181k views
1 vote
Draw a Dataflow Diagram (DFD) for the tunestore application.

Use the STRIDE technique to identify threats. Identify at least 10 threats you think have the highest priority. The 10 threats should include all STRIDE types.

1 Answer

1 vote

Final answer:

This response provides a Dataflow Diagram (DFD) for the tunestore application and identifies ten high-priority threats using the STRIDE technique.

Step-by-step explanation:

Dataflow Diagram for the tunestore application:

To identify threats using the STRIDE technique, we consider the following categories:

  1. Spoofing: Unauthorized access to data or impersonation of users
  2. Tampering: Unauthorized modification of data or system resources
  3. Repudiation: Denying or disputing actions performed
  4. Information disclosure: Unauthorized exposure of sensitive information
  5. Denial of service: Disrupting or degrading the availability of services
  6. Elevation of privilege: Unauthorized escalation of user privileges

Here are ten threats with high priority for the tunestore application:

  1. Breaking into the server to steal customer data (Spoofing)
  2. Modifying the price of songs to decrease revenue (Tampering)
  3. Deleting purchase records to avoid repudiation (Repudiation)
  4. Exposing customer credit card details (Information disclosure)
  5. Launching a DDoS attack to take down the application (Denial of service)
  6. Gaining administrator-level access to the application (Elevation of privilege)
  7. Creating fake accounts to manipulate popularity rankings (Spoofing)
  8. Changing the song recommendations algorithm to favor certain artists (Tampering)
  9. Impersonating a customer to fraudulently obtain discounts (Spoofing)
  10. Intercepting and modifying song downloads (Tampering)

User Alexandru Dicu
by
7.4k points