->

Threat Modeling: Tampering in Depth

Threat Modeling: Tampering in Depth

English | 32mins | Video 720p


Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a system—early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.

Topics include:

Tampering as part of STRIDE

How debuggers can be exploited by attackers

Effects of tampering on storage

Tampering with data flows

Physical tampering

Tampering with cloud services

Prevention and detection goals

 

HOMEPAGE

https://www.lynda.com/IT-tutorials/Threat-Modeling-Tampering-Depth/2810167-2.html

 

Threat Modeling: Tampering in Depth


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Solid   |  

Information
Members of Guests cannot leave comments.




rss