1. Stride Project 2. Discussion about threat modelling with stride and risk management methodologies and tools?
REQUIREMENTS:
We use many different types of risk management methodologies and tools. A part of the process involves identifying the threats to our system, generally by attackers who would harm our systems and data (assets). I’ve included a project that walks you through a simple threat modeling exercise, using STRIDE, which you will apply using a scenario, to understand the basic process.
1. Research different sites and sources to understand what STRIDE is and how to apply it to the scenario I have provided in the attachment. I’ve also attached a document cached from WebTrends on the topic.
2. Read the attached Project description/scenario and create a report for your “boss” as required in the attachment.
Please find the attachments below.