6 hours 30 minutes
a common threat modelling technique that we use an I t. Particularly for looking at software development, is something called the Stride model, and stride stands for spoofing, tampering, repudiation, information, disclosure, denial of service and escalation of privilege.
So the idea is, if we're looking at developing an application or piece of software,
these are threats that are very commonly directed at exploiting software. So when we talk about spoofing, we're looking at impersonation, right? I'm pretending to be someone else.
Well, the mitigation for that is gonna be requiring strong authentication.
I don't just let you log in. As an administrator, I make you prove you're an administrator.
Tampering is modifying a modification, unauthorized modification. So we'll use things like message digests and hash is in order to limit the impact of tampering repudiation. So I love this. The opposite of repudiation is non repudiation.
But the idea about repudiation is
we want to make sure that a user can't dispute having sent a message nor the contents of that message. And if we can guarantee that we have non repudiation, one of the best ways that we get non repudiation is through digital signatures, and we'll talk about some of this mawr in greater depth as we move on.
All right. Information disclosure, Breach of confidentiality.
is a good solution,
denial of service, and we've probably heard of denial of service attacks. The goal with a denial of service attack really isn't
to steal data or to, ah, modify files. It really is just about availability. And the goal of a denial of service attack is to knock your system or server off line, too. Busy it with other bogus request so that it can't respond to legitimate risks.
It's all about availability.
So if availabilities the problem, you get high availability through redundancy, eliminating single points of failure, fault, tolerance. All right, and then the last is escalation of privilege.
I'm Kelly Hander. Han is a user. But if I can find a way to administrative rights to my account, then of course I can do a wide variety of actions. So requiring strong authentication and strong authorization are gonna be the ways that I bring in
and assurance against escalation of privilege.
So ultimately, these air control's in their very specific to software development, but it just follows along the lines. This is what I'm analyzing when I'm looking at risks associated with software.
And I want to find out where my lacking and ultimately we're gonna move into gap analysis next, which is exactly that. These were the things that I need to consider what controls are in place. And where will I be? Where do I want to go and how do I get there?
IoT Product Security
This course will focus on the fundamentals of how to set up a functioning IoT ...
8 CEU/CPE Hours Available
Certificate of Completion Offered
50 CISO Security Controls
Dr. Edward G. Amoroso, CEO of TAG Cyber and former CISO of AT&T, covers six ...