AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
The Stride Structure of Teing Tat Morling
So instead of taking a technical approach, letls go back to the fundamentals of security and take tai from thereand that's parly recommending yoand. So i'd use my threat modelling a mechanism called stride, which is boofing, tampering, repudiation, information disclosure, denial of service and elevation of privilege. I also wrote a perspective of how to secure cobenatis with those categories in mind in one of the books with nigela oh ye. And then you can have plugins like aldap provider, where you can say, i will se my edab credentials to authenticate myself to apia server.