Threat Modeling: Repudiation in Depth
Offered By: LinkedIn Learning
Course Description
Overview
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Syllabus
Introduction
- The threat of repudiation
- Four-question framework
- Repudiation as part of STRIDE
- Message repudiation
- Operational repudiation
- Buyers and sellers
- Intermediaries
- Account takeover
- Identity theft and repudiation
- Catfishing, deepfakes, and voice cloning
- Attacks on logs
- Attacks via logs and response systems
- Cloud
- AI and machine learning
- Crypto and blockchain
- Cryptographic defenses
- Logs
- Log analysis
- Anti-fraud
- Next steps
Taught by
Adam Shostack
Related Courses
Introduction to Innovation and Technology in Legal ServicesUniversity of Law via FutureLearn AnĂ¡lise de oportunidade de Blockchain
INSEAD via Coursera Applications of Blockchain
Monash University via FutureLearn Applying Data Analytics in Accounting
University of Illinois at Urbana-Champaign via Coursera Online Master of Computer Science
Arizona State University via Coursera