The solutions you wrote for me: Dr Palmer and his staff are upset by the many security elements provided in the health record system. Instead of inactivating the security features, a possible solution for their upset is to allow the security system to go to sleep after 15 minutes of no operation. This way, if the system will not be accessed for a given period of time, it shall be redirected into idle mode and health records shall not be rendered into jeopardy. This solution is practical because it gives the working staff enough time to have a break and go back in a manageable time-frame without having to log out. The drawback of this solution is that, within the set time frame, an intruder can access the system and possibly expose patient records. In addition of accessing the system through a username and a password, the system could be opened by fingerprint. This technique would only need an employee to place their respective finger in the identification system, then they would be granted full access to the system. The solution is practical since it will eradicate passwords and usernames granting the user simple and easy access to the system (Jamoom et al., 2013). The negative part of this solution is embedded on the cost of the finger-print system. In other words, every computer must be fitted with the system and this calls of additional costs. However, when all areas are put into consideration, I believe that this is the best solution for the problem. Simply, the fingerprint system will eliminate the tedious access of records through usernames and passwords. Furthermore, security of the system shall be increased since fingerprints cannot be leaked or copied like usernames and passwords. a. Identify any areas of weakness within your chosen solution. b. Identify hidden assumptions and beliefs you may harbor about your choice of solution. ISOL 536 Security Architecture and Design Threat Modeling Session 6a “Processing Threats” Agenda • When to find threats • Playing chess • How to approach software • Tracking threats and assumptions • Customer/vendor • The API threat model • Reading: Chapter 7 When to Find Threats • Start at the beginning of your project – Create a model of what you’re building – Do a first pass for threats • Dig deep as you work through features – Think about how threats apply to your mitigations • Check your design & model matches as you get close to shipping Attackers Respond to Your Defenses Playing Chess • The ideal attacker will follow the road you defend – Ideal attackers are like spherical cows — they’re a useful model for some things • Real attackers will go around your defenses • Your defenses need to be broad and deep “Orders of Mitigation” Order Threat Mitigation 1st Window smashing Reinforced glass 2nd Window smashing Alarm 3rd Cut alarm wire Heartbeat signal 4th Fake heartbeat Cryptographic signal integrity By Example: • Thus window smashing is a first order th.