Topic > Stride: A useful tool for classifying threats

STRIDE is an acronym for a threat visualization system started by Microsoft. Walk is also a memory aid for safety hazards and includes six unique classes. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay In my home internet connection (Xfinity) the STRIDE model is applied to identify threats. Spoofing: This is all about imagining or misdirecting clients or frameworks. Spoofing of my Internet connection can also occur in the IP address, DNS (referring to DNS reassociation), and ARP (address determination convention). To mitigate this issue, use DNSSEC, SSL, IPsec, or a mix of these to ensure you are connecting to the correct place. Tampering: Deliberately alters the gadget, causing extreme harm to clients. Altering networks should be possible when mocking or as in Wi -Fi we can influence everyone's packet to move through you. Playing with the topology of the system, i.e. arranging packets, influences it to experiment with an individual, adapting systems and modifying packets when it is not verified. To avoid this, the most widely recognized answer to these problems is SSL, with IP security (IPsec) developing plausibility. SSL and IPsec both address confidentiality and tampering and can help thwart mockery. Repudiation: It is only the revocation of a privilege or advantage. It uses the registry, which is limited. It records what data occurred between forms that don't capture a lot of data other than some private information that gets thwarted by someone and modifies the registry. Maintain adequate records to prevent and use digital signatures. Information disclosure: Information leakage Data disclosure in data streams: Keeping in mind the end goal of encoding over SSL, we require reading of the information sent. Regardless of whether we use encryption, you can infer information based on the length of the packets. Network monitoring takes advantage of the design of most systems to monitor activity. (Notably, most systems currently communicate packets, and each audience is required to decide whether the packet is important to them.) When systems are designed unexpectedly, there are several methods of attracting movement to or through the control station . Denial. of the service: makes the network/gadget inaccessible to clients. It seems like my internet connection is clogged up and the network is flooded. The mitigation strategy involves the search for expendable resources. Work to ensure that attackers' resource usage is equal to or greater than that of my network. Elevation of privilege: Limit access to resources, administrations and activities such that any possible misuse and investigation enters the protection from increased benefits and no longer centrally. Please note: this is just an example. Get a custom paper from our expert writers now. Get a Custom Essay Problems where information is handled as code are normal. As data passes through the layers, what is corrupted and what is unaltered can be lost. For example, XSS attacks exploit HTML's open interweaving of code and information, and common memory corruption attacks occur with simple static languages. Therefore, proper tools and safe language are used as mitigation techniques to prevent these kinds of issues in my internet connection.