IEEE/ICACT20220353 Slide.15        [Big Slide]       [YouTube] Oral Presentation
Lastly, I want to present a comprehensive remediation plan based on the threat from STRIDE analysis. The remediation plan is divided based on the four types: accept, mitigation, avoid, and transfer. In this analysis, we initiated mitigation approaches. This analysis shows that the majority of the threats are Spoofing, Tampering, and Denial Services. There is a broad understanding that Multi-Factor Authentication will improve against these types of attacks. Therefore, a mitigation approach will continue to defend against these types of attacks.

[Go to Next Slide]
Select Voice: