Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Threat Modeling: Tampering in Depth

Posted By: lucky_aut
Threat Modeling: Tampering in Depth

Threat Modeling: Tampering in Depth
Updated: August 26, 2024
Duration: 33m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 94 MB
Genre: eLearning | Language: English


Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a system—early on in a project's life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.

More Info