The threat categories are:
- Spoofing of user identity
- Information disclosure (privacy breach or data leak)
- Denial of service (D.o.S)
- Elevation of privilege
The STRIDE was initially created as part of the process of threat modelling. STRIDE is a model of threats, used to help reason and find threats to a system. It is used in conjunction with a model of the target system that can be constructed in parallel. This includes a full breakdown of processes, data stores, data flows and trust boundaries.
Today it is often used by security experts to help answer the question "what can go wrong in this system we're working on?"
- Attack tree – another approach to security threat modeling, stemming from dependency analysis
- Cyber security and countermeasure
- DREAD (risk assessment model) – another mnemonic for security threats
- Shostack, Adam. ""The Threats To Our Products"". Microsoft SDL Blog. Microsoft. Retrieved 18 August 2018.
- Kohnfelder, Loren; Garg, Praerit (April 1, 1999). "The threats to our products". Microsoft Interface. Retrieved 18 August 2018.
- "The STRIDE Threat Model". Microsoft. Microsoft.
- Shostack (2014). Threat Modeling: Designing for Security. Wiley. pp. 61–64. ISBN 978-1118809990.
|This computer science article is a stub. You can help Wikipedia by expanding it.|