Context Diagram
Most of the organization around the world are using information system and information technology in order to make their business processes faster, so that, they are able to enhance and improve their quality of service towards their end – users (Demidov, Zegzhda & Kalinin 2018). Both the information technology and information system use sensitive data and information from the end – users, in order to function properly. Here, Peters Excellent Packers is a meat packing and delivery organization, who have their own website, from where they are able to take in the orders placed by their customers. The organization have their own Proprietary Software Application, which was developed in the later 90s. This software application is being used within the organization in order to conduct the tasks which are related to accounting, inventory management and filing income tax returns.
In this report, the threat analysis will be conducted with the help of STRIDE categorization. The threat analysis will help in identifying the various kinds of threats and attacks which are launched by the cyber criminals, in order to, disrupt the organizational functions of a company (Al Asif et al., 2021). The main aim or purpose behind launching cyber security threats and attacks is to extract all the necessary data and information which are stored in the storage space of the organization.
Figure 1 – Context Diagram
(Source – Created by Author)
The above image displays the context diagram of the business processes which are involved within the organization, that is, Peters Excellent Packers. First, the client would be using the website of the organization to place an order. The client would need to have a successful transaction from the bank in order to place the order from the website. Once the order has been placed, the client would receive a confirmation of the order through email. After that, the order will be reviewed by the administrator and will send the order information to the inventory. In the inventory, the order will be processed and shipped using the delivery information, which has been provided by the client earlier (Al-Mhiqani et al., 2018). Using the delivery address of the client, the organization will deliver the order within the deadline.
Figure 1 – Data Flow Diagram
(Source – Created by Author)
The above image displays the data flow diagram, of the whole process which is being conducted at Peters Excellent Packers. The organization have their own website. Through the website, the end – users are able to place their orders (AbuEmera, ElZouka & Saad, 2022). In order to place an order through the website, the end – user would need to first create an account. The end – user would need to provide their personal details, such as, name, address, email address, contact information, date of birth, delivery address with zip code. Once the above details have been provided, the account of the end – user will be created (De Souza et al., 2022). Through the account, the client would be able to browse through the various kinds of products which the organization has. Once the client has selected the product, they wish to order, the end – user would lead to the banking portal, where they need to provide the payment. Once the payment has been successful, the order will be placed. The information of the order will get stored in the database of the organization. Using the order information data, the organization would be able to validate the order, that has been placed. Using the same information, the order will be processed from the inventory. The inventory system, will direct the order to be delivered. The deliver order process will take the customer delivery address from the client profile and send a notification to the end – user through email address, that their order is being shipped and will soon be delivered. Once the order has been delivered, the end – user will also receive the invoice of the order.
Data Flow Diagram
Threats |
Description |
Ransomware |
Ransomware attack is one of the most common types of attack which is being used by cyber criminals around the world. In this type of attack, the cyber criminals, sends links of malicious website to the employees. Once the employees of the organization click on those links, a malicious software application gets installed in their computer system (Demidov, Zegzhda & Kalinin, 2018). The cyber criminals are able to remotely use the software application. Using this software application, the cyber criminals, steals all the data and information and then locks the computer system with an encryption. Next, they demand a ransom from the organization, after which they would decrypt the computer system and servers. |
Phishing |
Phishing is a social engineering method, through which the cyber criminals gain access to the credentials of an employee. In this type of attack, the cyber criminals send an email to the employees which contains a link (Fitriya, Hakim & Abozied, 2020). When the employee clicks on the link, they are redirected to a website, where they are asked to enter their information along with the credentials, in order to get their hands on a lucrative offer. When they submit the details, it gets directly sent to the hackers and intruders. Using those details, the hackers and intruders logs into the organizational website and gets exposed to all the sensitive information. |
Malware |
Malware is a type of malicious software application which is designed and developed by the cyber criminals, to disrupt the functionalities of an organization. These malicious software application gets installed into the computer system of an employee, when they access websites, which are not secure. |
In SQL Injection attack, the cyber criminals use various types of tools and software application, in order to access the database and server of the organization which are linked through the website. The website which is being used by the organization is not protected with SSH and digital certificate (Honkaranta, Leppänen & Costin, 2021). Due to this reason, it becomes easier for the cyber criminals to access the tables present within the database and then extract all the sensitive information. |
|
Denial of Service |
Every server has their own capacity to handle the service requests sent by the clients. In denial-of-service attack, the cyber criminals use a range of computer system to send large number of service request to the server, to a point that the server shuts down. |
Man in the Middle Attack |
As the name suggests, in this attack, the cyber criminals eavesdrop into the organizational network to sniff out the sensitive information which are being transferred between two computer system which are connected within the organizational network. |
Brute Force Attack |
Brute force attack is generally launched towards files and folders, within the server. Here, a list of passwords is used to a point that, the cyber criminals are able to get the correct password and get inside the server. |
Cross – site scripting |
In this attack, malicious scripts are sent through website, which make changes in the server of the organization, so that, the hackers are able to gain access to the data and information. |
Zero Day Exploit |
When a new exploit has been discovered into a network connection, zero day exploit is conducted to extract the sensitive information. |
Rootkits |
Rootkits are small pieces of source code, which are present within legitimate software application, through which the cyber criminal would be able to remotely access the computer system of the employee. |
Ransomware assault is one of the foremost common sorts of assault which is being utilized by cyber criminals around the world. In this sort of assault, the cyber criminals, sends joins of malevolent site to the workers. Once the workers of the organization press on those joins, a malevolent program application gets introduced in their computer framework (Lykou, Anagnostopoulou & Gritzalis, 2018). The cyber criminals are able to remotely utilize the program application. Utilizing this program application, the cyber criminals, takes all the data and data and after that locks the computer framework with an encryption. Another, they request a deliver from the organization, after which they would decode the computer framework and servers.
Phishing could be a social building strategy, through which the cyber criminals pick up get to the qualifications of a worker. In this sort of assault, the cyber criminals send an e-mail to the workers which contains a connect. When the worker clicks on the link, they are diverted to an online, site where they are inquired to enter their data beside the qualifications, in arrange to induce their hands on a profitable offer (Straub, 2020). When they yield the points of interest, it gets specifically sent to the programmers and interlopers. Utilizing those points of interest, the programmers and intruders logs into the organizational site and gets uncovered to all the sensitive data.
In SQL Infusion assault, the cyber offenders utilize different sorts of apparatuses and computer program application, in arrange to get to the database and server of the organization which are connected through the site. The site which is being utilized by the organization is not ensured with SSH and computerized certificate. Due to this reason, it gets to be simpler for the cyber criminals to get to the tables display within the database and after that extricate all the sensitive data.
Threats |
Spoofing Identity (S) |
Tampering with data (T) |
Repudiation (R) |
Information Disclosure (I) |
Denial of Service (D) |
Elevation of Privilege (E) |
Ransomware |
||||||
Phishing |
||||||
Malware |
||||||
SQL Injection |
||||||
Denial of Service |
||||||
Man in the Middle Attack |
||||||
Brute Force Attack |
||||||
Cross – site scripting |
||||||
Zero Day Exploit |
||||||
Rootkits |
Conclusion
In this report, the threat investigation has been conducted with the assistance of STRIDE categorization. The threat investigation will offer assistance in distinguishing the different sorts of cyber security threats and assaults which are propelled by the cyber criminals, in arrange to, disturb the organizational functions of a company. The most point or reason behind propelling cyber security dangers and assaults is to extricate all the necessary information and data which are put away within the capacity space of the organization.
References
AbuEmera, E. A., ElZouka, H. A., & Saad, A. A. (2022, January). Security Framework for Identifying threats in Smart Manufacturing Systems Using STRIDE Approach. In 2022 2nd International Conference on Consumer Electronics and Computer Engineering (ICCECE) (pp. 605-612). IEEE.
Al Asif, M. R., Hasan, K. F., Islam, M. Z., & Khondoker, R. (2021, December). STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems. In 2021 3rd International Conference on Sustainable Technologies for Industry 4.0 (STI) (pp. 1-6). IEEE.
Al-Mhiqani, M. N., Ahmad, R., Yassin, W., Hassan, A., Abidin, Z. Z., Ali, N. S., & Abdulkareem, K. H. (2018). Cyber-security incidents: a review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Appl, (1), 499-508.
De Souza, N. P., César, C. D. A. C., de Melo Bezerra, J., & Hirata, C. M. (2020). Extending STPA with STRIDE to identify cybersecurity loss scenarios. Journal of Information Security and Applications, 55, 102620.
Demidov, R. A., Zegzhda, P. D., & Kalinin, M. O. (2018). Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model. Automatic Control and Computer Sciences, 52(8), 971-976.
Fitriya, G., Hakim, A. R., & Abozied, M. A. H. (2020, October). Capture The Flag Simulation Based on STRIDE Threat Model. In 2020 International Workshop on Big Data and Information Security (IWBIS) (pp. 145-152). IEEE.
Honkaranta, A., Leppänen, T., & Costin, A. (2021, May). Towards practical cybersecurity mapping of stride and cwe—a multi-perspective approach. In 2021 29th Conference of Open Innovations Association (FRUCT) (pp. 150-159). IEEE.
Lykou, G., Anagnostopoulou, A., & Gritzalis, D. (2018). Smart airport cybersecurity: Threat mitigation and cyber resilience controls. Sensors, 19(1), 19.
Straub, J. (2020, November). Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks. In 2020 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 148-153). IEEE.
Wang, Y., Wang, Y., Qin, H., Ji, H., Zhang, Y., & Wang, J. (2021). A Systematic Risk Assessment Framework of Automotive Cybersecurity. Automotive Innovation, 4(3), 253-261.
Wang, Z., Sun, L., & Zhu, H. (2020). Defining social engineering in cybersecurity. IEEE Access, 8, 85094-85115.
Yarovenko, H. M., Kuzmenko, O. V., & Stumpo, M. (2020). Strategy for Determining Country Ranking by Level of Cybersecurity.