Brad Andrews, CEO, RBA Communications Gaining Your STRIDE – Applying S.T.R.I.D.E. to a system This session is a continuation of Part 1 and will briefly look at the components of the STRIDE model often used as a part of threat modeling. These are Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege. We will then seek to work to find out what threats Amazon.com might face using the diagram we developed in the previous session. This session will expect those present to be involved in raising potential risks. Other systems may also be covered if we have time remaining in the session. Use of Amazon.com is the only likely experience of most participants, but even that is not required. The goal is to work with something everyone can relate to, not to expose insider information for a specific company.