Reference no: EM131372599
Consider the following case study.
MusicOnDemand is a new subscription-based service for on-demand Internet streaming audio media. There are three types of users for MusicOnDemand:
1. Standard users;
2. Premium users;
3. Maintainers.
Standard and Premium users are able to log in, renew their subscriptions, search and have access to the standard audio library. In addition, Premierusers have access to the latest release library. Maintainers are able to log in, add songs, modify user's subscriptions, search for any type of songs, and read the audit log involving users' activities.
An unregistered individual can obtain access to the system via an automatic procedure involving the payment of the subscription through the DBTI bank: such a procedure can be audited by maintainers.
The external dependencies are presented in Table 1.
ID
|
ID Description
|
1
|
The MusicOnDemand Web application runs on a Linux server running Apache
|
2
|
The database server is MySQL and it runs on a Linux server
|
3
|
The connection between the Web Server and the Database Server is over a TCP/IP network
|
4
|
The Web Server is behind a firewall
|
5
|
The Web Server access the back-end of the DBTI bank via a web service interface over HTTPs
|
Table 1: List of external dependencies
You are assigned to be part of the threat modelling team. You need to follow the main steps of the threat modelling process as presented in the course:
1. Decompose the application using data flow diagrams, system architecture diagrams, and a table describing the main components and users of the system;
2. Determine 6 serious threats to the system using the STRIDE model and threat trees: they must refer to distinct classes of the STRIDE model;
3. Rank the threats by decreasing risk using the DREAD model and tables of threats description for each threat identified;
4. Choose how to respond to each threat;
5. Choose techniques to mitigate the threats;
6. Choose the appropriate technologies for the identified techniques.
Any assumption not grounded on information presented in the given case study must be clearly marked in the report.
Attachment:- Assignment.zip
What determines the capacity for both bricks and clicks
: The Internet has drastically changed the way in which customers interact with businesses. Although the customer interface has changed, operations management remains a crucial element in the success of Internet retailing. What determines the capacity ..
|
Confidence interval for the proportion of executives
: If the survey consisted of a random sample of 40 executives, give a 95% confidence interval for the proportion of executives less willing to sacrifice their family lifestyle.
|
Confidence interval for the average increase
: The study found the average increase to be 60%. If this was based on a random sample of 22 international flights and the standard deviation of increase was 25%, give a 90% confidence interval for the average increase.
|
Identify the central concern in various regional security
: Identify the central concern or challenge in the various regional security organizations encountered thus far in the course, with regard to the likelihood of success or failure. Explain your reasons using examples from your readings.
|
Describing the main components and users of the system
: Decompose the application using data flow diagrams, system architecture diagrams, and a table describing the main components and users of the system
|
Confidence interval for the percentage of all traders
: If the test run of trading rooms using the new system revealed that 80% of the traders preferred the decimal system and the sample size was 200, give a 95% confidence interval for the percentage of all traders who will prefer the new system.
|
Building your own high performance subculture
: One of the most misunderstood and yet exciting research findings regarding culture concerns subcultures. Specifically, research has found that the cultural variance within companies is often as great or greater than that between companies. What are t..
|
Create the animal superclass in your version of the project
: You should be able to check this by having the old and new versions of the project open side by side, for instance, and making identical calls on Simulator objects in both, expecting identical outcomes.
|
Confidence interval for proportion of all business travelers
: Give a 95% confidence interval for the proportion of all business travelers who consider legroom the most important feature.
|