Seriously addressing and correcting STRIDE threat is an important step in the threat modeling process. Specific steps or guidelines are outlined in chapter 8 to ensure authentication and privacy.
Write a 350 word essay describing techniques used toauthenticate and also ensure privacy when addressing threat modeling on your job. Include in this paper:
Two examples of authentication process used.
Two steps used to ensure privacy.