Threat Modeling: Repudiation in Depth
Offered By: LinkedIn Learning
Course Description
Overview
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Syllabus
Introduction
- The threat of repudiation
- Four-question framework
- Repudiation as part of STRIDE
- Message repudiation
- Operational repudiation
- Buyers and sellers
- Intermediaries
- Account takeover
- Identity theft and repudiation
- Catfishing, deepfakes, and voice cloning
- Attacks on logs
- Attacks via logs and response systems
- Cloud
- AI and machine learning
- Crypto and blockchain
- Cryptographic defenses
- Logs
- Log analysis
- Anti-fraud
- Next steps
Taught by
Adam Shostack
Related Courses
Building your first GAN in PythonCoursera Project Network via Coursera Media Literacy in the Age of Deepfakes
Massachusetts Institute of Technology via Independent Understanding the Impact of Deepfake Videos
LinkedIn Learning The Cybersecurity Threat Landscape
LinkedIn Learning Artificial Intelligence Safety and Security - Roman V. Yampolskiy, PhD
Open Data Science via YouTube