How Online Dating Made Me Better at Threat Modeling
Offered By: YouTube
Course Description
Overview
Explore how online dating experiences can enhance threat modeling skills in this 43-minute conference talk from BSides Columbus 2019. Discover the parallels between personal security in dating and professional cybersecurity practices. Learn about data flow diagrams, security nihilism, and the importance of understanding where data comes from. Gain insights into offensive attacks, data breaches, and location control. Examine the concept of risk versus reward in both dating and cybersecurity contexts. Understand how to apply threat modeling techniques to improve overall security awareness and decision-making in various aspects of life.
Syllabus
Intro
Who this talk is for
Why this topic
Security nihilism
Data flow diagram
Purposes
Action
Stripe Protect
Checkmarks
Checkmarks Vulnerability
Factories
Offensive Attacks
Data Breaches
Location Control
Hardware
Introduction to Threat Modeling
Where is data coming from
Red Teams
Choose What You Share
Risk vs Reward
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network