Thank you for visiting Microsoft s STRIDE threat assessment framework uses six categories for threats Spoofing Tampering Repudiation Information Disclosure Denial of Service and Elevation of Privilege If a. This page is designed to guide you through key points and clear explanations related to the topic at hand. We aim to make your learning experience smooth, insightful, and informative. Dive in and discover the answers you're looking for!

Microsoft's STRIDE threat assessment framework uses six categories for threats: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. If a penetration tester is able to modify audit logs, what STRIDE categories best describe this issue?

A. Tampering and information disclosure
B. Elevation of privilege and tampering
C. Repudiation and denial of service
D. Repudiation and tampering

Answer :

Final answer:

The best STRIDE categories that describe the issue of a penetration tester modifying audit logs are Tampering and Repudiation.

Explanation:

Microsoft's STRIDE is a threat modeling framework designed to help identify potential security threats in software applications. STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Each element of STRIDE represents a different category of security threat that can impact the security of a system. The framework is commonly used during the early stages of the software development lifecycle to systematically analyze and address potential security vulnerabilities.

The best STRIDE categories that describe the issue of a penetration tester modifying audit logs are Tampering and Repudiation. When the penetration tester modifies audit logs, they are tampering with the system by altering the recorded data. This action also leads to repudiation, as the attacker can deny their involvement or actions by manipulating the logs.

Thank you for reading the article Microsoft s STRIDE threat assessment framework uses six categories for threats Spoofing Tampering Repudiation Information Disclosure Denial of Service and Elevation of Privilege If a. We hope the information provided is useful and helps you understand this topic better. Feel free to explore more helpful content on our website!

Rewritten by : Jeany