subject

In this assignment, you will use the Microsoft Threat Modeling Tool (TMT-2016). You are a security analysts at a large university. Your CIO has asked you to draft a threat model for the university Single Sign-On (SSO) system. You are to do this in the Microsoft Threat Modeling tool. The SSO system is used by Faculty, Administration, and Students to access the following University systems:
System Faculty Admin Students
Email Y Y Y
BlackBoard Y Y Y
Finance N Y Y *
Curriculum Development Y Y N
*(To pay tuition)
Given Assumptions:
Different roles require different permissions. (For example, a faculty member needs to see all student grades but a student should only see their own grade.)
Faculty and administrative staff have access to the applications from both internal workstations and remote systems using a VPN connection; students will not be using a VPN for their remote access, but must use an encrypted channel (SSL/TLS) – you can decide how this is implemented
You can create some of your own additional assumptions, as long as they are fully explained
Further Assignment instructions:
The Microsoft Threat Modeling Tool (TMT-2016) should be downloaded and installed on your own computer. File is linked below. If you are using a Mac computer, you will need to create a VM running Windows 8.1 or 10 to install TMT-2016.
Your model should cover the entire STRIDE model (which is the default analysis method in TMT-2016) – you need to explain and address all six types/categories of threats.
Within the completed threat model, you must show mitigations (with justifications) for at least 20% of the identified threats.
The data flow diagram created in TMT-2016 should show all necessary elements/components, including Trust Boundaries, with appropriate data flow connections – be sure to modify the Attributes within the Element Properties to include security settings that will reduce the risks/threats. (Take advantage of the Overview and Example of using TM-2016 in the reference documents below – it takes you through the necessary steps.)

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 20:20
Wireless communications is likely to be viewed as an essential part of an enterprise network infrastructure when: select one: a. mobile communication is needed b. communication facilities must be installed at low initial cost c. communication must take place in a hostile or difficult terrain that makes wired communication difficult or impossible d. the same information must be broadcast to many locations
Answers: 1
question
Computers and Technology, 22.06.2019 01:00
What can you find the under the privacy policy section of a shopping website?
Answers: 1
question
Computers and Technology, 22.06.2019 18:30
Which of the following commands is more recommended while creating a bot?
Answers: 1
question
Computers and Technology, 23.06.2019 03:30
Hashtags serve to identify the topic of a given tweet true false
Answers: 2
You know the right answer?
In this assignment, you will use the Microsoft Threat Modeling Tool (TMT-2016). You are a security...
Questions
question
Mathematics, 04.04.2021 09:20
question
English, 04.04.2021 09:20
question
Mathematics, 04.04.2021 09:20
question
Mathematics, 04.04.2021 09:20
question
World Languages, 04.04.2021 09:20
question
Mathematics, 04.04.2021 09:20
question
Computers and Technology, 04.04.2021 09:20
Questions on the website: 13722362