Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

How to use stride threat model

20/10/2021 Client: muhammad11 Deadline: 2 Day

Project: Threat Modeling with STRIDE

Purpose

This project provides an opportunity to apply the concepts of using a Threat Modeling methodology, STRIDE, against a fictitious Healthcare organization’s application.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a threat model as a part of risk management for an organization.

Required Source Information and Tools

Web References: https://www.webtrends.com/blog/2015/04/threat-modeling-with-stride/

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation, identifying the threats and vulnerabilities facing your organization.

Submission Requirements

All project submissions should follow this format:

· Format: Microsoft Word or compatible

· Font: Arial, 10-point, double-space

· Citation Style: APA style. Any work copied from Internet or other sources will automatically receive a 0.

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics over the Internet. Information transmitted over this network include patient health information, xrays, bloodwork, and diagnoses.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. The Web portal is hosted on a Windows IIS Web server. Data from the portal is stored in an Oracle database on a Unix server.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites. You have already run a Nessus scan and used nmap to determine vulnerabilities.

Information Technology Infrastructure Overview

Health Network operates in a production data center that provide high availability across the company’s products. The data center host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. Employees are allowed to work from home, using their company-issued laptops. There is also a wireless network available at work.

Project

For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:

1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions: 5 points.

a. Who is likely to attack the system?

b. What are they likely to attack to accomplish their goal?

2. A section titled Asset Viewpoint discussing the organization’s assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table). 15 points

a. What is the asset?

b. What value does the asset have to the organization?

c. How might that asset be exploited by an attacker?

3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following: 60 points

a. Spoofing – address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.

b. Tampering – address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).

c. Repudiation – address where repudiation attacks might be possible in the organization.

d. Information disclosure – address where there may be the likelihood for a data breach in the organization’s assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.

e. Denial of Service – discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?

f. Elevation of Privilege – discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database - what would happen if the attacker was able to gain Administrator access to the database?).

4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified. This can be summarized using the table I’ve provided for you below for each of your threats. Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. – your textbook and other supplemental readings listed different organizational roles responsible for managing risk) 20 points.

Risk Mitigation Plan:

Asset

Threat

Impact

Recommended Security Control

Responsible Role

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Peter O.
A+GRADE HELPER
Writing Factory
Phd Writer
Top Class Results
Best Coursework Help
Writer Writer Name Offer Chat
Peter O.

ONLINE

Peter O.

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$17 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$23 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$30 Chat With Writer
Phd Writer

ONLINE

Phd Writer

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$17 Chat With Writer
Top Class Results

ONLINE

Top Class Results

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$31 Chat With Writer
Best Coursework Help

ONLINE

Best Coursework Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$33 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Assignment - How to convert db to amplitude - +61 3 8202 5207 - North american reggio emilia alliance - MIS DS 10. - Biomes and aquatic ecosystems - Perie process - Access & Community - A10 - Teenage scenarios of conflict - Old oregon wood store case study - Common holy days in jewish religious traditions worksheet - Sliding mode control matlab simulink - Organizational Change and Ethical-Legal Influences in Advanced Practice Nursing - Four elements of fitness programs issa - Mgt 3810 - Intentional Torts - PSY 1.2 - The dynaco manufacturing company produces - Two causes of the great depression - Soldier Pile and Lagging Wall Analysis – Simplified Method - Powerpoint presentation - Infrared thermometer best used for servsafe - Catholic church in australia timeline - Surfsea 3.3 m inflatable boat - Osha's use of incorporation by reference - Applying the 21 synectics steps - Assignment: Academic Success and Professional Development Plan Part 3: Strategies to Promote Academic Integrity and Professional Ethics - Paper on "A Comparative Analysis of Stored Procedures used in Oracle 12c versus Stored Procedures used in IBM DB2" - BUSI510 Week 6 Discussion - How to create a mock crime scene - Cpa exam content specification outline - Tia 606 color coding - Characteristics of fresh water habitat - Empty chair technique questions - What are the best ways for marketers to reach you to get you to try their products or services. Why is that effective? - Are macquarie bank capital notes 2 a good investment - Automatic brightness control in fluoroscopy - Discussion and response one - Threat of new entrants airline industry - Spss export to word - ORGAN THEORY DQ 4 - Loftus and palmer schema theory - Perfume network of san ysidro california cosmetics & original cologne - Irony in secrets by bernard - Born a crime figurative language - Research paper - Balanced chemical equation list - What is a first class lever - A first amendment junkie pdf - Kindler and collins piano - Download the file below - Calculate the efficiency of a kettle - 4 slides powerpoint - Issa specialist in fitness nutrition final exam answers - Applying classical conditioning worksheet answers - 8.3 mortgage application process answers - Week 5 - Assignment 5-1 - 4 gallons of paint are used to paint 25 chairs - Mass effect 3 dis - Discussion 3 - Project 1: Excel (Advanced Application Software) - Heifetz's and burns's approaches to leadership ethics have been criticized for - Shipley institute of living scale answers - Whatever happened to michael fay - Mangrove mountain yoga ashram - How Bitcoin is adopted and what recommendations you have to continue to support Bitcoin in a organization. - Stock market project - Australian medical terminology abbreviations - Crazy domains ssl certificate - How to become a member of the house of lords - The global community bank under terms - Verizon wireless value chain - Why people resist change in an organisation - Difference between agile and waterfall ppt - In exercise 6.1, how do you enable efs? - Reader response turnitin - Statistical symbols and definitions matching - Statement of work document - SOURCE ANALYSIS - Experiment 2 tracking chromosomal dna movement through mitosis - Ancestors hear my plea - Www measureup com portal - Chapter 8 interpreting histograms data analysis practice - Discussion -9 - Alumni giving case problem solution - Warehouse tenting at the port of miami - Brehm v eisner case brief - SWLB - Barn raising scene in witness - Epidemiology - 900 x 600 paving slabs jewsons - MBA 640 Conduct a Consumer Buying Behavior Study (Martha) - Microsoft virtual earth app - Week- 5 disscu-6 832 - "Slide Designs and Visual Aides" - Journal Assignment - Under Armour Marketing Plan: Product Identification and SWOT Analysis - Medical check up for confined space