YoVDO

Threat Modeling: Denial of Service and Elevation of Privilege

Offered By: LinkedIn Learning

Tags

Network Security Courses Threat Modeling Courses

Course Description

Overview

This final installment of the Threat Modeling series covering the STRIDE framework explains denial-of-service and elevation-of-privilege attacks.

Syllabus

Introduction
  • Let me interrupt you
  • STRIDE and the four question framework
1. DoS Targets
  • DoS in context
  • Attackers fill networks
  • How attackers redline your CPU
  • How attackers fill storage
  • How attackers spend your budget
  • How attackers drain your battery
2. Properties of DoS Attacks
  • Persistence and transience of DoS
  • Naïve to clever: Understanding DoS
  • Amplified or native: Two modes of DoS
3. DoS in Various Technologies
  • Mobile and IoT denial of service
  • Cloud denial of service
4. DoS Defenses
  • Designing for resilience
  • Quantity as a defense
5. EOP
  • What is elevation of privilege?
  • Input corrupts
  • Main forms of corrupt input
6. EOP Defenses
  • Ways to defend against EOP
  • Validation to defend against elevation
  • Validate for purpose to prevent elevations
  • Validation not sanitization for defense
  • Attenuation in defense
  • Memory safety as a defensive tool
  • Stack canaries to protect your code
  • Sandboxes and isolation protect your environment
  • Bolt-on or built-in defenses
Conclusion
  • Making great strides

Taught by

Adam Shostack

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity