Software Security Cryptography
Offered By: YouTube
Course Description
Overview
Explore software security cryptography in this 52-minute conference talk from Central Ohio Infosec 2015. Delve into topics such as encryption, data safety, and threat modeling. Learn about handling sensitive information, including PHI and PPS, and understand the implications of vulnerabilities like Heartbleed. Gain insights on which security aspects to prioritize for investment. Discover the importance of reasonable encryption practices, data management strategies, and the role of Hardware Security Modules (HSMs) in protecting sensitive data.
Syllabus
Intro
Expectations
Encryption
Second Overflow
Reasonable Encryption
Data Safe
Data Management
Looking elsewhere
Handling sensitive information
HSMs
Questions
PHIPPS
Heartbleed
Threat Model
Which Pieces to Spend Money On
Related Courses
Données et services numériques, dans le nuage et ailleursCertificat informatique et internet via France Université Numerique Introduction to Digital Curation
University College London via Independent Excel Avanzado
Miríadax SAP Business Warehouse powered by SAP HANA
SAP Learning Programming Mobile Applications for Android Handheld Systems: Part 2
University of Maryland, College Park via Coursera