CS 231: Computer Security

Threat Analysis Using STRIDE

Partner or alone, as you wish. If you want help finding a partner, let me know.

In this assignment, you will perform a STRIDE-based analysis of a security scenario.

In a security certification course or something similar, there would doubtless be a strict set of rules for structuring and formatting your threat analysis. My pedagogical goals for this assignment, however, are not to turn you into certified threat modelers, but rather to get you into the habit of thinking in a reasonably structured way about threats. Though STRIDE does get you into some "thinking like an attacker", it is more focused on security at the system design stage rather than on reactive defense in the face of attacks. By analyzing your system's structure, you can try to build security into the system from the start.

The scenario


      ilovepets.co

Let's pretend you're going to create an online dating service specifically targeted at people who keep porcupines as pets. (I'm not going to comment on the viability of your business plan. Good luck with the venture capitalists.)

This service will consist of:

What to hand in

Include in your list as many realistic threats as you can think of, with at least one or two in each STRIDE category.

Have fun!