Seriously addressing and correcting STRIDE threat is an important step in the threat modeling process. Specific steps or guidelines are outlined in chapter 8 to ensure authentication and privacy. Write a 300 word essay describing techniques used to authenticate and also ensure privacy when addressing threat modeling on your job. Include in this paper: Two examples of authentication process used. Two steps used to ensure privacy. .