Use the iNTegrity file integrity checking software
– Description in Appendix E
- Provide a threat model for the proposed system
- Identify AT LEAST three specific threats
– NOT threat types!
– One for data flow, one for data store, one for a process - Recommend at least two remediations per threat
- Each group will write a paper
– Describe each threat
– At least two remediation recommendations for each threat
Research Paper Format
• Papers should follow this general outline:
- – Introduction
- – System description (elaborate on Figure E-6) and BRIEFLY describe iNTegrity
- – Identified Threats (at least three) • Justification and explanation
• References
• Impact if not addressed - – Remediation recommendations
• At least two remediations per threat - – Conclusions