O'Reilly logo

Privacy What Developers and IT Professionals Should Know by J. C. Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data Integrity

Related to Tampering in the STRIDE model for performing threat-modeling analyses:

  • Do you ensure that all data is collected before using it?

  • Do you have a way to determine if the data is valid or out of date?

  • Are protections in place to prevent tampering?

  • Do you have a data retention/deletion policy in place for each data store?

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required