Threat Modeling: Repudiation in Depth
Offered By: LinkedIn Learning
Course Description
Overview
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Syllabus
Introduction
- The threat of repudiation
- Four-question framework
- Repudiation as part of STRIDE
- Message repudiation
- Operational repudiation
- Buyers and sellers
- Intermediaries
- Account takeover
- Identity theft and repudiation
- Catfishing, deepfakes, and voice cloning
- Attacks on logs
- Attacks via logs and response systems
- Cloud
- AI and machine learning
- Crypto and blockchain
- Cryptographic defenses
- Logs
- Log analysis
- Anti-fraud
- Next steps
Taught by
Adam Shostack
Related Courses
Privacy and Security in Online Social MediaIndian Institute of Technology Delhi via Swayam Cybersecurity Awareness: Phishing and Whaling
LinkedIn Learning Cybersecurity for Executives
LinkedIn Learning Avoiding Phishing Scams
LinkedIn Learning How to Do a Live Identity Hack
Cybrary