Identifying Techniques that Mitigate Threats
The following table lists some of the techniques you can use to mitigate the threats in the STRIDE model.
Threat type | Mitigation technique |
---|---|
Spoofing identity |
|
Tampering with data |
|
Repudiation |
|
Information disclosure |
|
Denial of service |
|
Elevation of privilege |
|
See Also
Choosing the Appropriate Technologies from the Identified Techniques
Copyright © 2005 Microsoft Corporation.
All rights reserved.