subject

In this assignment, you will use the Microsoft Threat Modeling Tool (TMT-2016). You are a security analysts at a large university. Your CIO has asked you to draft a threat model for the university Single Sign-On (SSO) system. You are to do this in the Microsoft Threat Modeling tool. The SSO system is used by Faculty, Administration, and Students to access the following University systems:
System Faculty Admin Students
Email Y Y Y
BlackBoard Y Y Y
Finance N Y Y *
Curriculum Development Y Y N
*(To pay tuition)
Given Assumptions:
Different roles require different permissions. (For example, a faculty member needs to see all student grades but a student should only see their own grade.)
Faculty and administrative staff have access to the applications from both internal workstations and remote systems using a VPN connection; students will not be using a VPN for their remote access, but must use an encrypted channel (SSL/TLS) – you can decide how this is implemented
You can create some of your own additional assumptions, as long as they are fully explained
Further Assignment instructions:
The Microsoft Threat Modeling Tool (TMT-2016) should be downloaded and installed on your own computer. File is linked below. If you are using a Mac computer, you will need to create a VM running Windows 8.1 or 10 to install TMT-2016.
Your model should cover the entire STRIDE model (which is the default analysis method in TMT-2016) – you need to explain and address all six types/categories of threats.
Within the completed threat model, you must show mitigations (with justifications) for at least 20% of the identified threats.
The data flow diagram created in TMT-2016 should show all necessary elements/components, including Trust Boundaries, with appropriate data flow connections – be sure to modify the Attributes within the Element Properties to include security settings that will reduce the risks/threats. (Take advantage of the Overview and Example of using TM-2016 in the reference documents below – it takes you through the necessary steps.)

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 05:10
Suppose we have a byte addressable computer that has a 32-byte cache with 8 bytes per block. the memory address is 8 bits long. the system accesses memory addresses (in hex) in this exact order: 6e, b9, 17, e0, 4e, 4f, 50, 91, a8, ab, ad, 93, and 94. (a) assuming the cache is direct mapped, what memory addresses will be in cache block 2 after the last address has been accessed? (b) assuming the cache is direct mapped, what is the hit ratio for the entire memory reference sequence given, assuming the cache is initially empty? (c) assuming the cache is 2-way set associative with a lru replacement policy, what is the hit ratio?
Answers: 3
question
Computers and Technology, 22.06.2019 19:40
Solve the following javafx application: write a javafx application that analyzes a word. the user would type the word in a text field, and the application provides three buttons for the following: - one button, when clicked, displays the length of the word.- another button, when clicked, displays the number of vowels in the word.- another button, when clicked, displays the number of uppercase letters in the word(use the gridpane or hbox and vbox to organize the gui controls).
Answers: 1
question
Computers and Technology, 23.06.2019 00:30
Quic which one of the following is the most accurate definition of technology? a electronic tools that improve functionality b electronic tools that provide entertainment or practical value c any type of tool that serves a practical function d any type of tool that enhances communication
Answers: 1
question
Computers and Technology, 23.06.2019 02:00
Consider the following function main: int main() { int alpha[20]; int beta[20]; int matrix[10][4]; . . } a. write the definition of the function inputarray that prompts the user to input 20 numbers and stores the numbers into alpha. b. write the definition of the function doublearray that initializes the elements of beta to two times the corresponding elements in alpha. make sure that you prevent the function from modifying the elements of alpha. c. write the definition of the function copyalphabeta that stores alpha into the first five rows of matrix and beta into the last five rows of matrix. make sure that you prevent the function from modifying the elements of alpha and beta. d. write the definition of the function printarray that prints any onedimensional array of type int. print 15 elements per line. e. write a c11 program that tests the function main and the functions discussed in parts a through d. (add additional functions, such as printing a two-dimensional array, as needed.)
Answers: 3
You know the right answer?
In this assignment, you will use the Microsoft Threat Modeling Tool (TMT-2016). You are a security...
Questions