Perfect Essay Writing

Discuss at least one of the ways to test a threat mitigation.

Order ready-to-submit essays. No Plagiarism Guarantee!

Note:  All our papers are written from scratch by human writers to ensure authenticity and originality.

Task 1:

Verify your essay before you submit. Get an Official Turnitin Report for Just $8.99!

Check your paper with the same Turnitin report your professor uses. AI detection + similarity score without storing your work. Pay once, no subscription

Check My Assignment!

Discuss at least one of the ways to test a threat mitigation.(one page only with references and APA format,plagarism free)(reference file attached below)

Task 2:

Write a 3 pages paper.
Discuss the following:

1.  The process and skills required to test threat mitigations.

Your responses must be complete, detailed and in APA format,references and plagarism free.

**pls refer below attached file for reference.

ISOL 536 Security Architecture and Design

Threat Modeling Session 9a

“Check Your Work”

Agenda

• Testing software you make

• Testing software you acquire

• QA’ing your threat modeling work

• Reading: Chapter 10

Context

All testing

Security testing

Threat model- driven testing

Testing Software You Make

• All threats you find can be tested • In agile shops that rely on Test-Driven

Development (TDD), threat modeling is a great way to design tests – Two tests per threat

• One for no mitigation case • One that attempts to bypass mitigation

• Start with a test to execute the threat • Continue with tests that bypass mitigations (aka

2nd order attacks) • Automation vs manual

Penetration Testing

• Aka “ethical hacking,” “red teaming”

• Improve the security of your code by breaking it

• Differs from threat modeling

– Done late

– Hard to judge scope

– Sometimes “black box” where testers start without knowledge of system

Testing Software You Acquire

• Build a software model

– Use the documentation and actual software

– See if they include a threat model or security operations guide

• Look for threats

• Address the issues you find

Build a Software Model

• Components – Start with the binaries, databases, dependencies

– Some will likely merge into a single process for threat modeling purposes

• Trust boundaries – Account(s) used

– Sockets, RPC (data flow ends)

– Admin interfaces

• Look at platform changes on install

• Diagram as you find things

Look for Threats

• Use the model you’ve created

• This is similar to looking for threats in any other software

– You’re less familiar with it

– It may include relevant documentation

– (If not, what does that tell you?)

• Use STRIDE, CAPEC, attack trees, etc.

Address the Issues You Find

• Ask the creator to fix them – Be ready to discuss views of requirements, tradeoffs – Some backwards vendors will threaten you (this is a

red flag they don’t understand security) – Generally the least investment if the vendor will fix

them

• Look for an alternative – Easier if you TM early

• Mitigate yourself – Using operational security techniques from earlier

classes on “what to do about it”

QA’ing the Threat Modeling Process

• Another aspect of checking your work

• Check software model/reality conformance

• Check that each task and process is done

• Bug checking: Look at each TM bug

– Is it closed properly (fixed, not wontfix)?

– Is there a test case?

– Tags on bugs really helpful here

Recap

• Testing software you make

• Testing software you acquire

• Knowing when you’re done

SOURCE: WWW.ROYALRESEARCHERS.COM
Havent found the Essay You Want?
We Can Help
The Essay is Written From Scratch for You

🛒Place Your Order

ORDER AN ESSAY WRITTEN FROM SCRATCH at : https://royalresearchers.com/
PLACE YOUR ORDER
Share your love