Designing secure code
nThe STRIDE Threat Model – categories:
nSpoofing identity – illegally accessing and then using another user’s authentication information.
nTampering with data – malicious modification of data like unauthorized changes made to persistent data or data as it flows between two computers over an open network, such as Internet
n