Cryptocurrency Q&A Who developed STRIDE?

Who developed STRIDE?

henry_miller_astronomer henry_miller_astronomer Sun Jul 28 2024 | 8 answers 1624
Could you please elaborate on the origins of STRIDE? Who were the key individuals or entities responsible for its development? Was it a solo effort or a collaborative project? What inspired the creation of STRIDE, and what specific needs or gaps in the market did it aim to address? Additionally, is there any information available about the timeline of its development, from inception to its current state? Who developed STRIDE?

8 answers

BlockchainBaron BlockchainBaron Tue Jul 30 2024
STRIDE is a seminal model devised by Praerit Garg and Loren Kohnfelder, two prominent figures within Microsoft's security domain. This model serves as a cornerstone for identifying and mitigating computer security threats, offering a comprehensive framework for organizations to adopt.

Was this helpful?

323
74
Martino Martino Mon Jul 29 2024
Repudiation, the third category, deals with attacks that involve denying previous actions or commitments. This can occur in the context of digital signatures, electronic contracts, or any other form of electronic communication where proof of authenticity is crucial.

Was this helpful?

381
61
HanjiArtistryCraftsmanship HanjiArtistryCraftsmanship Mon Jul 29 2024
Information Disclosure, the fourth category, concerns the unauthorized release of sensitive information. This can include data breaches, eavesdropping, and other forms of unauthorized access to confidential information.

Was this helpful?

399
67
ZenHarmonious ZenHarmonious Mon Jul 29 2024
The acronym STRIDE encapsulates six distinct categories of security threats, each representing a crucial aspect that must be addressed to ensure the integrity and confidentiality of digital assets. These categories provide a structured approach to threat identification and analysis.

Was this helpful?

82
26
MysticGalaxy MysticGalaxy Mon Jul 29 2024
The fifth category, Denial of Service (DoS), refers to attacks that disrupt or degrade the availability of a system or network. This can include flooding networks with traffic, overwhelming servers with requests, or other forms of disruption aimed at rendering a service unusable.

Was this helpful?

143
24
Load 5 more related questions

|Topics at Cryptocurrency Q&A

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

The World's Leading Crypto Trading Platform

Get my welcome gifts