Comprehensive Review of Threat Analysis in Software Systems Using Stride Methodology
Main Article Content
Abstract
In the domain of cybersecurity, one of the most important facets is recognizing and diminishing possible hazards in order to secure information systems. The STRIDE methodology is a widely accepted approach to threat analysis that divides threats into six categories: denial of service, spoofing, tampering, repudiation, information disclosure, and privilege escalation. This review article offers a detailed study of the performance of the STRIDE approach as it is applied in the field of cloud computing, network security, software development and other areas. To enlarge and enhance the scope and precision of risk analysis, the appraisal also checks how the STRIDE technique cooperates with other threat modelling approaches such as attack tree and misuse instance. It also deals with the problems and limitations associated with the implementation of STRIDE, namely the lack of scalability and necessity of customised approaches in specific areas.