Professional Documents
Culture Documents
Threat Modeling Framework
Threat Modeling Framework
STRIDE
Spoofing
pretending to be someone or something else
How to prevent Spoofing
Authentication verifies that users and systems are who they claim to be.
Non-repudiation ensures each action can be traced back to its origin by creating and
protecting security logs.