Threat Modeling: Tampering in Depth
Offered By: LinkedIn Learning
Course Description
Overview
Learn how tampering threats work and how to mitigate them. Explore how attackers can tamper with a variety of systems and tools, from debuggers to cloud services.
Syllabus
Introduction
- Mitigate tampering threats
- Four-question framework
- Tampering as part of STRIDE
- Debuggers and input
- Libraries
- Mobile
- Tampering with local storage
- Permissions
- Effects of tampering
- Whose screw? Physical tampering matters
- Debug interfaces are exposed
- Time is increasingly important
- Controls and authentication
- Becoming Jane Admin
- Channels and messages
- Replay and reflection
- Headers: Injection and order
- Prevention and detection goals
- Crypto
- Something more privileged
- Next steps
Taught by
Adam Shostack
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network