research and discuss the limitations associated with STRIDE

User Generated

grwnf07

Computer Science

Description

(a) research and discuss the limitations associated with STRIDE, research and discuss the limitations associated with attack trees and attack libraries. Please state your answer in a 1- 4 page paper in APA format. Include citations and sources in APA style.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: LIMITATIONS OF STRIDE, ATTACK LIBRARIES, AND ATTACK TREES1

Limitations of STRIDE, Attack Trees and Attack Libraries

Student’s Name
Instructor’s Name
Course
Date

LIMITATIONS OF STRIDE, ATTACK LIBRARIES, AND ATTACK TREES

2

In this revolutionized and technological age, smart people are using the power of
computers to rick havoc on the field of information and technology as well as data transfer. They
do so by coming up with newer and sophisticated ways of attacking systems. Just some few
years ago, there arose the problem of Denial of Service and recently in 2017, a newer version of
the same come into play known as Slow Denial of Service (Joanie, 2016). All these led to
Microsoft developing a threat analyzing program known as STRIDE which stands for Spoofing,
Tampering, Repudiation, Information disclosure, Denial of Service, and Elevation of Privilege.
STRIDE Threat Model came along with Attack Trees and Attack Libraries. This paper will
discuss the limitations associated with these three threat models.
According to Halkidis (2014), one of the major limitations of ...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags