Threat Modeling: Denial of Service and Elevation of Privilege
Offered By: LinkedIn Learning
Course Description
Overview
This final installment of the Threat Modeling series covering the STRIDE framework explains denial-of-service and elevation-of-privilege attacks.
Syllabus
Introduction
- Let me interrupt you
- STRIDE and the four question framework
- DoS in context
- Attackers fill networks
- How attackers redline your CPU
- How attackers fill storage
- How attackers spend your budget
- How attackers drain your battery
- Persistence and transience of DoS
- Naïve to clever: Understanding DoS
- Amplified or native: Two modes of DoS
- Mobile and IoT denial of service
- Cloud denial of service
- Designing for resilience
- Quantity as a defense
- What is elevation of privilege?
- Input corrupts
- Main forms of corrupt input
- Ways to defend against EOP
- Validation to defend against elevation
- Validate for purpose to prevent elevations
- Validation not sanitization for defense
- Attenuation in defense
- Memory safety as a defensive tool
- Stack canaries to protect your code
- Sandboxes and isolation protect your environment
- Bolt-on or built-in defenses
- Making great strides
Taught by
Adam Shostack
Related Courses
Менеджмент информационной безопасностиHigher School of Economics via Coursera Planning a Security Incident Response
Microsoft via edX Identifying Security Vulnerabilities
University of California, Davis via Coursera Secure Coding Practices
University of California, Davis via Coursera Atlas Security
MongoDB University