Just another tech site


Security Concept


Data is available ONLY for those who are suposed to have access to it.
This can be accomplished by
– First, require strong authentication for any access to data.
– Second, use strict access controls.
– Third, ensure encryption of the data so that it cannot be intercepted, and cannot be accessed during transmission or transport.


Integrity as a concept means that there is resistance to alteration or substitution of data, and/or that such changes are detected and provable.


Data can be overwritten, deleted, or destroyed.


Authenticity address the issue of the sender or the generator of the data. How can we make sure that the sender is the correct one.

STRIDE Approach

STRIDE, an acronym for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege

Threat Security Property
Spoofing Authentication
Tampering Integrity
Repudiation Non-repudiation
Information disclosure Confidentiality
Denial of service Availability
Elevation of privilege Authorization


[1] http://msdn.microsoft.com/en-us/magazine/cc163519.aspx


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Tag Cloud

%d bloggers like this: