Summary
You’ve now covered the threat types described on the cards from the first suit, Spoofing, in the Elevation of Privilege card deck, with the addition of one card from the T.R.I.M. extension for the game. These threats detailed flaws relating to both encryption in transit and encryption at rest, as well as flaws relating to authentication and password security and flaws relating to addressing.
Having a greater awareness of the threats in this category and how to mitigate them should help you to design more secure software and enable you to recognize these and similar flaws when threat modeling.
In the next chapter, we will cover the second S.T.R.I.D.E. category of threats, Tampering.