Page 1 of 1

Carry out a STRIDE analysis for the system in the previous problem, and list the STRIDE analysis table. Based on the tab

Posted: Fri May 20, 2022 12:38 pm
by answerhappygod
Carry out a STRIDE analysis for the system in the previous
problem, and list the STRIDE analysis
table. Based on the table, identify three possible attacks to the
vehicle and mitigation methods for
each of them.

Now consider the goal of spoofing the identity of a user to get
access to the vehicle. Can you
develop an attack tree to list possible attack methods
systematically?