A percentage of your grade is based on your posts on the Discussion Boards. You must post at least three times. One post should be your response to the questions posed in the discussion board, should be a minimum of 300 words, and should be posted no later than Thursday to give peers an opportunity to reply. The other post should be a thoughtful response to another student’s post, and should be a minimum of 100 words. In addition to the questions below, feel free to talk about any personal experience, thoughts, or ideas that are related to the discussion.
- Pick three STRIDE threats and explain tactics used to mitigate them. You can use some examples from recent attacks or from your professional experience.
Explanation & Answer
hello, kindly find the attached completed work. Thank You.
Discussion Question: Pick three STRIDE threats and explain tactics used to mitigate them.
Thesis statement: The essay discusses on three stride threats and explains potential tactics used
to mitigate the effects of an attack.
Tempering with data attack.
Denial of service attack.
Experience of STRIDE attack
Running head: DATA SECURITY THREATS AND MITIGATION
Stride Threats and Mitigations
Institution of Affiliation
SECURITY THREATS AND MITIGATION
Quiz. Pick three STRIDE threats and explain tactics used to mitigate them.
Stride also referred to as threat modeling is an approach used to intelligently analyze and
identify security thr4eats that are associated with a certain system. The major three strides include
spoofing, denial of service and tampering with data. The three types of threats can be viewed in
different viewpoints which include; from an attacker's viewpoint and the systems view. Stride
threats have long term and devastating effects on the affected systems. Due to this aspect, there is
a constant need to mitigate the effects. The essay discusses three stride threats and explains