Communicate about the security design of their systems

Assignment Help Management Information Sys
Reference no: EM131863216

Elevation of Privilege (EOP) Game

Threat Modeling Is a Core Element of the Microsoft Security Development Life cycle (SDL). As part of the design phase of the SDL, threat modeling allows software architects to identify and mitigate potential security issues early, when they are relatively easy and cost-effective to resolve.

1) Communicate about the security design of their systems

2) Analyze those designs for potential security issues using a proven methodology

3) Suggest and manage mitigations for security issues

Elevation of Privilege (EoP) Card Game:-Elevation of Privilege (EoP) is the easy way to get started threat modeling, which is a core component of the design phase in the Microsoft Security Development Life cycle(SDL).

TheEoP card game helps clarify the details of threat modeling and examines possible threats to software and computer systems.The EoP game focuses on the following threats:

Spoofing

Tampering

Repudiation

Information Disclosure

Denial of Service

Elevation of Privilege

EoP uses a simple point system that allows you to challenge other developers and become your opponent's biggest threat.

1)Spoofing (S):-SpooFng (S) is the First suit of threats in the STRIDE threat enumeration.Spoofing describes any threat that allows an attacker (or accidentally causes a user) to pretend to be someone or something else. Accordingly, the characters on the cards are masked individuals wearing crowns - unknown attackers, pretending to be royalty.

2)Tampering (T):-Tampering is the second suit of threats in the STRIDE threat enumeration. Tampering describes any threat that allows an attacker (or accidentally causes a user) to alter or destroy data which the application has not allowed them to. Accordingly, the characters on the cards are green gremlins whose open mouths and sharp teeth could indicate either shouting or a desire to eat.

3)Repudiation (R):- Repudiation Users may dispute transactions if there is insufficient auditing or record keeping of their activity. For example, if a user says, "But I didn't transfer any money to this external account!", and you cannot track his/her activities through the application, then it is extremely likely that the transaction will have to be written off as a loss.

4)Information Disclosure (I):- Users are rightfully wary of submitting private details to a system. If it is possible for an attacker to publicly reveal user data at large, whether anonymously or as an authorized user, there will be an immediate loss of confidence and a substantial period of reputation loss. Therefore, applications must include strong controls to prevent user ID tampering and abuse, particularly if they use a single context to run the entire application.

5)Denial of Service (D):- Application designers should be aware that their applications may be subject to a denial of service attack. Therefore, the use of expensive resources such as large files, complex calculations, heavy-duty searches, or long queries should be reserved for authenticated and authorized users, and not available to anonymous users.

6)Elevation of Privilege (E):- If an application provides distinct user and administrative roles, then it is vital to ensure that the user cannot elevate his/her role to a higher privilege one. In particular, simply not displaying privileged role links is insufficient. Instead, all actions should be gated through an authorization matrix, to ensure that only the permitted roles can access privileged functionality.

The Game consists of 84 Cards, 6suits, each based on letter of STRIDE:2-10, ACE, KING, QUEEN, JACK. High Card takes the trick unless someone has EOP cardEOP Cards trump all suits and takes the trick. I have selected the card 'Q' from spoofing. Card 'Q' is an attacker could go after the way credentials are updated or recovered (account recovery doesn't require disclosing the old password).

Elevation of Privilege act as proofs that there is interesting work to be done in helping non-experts approach security.

Reference no: EM131863216

Questions Cloud

Good job descriptions : When looking at job listings, what about them makes them good job descriptions and what is important that they not leave out?
Emergency planning and management : In relation to Emergency Planning and Management, I-78 is an interstate highway that goes through many municipalities and counties
Compare the slas in terms of two other criteria : Does each vendor count both scheduled down- time and planned downtime toward the SLA uptime percent?Compare the SLAs in terms of two other criteria.
Good record-keeping system : Why is it as important to have a good record-keeping system for a small business, as it is for a corporation?
Communicate about the security design of their systems : Application designers should be aware that their applications may be subject to a denial of service attack.
The pros and cons of continuing with the current policy : Discuss the pros and cons of continuing with the current policy of a peg to the US dollar.
Consequences regarding employee rights : Question: What are some of the benefits or consequences regarding employee rights.
Skills exhibited by an effective manager : Identify your particular areas of strength and discuss opportunities for your own development as a manager.
Manufacturer of overhead conveyor trolleys : Frost. Inc. is a manufacturer of overhead conveyor trolleys, used primarily in the auto industry. With sales of $20 million, Frost is located in Grand Rapids.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analysis of the process variability

Converging technologies - An analysis of the process variability based upon your understanding of the process and any data collected

  Describe the five major challenges to systems development

Describe the five major challenges to systems development

  Description of the company you researched

In this web research assignment, you will research a company (Walmart or Dell) that uses supply chain management (SCM) and look at how their organizational profitability is affected by it. A description of the company you researched

  Comparing individual company leaderswith respect to global

comparing individual company leaderswith respect to global companies information technology strives to eliminate time

  Explore some basic concepts regarding the financial concerns

Explore some basic concepts regarding the financial concerns of the CIO. I have a number of very short headlines from the IT consulting firm, Apptio.

  Discuss the concept of progressive discipline

Discuss the concept of progressive discipline and the importance of effective termination procedures.

  The five competitive forces that shape strategy

Summarize the article - "The Five Competitive Forces That Shape Strategy". Concentrate on the section of the article that discusses the Five Forces.

  Analyze internet security issues-available countermeasures

Your task is to identify the fundamental concepts of network security and security policy according to various viewpoints and try to systematize them in a succinct and yet comprehensive contribution. You may discuss typical attacks and how they af..

  Examine the impact to the it support personnel

Evaluate the ways that SaaS, PaaS, and IaaS are used to reduce Total Cost of Ownership (TCO) and increase Return on Investment (ROI).

  Recommend the superior technology and explain your rationale

Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale.

  Healthcare technologydefine edischarge and its impact on

healthcare technologydefine edischarge and its impact on patient care management by conducting a costs benefit analysis

  Create an object-oriented model

Design a query that will allow the finance department to determine the commissions paid to specific employees of the sales department.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd