Reference no: EM132349757
Use the iNTegrity file integrity checking software
- Description in Appendix E
Provide a threat model for the proposed system
Identify AT LEAST three specific threats
- NOT threat types.
- One for data flow, one for data store, one for a process
Recommend at least two remediations per threat
Each group will write a paper
- Describe each threat
- At least two remediation recommendations for each threat
Research Paper Format
• Papers should follow this general outline:
- Introduction
- System description (elaborate on Figure E-6) and BRIEFLY describe iNTegrity
- Identified Threats (at least three) • Justification and explanation
• References
• Impact if not addressed
- Remediation recommendations
• At least two remediations per threat
- Conclusions