YoVDO

Threat Modeling: Repudiation in Depth

Offered By: LinkedIn Learning

Tags

Threat Intelligence Courses Artificial Intelligence Courses Cybersecurity Courses Cryptography Courses Risk Management Courses Blockchain Development Courses Identity Theft Courses Fraud Courses Deepfakes Courses

Course Description

Overview

Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.

Syllabus

Introduction
  • The threat of repudiation
  • Four-question framework
  • Repudiation as part of STRIDE
1. Technical Repudiation
  • Message repudiation
  • Operational repudiation
2. Fraud
  • Buyers and sellers
  • Intermediaries
  • Account takeover
3. Identity Theft
  • Identity theft and repudiation
  • Catfishing, deepfakes, and voice cloning
4. Attacks on Logs
  • Attacks on logs
  • Attacks via logs and response systems
5. Repudiation in Specific Technologies
  • Cloud
  • AI and machine learning
  • Crypto and blockchain
6. Defenses
  • Cryptographic defenses
  • Logs
  • Log analysis
  • Anti-fraud
Conclusion
  • Next steps

Taught by

Adam Shostack

Related Courses

Introduction to Innovation and Technology in Legal Services
University of Law via FutureLearn
AnĂ¡lise de oportunidade de Blockchain
INSEAD via Coursera
Applications of Blockchain
Monash University via FutureLearn
Applying Data Analytics in Accounting
University of Illinois at Urbana-Champaign via Coursera
Online Master of Computer Science
Arizona State University via Coursera