing checking
makes consistency,
correctness easier
EoP via data tampering Modify bits on disk
STRIDE Variants
• Ways to focus on likely threats
– STRIDE per element
– STRIDE per interaction
• Elevation of Privilege game
– Training, structure and execution
– DESIST
– Dispute
– Elevation of Privilege
– Spoofing
– Information Disclosure
– Service Denial
– Tampering
Spoofing Tamper. Rep. Info.Disc. DoS EoP
Process
Data Store
Dataflow
External Entity
STRIDE per Element
This is Microsoft’s chart; it may not be the issues you need to
worry about (privacy)
Next up …
• Attack trees (chapter 4)
• Attack libraries (chapter 5)

More Related Content

Similar to DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) .docx

BIO 112 Library Instruction
BIO 112 Library InstructionBIO 112 Library Instruction
BIO 112 Library Instruction
brunswickcclibrary
 
Research Paper Quotations
Research Paper  QuotationsResearch Paper  Quotations
Research Paper Quotations
GatorJohn
 
Research paper-quotations-1205750933845951-4
Research paper-quotations-1205750933845951-4Research paper-quotations-1205750933845951-4
Research paper-quotations-1205750933845951-4
Wendy Scruggs
 
Assignment harvard referencing guidelines (4)
Assignment   harvard  referencing guidelines (4)Assignment   harvard  referencing guidelines (4)
Assignment harvard referencing guidelines (4)
smumbahelp
 
Assignment harvard referencing guidelines
Assignment   harvard  referencing guidelinesAssignment   harvard  referencing guidelines
Assignment harvard referencing guidelines
smumbahelp
 
APA STYLE
APA STYLEAPA STYLE
APA STYLE
HabibaSaeed5
 
WritingaResearchPaper.ppt
WritingaResearchPaper.pptWritingaResearchPaper.ppt
WritingaResearchPaper.ppt
CyrilleGustilo
 
1 Writing and Formatting ENGL 2113 Essays Overview .docx
1 Writing and Formatting ENGL 2113 Essays Overview .docx1 Writing and Formatting ENGL 2113 Essays Overview .docx
1 Writing and Formatting ENGL 2113 Essays Overview .docx
SONU61709
 
Mla Citations for ENG 101
Mla Citations for ENG 101Mla Citations for ENG 101
Mla Citations for ENG 101
Laura Cline
 
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
Zahid Mehmood
 
The Research Paper and Citation Methodology
The Research Paper and Citation MethodologyThe Research Paper and Citation Methodology
The Research Paper and Citation Methodology
Ottawa University
 
DBS Library Harvard Referencing Class Slides
DBS Library Harvard Referencing Class Slides DBS Library Harvard Referencing Class Slides
DBS Library Harvard Referencing Class Slides
Trevor Haugh
 
McNair scholars
McNair scholarsMcNair scholars
McNair scholars
Tiffini Travis
 
Essay In Apa Format Sample
Essay In Apa Format SampleEssay In Apa Format Sample
Essay In Apa Format Sample
What Are The Best Paper Writing Services
 
APA Referencing Style 6th Edition.pdf
APA Referencing Style 6th Edition.pdfAPA Referencing Style 6th Edition.pdf
APA Referencing Style 6th Edition.pdf
Carrie Tran
 
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docxAvoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
rock73
 
Geology Geophysics 9580 9680 Library Workshop
Geology Geophysics 9580 9680 Library WorkshopGeology Geophysics 9580 9680 Library Workshop
Geology Geophysics 9580 9680 Library Workshop
dansich
 
Use Of Sources I
Use Of Sources IUse Of Sources I
Use Of Sources I
proftgreene
 
1 Writing & Documenting in APA A Concise Gui.docx
1    Writing & Documenting in APA    A Concise Gui.docx1    Writing & Documenting in APA    A Concise Gui.docx
1 Writing & Documenting in APA A Concise Gui.docx
honey725342
 
ENS/OCN 3911 Preparation for Field Projects
ENS/OCN 3911 Preparation for Field ProjectsENS/OCN 3911 Preparation for Field Projects
ENS/OCN 3911 Preparation for Field Projects
Evans Library at Florida Institute of Technology
 

Similar to DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) .docx (20)

BIO 112 Library Instruction
BIO 112 Library InstructionBIO 112 Library Instruction
BIO 112 Library Instruction
 
Research Paper Quotations
Research Paper  QuotationsResearch Paper  Quotations
Research Paper Quotations
 
Research paper-quotations-1205750933845951-4
Research paper-quotations-1205750933845951-4Research paper-quotations-1205750933845951-4
Research paper-quotations-1205750933845951-4
 
Assignment harvard referencing guidelines (4)
Assignment   harvard  referencing guidelines (4)Assignment   harvard  referencing guidelines (4)
Assignment harvard referencing guidelines (4)
 
Assignment harvard referencing guidelines
Assignment   harvard  referencing guidelinesAssignment   harvard  referencing guidelines
Assignment harvard referencing guidelines
 
APA STYLE
APA STYLEAPA STYLE
APA STYLE
 
WritingaResearchPaper.ppt
WritingaResearchPaper.pptWritingaResearchPaper.ppt
WritingaResearchPaper.ppt
 
1 Writing and Formatting ENGL 2113 Essays Overview .docx
1 Writing and Formatting ENGL 2113 Essays Overview .docx1 Writing and Formatting ENGL 2113 Essays Overview .docx
1 Writing and Formatting ENGL 2113 Essays Overview .docx
 
Mla Citations for ENG 101
Mla Citations for ENG 101Mla Citations for ENG 101
Mla Citations for ENG 101
 
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
Unit 8 & 9, BASICS OF TECHINICAL ENGLISH CODE 6465
 
The Research Paper and Citation Methodology
The Research Paper and Citation MethodologyThe Research Paper and Citation Methodology
The Research Paper and Citation Methodology
 
DBS Library Harvard Referencing Class Slides
DBS Library Harvard Referencing Class Slides DBS Library Harvard Referencing Class Slides
DBS Library Harvard Referencing Class Slides
 
McNair scholars
McNair scholarsMcNair scholars
McNair scholars
 
Essay In Apa Format Sample
Essay In Apa Format SampleEssay In Apa Format Sample
Essay In Apa Format Sample
 
APA Referencing Style 6th Edition.pdf
APA Referencing Style 6th Edition.pdfAPA Referencing Style 6th Edition.pdf
APA Referencing Style 6th Edition.pdf
 
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docxAvoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
Avoiding Plagiarism OverviewLearning how to avoid plagiarism and.docx
 
Geology Geophysics 9580 9680 Library Workshop
Geology Geophysics 9580 9680 Library WorkshopGeology Geophysics 9580 9680 Library Workshop
Geology Geophysics 9580 9680 Library Workshop
 
Use Of Sources I
Use Of Sources IUse Of Sources I
Use Of Sources I
 
1 Writing & Documenting in APA A Concise Gui.docx
1    Writing & Documenting in APA    A Concise Gui.docx1    Writing & Documenting in APA    A Concise Gui.docx
1 Writing & Documenting in APA A Concise Gui.docx
 
ENS/OCN 3911 Preparation for Field Projects
ENS/OCN 3911 Preparation for Field ProjectsENS/OCN 3911 Preparation for Field Projects
ENS/OCN 3911 Preparation for Field Projects
 

More from ShiraPrater50

Read Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docxRead Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docx
ShiraPrater50
 
Read Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docxRead Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docx
ShiraPrater50
 
Read Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docxRead Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docx
ShiraPrater50
 
Read chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docxRead chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docx
ShiraPrater50
 
Read Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docxRead Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docx
ShiraPrater50
 
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docxRead chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
ShiraPrater50
 
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docxRead Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
ShiraPrater50
 
Read chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docxRead chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docx
ShiraPrater50
 
Read Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docxRead Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docx
ShiraPrater50
 
Read Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docxRead Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docx
ShiraPrater50
 
Journal of Public Affairs Education 515Teaching Grammar a.docx
 Journal of Public Affairs Education 515Teaching Grammar a.docx Journal of Public Affairs Education 515Teaching Grammar a.docx
Journal of Public Affairs Education 515Teaching Grammar a.docx
ShiraPrater50
 
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 Learner Guide TLIR5014 Manage suppliers TLIR.docx Learner Guide TLIR5014 Manage suppliers TLIR.docx
Learner Guide TLIR5014 Manage suppliers TLIR.docx
ShiraPrater50
 
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
ShiraPrater50
 
Leveled and Exclusionary Tracking English Learners Acce.docx
 Leveled and Exclusionary Tracking English Learners Acce.docx Leveled and Exclusionary Tracking English Learners Acce.docx
Leveled and Exclusionary Tracking English Learners Acce.docx
ShiraPrater50
 
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
ShiraPrater50
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
ShiraPrater50
 
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
ShiraPrater50
 
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
ShiraPrater50
 
MBA 5101, Strategic Management and Business Policy 1 .docx
 MBA 5101, Strategic Management and Business Policy 1 .docx MBA 5101, Strategic Management and Business Policy 1 .docx
MBA 5101, Strategic Management and Business Policy 1 .docx
ShiraPrater50
 
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 MAJOR WORLD RELIGIONSJudaismJudaism (began .docx MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
ShiraPrater50
 

More from ShiraPrater50 (20)

Read Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docxRead Chapter 3. Answer the following questions1.Wha.docx
Read Chapter 3. Answer the following questions1.Wha.docx
 
Read Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docxRead Chapter 15 and answer the following questions 1.  De.docx
Read Chapter 15 and answer the following questions 1.  De.docx
 
Read Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docxRead Chapter 2 and answer the following questions1.  List .docx
Read Chapter 2 and answer the following questions1.  List .docx
 
Read chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docxRead chapter 7 and write the book report  The paper should be .docx
Read chapter 7 and write the book report  The paper should be .docx
 
Read Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docxRead Chapter 7 and answer the following questions1.  What a.docx
Read Chapter 7 and answer the following questions1.  What a.docx
 
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docxRead chapter 14, 15 and 18 of the class textbook.Saucier.docx
Read chapter 14, 15 and 18 of the class textbook.Saucier.docx
 
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docxRead Chapter 10 APA FORMAT1. In the last century, what historica.docx
Read Chapter 10 APA FORMAT1. In the last century, what historica.docx
 
Read chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docxRead chapter 7 and write the book report  The paper should b.docx
Read chapter 7 and write the book report  The paper should b.docx
 
Read Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docxRead Chapter 14 and answer the following questions1.  Explain t.docx
Read Chapter 14 and answer the following questions1.  Explain t.docx
 
Read Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docxRead Chapter 2 first. Then come to this assignment.The first t.docx
Read Chapter 2 first. Then come to this assignment.The first t.docx
 
Journal of Public Affairs Education 515Teaching Grammar a.docx
 Journal of Public Affairs Education 515Teaching Grammar a.docx Journal of Public Affairs Education 515Teaching Grammar a.docx
Journal of Public Affairs Education 515Teaching Grammar a.docx
 
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 Learner Guide TLIR5014 Manage suppliers TLIR.docx Learner Guide TLIR5014 Manage suppliers TLIR.docx
Learner Guide TLIR5014 Manage suppliers TLIR.docx
 
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2012 by Jone.docx
 
Leveled and Exclusionary Tracking English Learners Acce.docx
 Leveled and Exclusionary Tracking English Learners Acce.docx Leveled and Exclusionary Tracking English Learners Acce.docx
Leveled and Exclusionary Tracking English Learners Acce.docx
 
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
Lab 5 Nessus Vulnerability Scan Report © 2015 by Jone.docx
 
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 MBA 6941, Managing Project Teams 1 Course Learning Ou.docx MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
MBA 6941, Managing Project Teams 1 Course Learning Ou.docx
 
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
Inventory Decisions in Dells Supply ChainAuthor(s) Ro.docx
 
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
It’s Your Choice 10 – Clear Values 2nd Chain Link- Trade-offs .docx
 
MBA 5101, Strategic Management and Business Policy 1 .docx
 MBA 5101, Strategic Management and Business Policy 1 .docx MBA 5101, Strategic Management and Business Policy 1 .docx
MBA 5101, Strategic Management and Business Policy 1 .docx
 
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 MAJOR WORLD RELIGIONSJudaismJudaism (began .docx MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
MAJOR WORLD RELIGIONSJudaismJudaism (began .docx
 

Recently uploaded

How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Diana Rendina
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) .docx

  • 1. DOUBLE-CLICK TO INSERT SHORT TITLE (50 CHARACTERS OR LESS) 1 DOUBLE-CLICK TO TYPE IN ABBRIEVATED TITLE (50 CHARACTERS OR LESS) 2This Is Your Title: It Should Be Less Than Twelve Words Your Name Course Name College Name Abstract The abstract is on its own page. The first paragraph of the abstract should not be indented. It is typically 150 to 250 words and summarizes the main points of the paper. It should include your thesis and summarize your main points and results. Do not include quotations here. Define any abbreviations and acronyms you use in the paper here. You might want to write it after you’ve written the rest of your paper, so that it’s easy to summarize. In academic publishing, writing a good abstract is important, because it is the first, and sometimes only, bit of information your readers get to help them decide whether they should read or buy your article. After this paragraph, there is a page break that forces the beginning of your paper onto its own page: You will want to keep it there. This Is Your Title: It Should Be Less Than Twelve Words This is your introduction and thesis paragraph. The introduction should be about five or six sentences and provide some background or context for your topic. Do not use I or you in academic writing. When appropriate, include recent events relating to the topic. For example, if you are writing about cyber warfare, you might mention Russia using cyber-attacks to
  • 2. influence the last US presidential election. Your thesis should be one sentence and outline the main points of the paper. Literature Review or Background Summarize and quote the important research on this topic that has gone before you. Define subject-specific vocabulary or related theory. Usually, you want to look at books for background. You might want to use your textbook or an encyclopedia to find the names of researchers or theories that are important to the topic, then, search for those names on the library website. Use keywords when research of your topic in databases (example: cyber warfare or cyber attack) to find related articles and books. Need help? Ask A Librarian. Anytime you summarize what someone else has said, include the author’s last name and year either in the text or in parentheses at the end. If you quote someone else, include the author’s last name, year, and page number either in the text or in parentheses at the end. If an article has three to five authors, write their last names out the first time, then cite only the first author’s last name followed by “et al.” If an article has six or more authors, include only the first author’s last name followed by “et al.” If the source does not have an author, such as a website, put the name of the article or webpage in parentheses at the end. The whole point of in-text citations is so your reader can find the correct source in your References, so make sure authors or titles match both in-text and in References. Find out more about in-text citation on the Hagan Memorial Library Citation Help page. Business sources are not standard APA citations; See Purdue Owl for more information. Discussion The discussion should be the largest part of your paper and include your argument, research, and experiences (for example, through Service-Learning). Each main point of your paper
  • 3. should start its own paragraph with a strong first sentence. Again, do not use I or you in academic writing. Remember to introduce quotations with who said it and/or why it’s important. Make sure quotes fit seamlessly in your paper. Include short quotations (40 words or less) in-text with quotation marks. Use ellipsis (...) when omitting sections from a quote and use four periods (....) if omitting the end section of a quote. This is a longer quote, which is 40 or more words. Indent the quote a half-inch from the left margin and double-space it with no quotation marks. To get the right format, just click on “Quote” in the Styles area on the Word frame above. In parentheses, include the author’s last name, year, and page number. Conclusion The conclusion restates the thesis and summarizes the main arguments or points of the article, so that your reader could just read the conclusion to generally understand the paper. What is important to learn from reading your paper? If you know of areas in this topic that need further study, mention them. After this paragraph, there is a page break that forces References onto its own page: You will want to keep it there. References American Psychological Association. (year). Article title. Name of Journal, volume, pages. Author(s). (year). Book title. Where published: Publisher. Retrieved from URL of book Author(s) of essay or chapter. (year). In Author (Ed.), Book title (pages of essay or chapter). Where published: Publisher. Retrieved from URL of chapter or essay Freud, S. (year). Article title. Name of Journal, volume (issue), pages. Retrieved from journal URL Jung, C., & Freud, S. (year). Article title. Name of Journal,
  • 4. volume (issue), pages. Retrieved from article URL if poor navigation on site Neu, J, Lakoff, R., Kamin, J., Green, P. Lessig, L., Brody, E., … Prinzker, T. (year). Book title (edition if given). Where published: Publisher. Pavlov, I., Jung, C., & Freud, S. (year of last update). Web page title. Retrieved from URL of Web page Skinner, B. F. (year). Article title. Name of Journal, volume, pages. doi:xx.xxxxxxxxxx ISOL 536 Security Architecture and Design Threat Modeling Session 3 “What Can Go Wrong?” Agenda • STRIDE (in depth!) • Reading: Chapter 3 Approach • “What can go wrong” & “what to do about it” are often (and reasonably) tied together in practice
  • 5. • This course splits them because they are distinct questions & skills Security mavens Experts in other areas STRIDE Trees Libraries STRIDE STRIDE Agenda • Recap: A mnemonic for finding threats • Details as examples • Variants STRIDE (review) Threat Property Violated Definition Example Spoofing Authentication Impersonating something or someone else. Pretending to be any of Bill Gates, Paypal.com or ntdll.dll
  • 6. Tampering Integrity Modifying data or code Modifying a DLL on disk or DVD, or a packet as it traverses the network Repudiation Non-repudiation Claiming to have not performed an action. “I didn’t send that email,” “I didn’t modify that file,” “I certainly didn’t visit that web site, dear!” Information Disclosure Confidentiality Exposing information to someone not authorized to see it Allowing someone to read the Windows source code; publishing a list of customers to a web site. Denial of Service Availability Deny or degrade service to users Crashing Windows or a web site, sending a packet and absorbing seconds of CPU time, or routing packets into a black hole.
  • 7. Elevation of Privilege Authorization Gain capabilities without proper authorization Allowing a remote Internet user to run commands is the classic example, but going from a limited user to admin is also EoP. Spoofing By Lego Envy, http://www.eurobricks.com/forum/index.php?showtopic=64532 Spoofing On the Local Machine Threat Example What the Attacker Does Notes/Examples Spoofing a process Creates a file before the real process Then your process relies on it Abuses names Create a version of “sudo” and alter PATH Spoofing a filename Creates a file in the local directory
  • 8. Library, executable or config file Creates a link, changes it Also called ‘race condition’ or TOCTOU Creates many files in a target directory Code can easily create all possible /tmp/foo.random Spoofing Over a Network Threat Example What the Attacker Does Notes/Examples Spoofing a machine ARP spoofing IP spoofing DNS spoofing DNS compromise Can be at the TLD, registrar or DNS server IP redirection Spoofing a person Take over account “Stranded in London” Set the display name Spoofing a role Declares themselves to be that role
  • 9. Sometimes opening a special account, setting up a domain/website, other “verifiers” Tampering http://pinlac.com/LegoDSTractorBeam.html Tampering with a File Threat Example What the Attacker Does Notes/Examples Modifying a file… … which you own and you rely on … which they own and you rely on Modifying a file on a server… …you own …they own (or take over) Modifies links or redirects Redirects are super- common on the web, and often rot away
  • 10. Tampering with Memory Threat Example What the Attacker Does Notes/Examples Modifying code Changes your code to suit themselves Hard to defend against if the attacker is running code inside the trust boundaries Modifying data they’ve supplied Supplies data to a pass by reference API, then changes it Works because of TOCTOU issues Supplies data into a shared memory segment, then changes it Tampering with a Network Threat Example What the Attacker Does Notes/Examples Redirects the flow of data to their machine Uses an attack at some
  • 11. network layer to redirect traffic Pakistan/YouTube Modifies data flowing over the network Easier (and more fun) with wireless networks Uses network tampering to improve spoofing attacks RepudiationRepudiation By Seb H http://www.flickr.com/photos/[email protected]/8531040850/ Repudiation Threat Example What the Attacker Does Notes/examples Repudiating an action Claims to have not clicked Maybe they did, maybe they didn’t, maybe they’re honestly confused Claims to not have received
  • 12. 1. Electronic or physical 2. Receipt is strange; does a client downloading email mean you’ve seen it? Did a network proxy pre- fetch images? Was a package left on a porch? Claims to be a fraud victim Uses someone else’s account Repudiation Attacks on Logs Threat Example What the Attacker Does Notes/Examples Discovers there are no logs Modifies data flowing over the network Puts data in the logs to confuse you </tr></html> Information Disclosure
  • 13. Photo by Simon Liu http://www.flickr.com/photos/si- mocs/6999508124/ Information Disclosure (and impact) Information Disclosure (Processes) Threat Example What the Attacker Does Notes/Examples Extracts user data Exploits bugs like SQL injection to read db tables Can find this by looking to data stores, but here the issue is the process returning data it shouldn’t Reads error messages Extracts machine secrets Reads error messages Cannot connect to database ‘foo’ as user ‘sql’ with password ‘&IO*(^&’ Exploits bugs “Heartbleed” Information Disclosure (Data Stores) Sub-category What the Attacker Does
  • 14. Permissions Take advantage of missing or inappropriate ACLs Take advantage of bad database permissions File files protected by obscurity Security Find crypto keys on disk or in memory Get data from logs/temp files Get data from swap files See interesting information in filenames/directory names Network See data traversing a network Misc Obtain device, boot in new OS Information Disclosure (Data Flow) Sub-category What the Attacker Does Network Read data on a network Redirects traffics to enable reading data on the network Metadata Learns secrets by analyzing traffic Learns who talks to whom by watching the DNS Learns who talks to whom by analyzing social network information
  • 15. Denial of Service Model by Nathan Sawaya http://brickartist.com/gallery/han-solo-in-carbonite/ Denial of Service Threat Example What the Attacker Does Notes/Examples Against a process Absorb memory (ram or disk) Absorb CPU Uses a process as an amplifier Against business logic “Too many login attempts” Against a data store Fills the data store Makes enough requests to slow the system Against a data flow Consumes network resources Can be temporary or persistent Elevation of Privilege http://www.flickr.com/photos/prodiffusion/
  • 16. Elevation of Privilege (“EoP”) Threat Example What the Attacker Does Notes/Examples EoP Against process via corruption Sends inputs the code doesn’t handle properly Very common, usually high impact Gains read/write access to memory Writing memory more obviously bad EoP via misused authorization checks EoP via buggy authorization checks Centralizing checking makes consistency, correctness easier EoP via data tampering Modify bits on disk
  • 17. STRIDE Variants • Ways to focus on likely threats – STRIDE per element – STRIDE per interaction • Elevation of Privilege game – Training, structure and execution – DESIST – Dispute – Elevation of Privilege – Spoofing – Information Disclosure – Service Denial – Tampering Spoofing Tamper. Rep. Info.Disc. DoS EoP Process Data Store Dataflow External Entity
  • 18. STRIDE per Element This is Microsoft’s chart; it may not be the issues you need to worry about (privacy) Next up … • Attack trees (chapter 4) • Attack libraries (chapter 5)