Software Security Cryptography
Offered By: YouTube
Course Description
Overview
Explore software security cryptography in this 52-minute conference talk from Central Ohio Infosec 2015. Delve into topics such as encryption, data safety, and threat modeling. Learn about handling sensitive information, including PHI and PPS, and understand the implications of vulnerabilities like Heartbleed. Gain insights on which security aspects to prioritize for investment. Discover the importance of reasonable encryption practices, data management strategies, and the role of Hardware Security Modules (HSMs) in protecting sensitive data.
Syllabus
Intro
Expectations
Encryption
Second Overflow
Reasonable Encryption
Data Safe
Data Management
Looking elsewhere
Handling sensitive information
HSMs
Questions
PHIPPS
Heartbleed
Threat Model
Which Pieces to Spend Money On
Related Courses
Менеджмент информационной безопасностиHigher School of Economics via Coursera Planning a Security Incident Response
Microsoft via edX Identifying Security Vulnerabilities
University of California, Davis via Coursera Secure Coding Practices
University of California, Davis via Coursera Atlas Security
MongoDB University