Skip to main content

Table 2 Applying STRIDE threat modeling

From: Risk-driven security testing using risk analysis with threat modeling approach

Element

Spoofing

Tampering

Repudiation

Information disclosure

Denial of service

Elevation of privilege

Data Flow

 

X

 

X

X

 

Data Store

 

X

 

X

X

 

Process

X

X

X

X

X

X

Interactor

X

 

X

   
  1. X- Threats Covered.