UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

threat modeling

#Q1. You are a security analyst at an organization that runs several web applications. Your CIO is interested in using threat modeling as part of the software development lifecycle. Provide her an overview of threat modeling and the value it would provide to your company - you need to choose between an asset/risk-based or threat/security-based approach. As part of your overview include a detailed explanation of the appropriate threat model for your approach (e.g., PASTA or STRIDE or another standardized methodology), which should address the different objectives the model attempts to achieve, and provide two potential mitigations for each threat/attack scenario. [75 points] You can make any assumptions you want about the web application, just make sure you explain them in the essay. Avoid any examples that might be in the textbook. #Q2. Describe an attack tree and what it is used for. Provide an example attack tree on how you would cheat on this Final exam. (Do not cheat on this exam or test your attack tree. This is a thought exercise only). [25 points] [Special Note for Q2: You do not need all three basic components of an essay for this response, as long as you provide a thorough/complete descriiption of an attack tree.]

Ready to Score Higher Grades?