Threat Modeling: Repudiation in Depth
Offered By: LinkedIn Learning
Course Description
Overview
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Syllabus
Introduction
- The threat of repudiation
- Four-question framework
- Repudiation as part of STRIDE
- Message repudiation
- Operational repudiation
- Buyers and sellers
- Intermediaries
- Account takeover
- Identity theft and repudiation
- Catfishing, deepfakes, and voice cloning
- Attacks on logs
- Attacks via logs and response systems
- Cloud
- AI and machine learning
- Crypto and blockchain
- Cryptographic defenses
- Logs
- Log analysis
- Anti-fraud
- Next steps
Taught by
Adam Shostack
Related Courses
Innovation and Technology Management in Tourism and HospitalityHong Kong Polytechnic University via edX Das liebe Geld - Finance im Alltag
University of Zurich via Coursera Blockchain in the Energy Sector
InnoEnergy via FutureLearn IBM Blockchain Foundation for Developers
IBM via Coursera Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam