Threat Modeling Stories from the Trenches - Security Design Flaws and Solutions

Threat Modeling Stories from the Trenches - Security Design Flaws and Solutions

OWASP Foundation via YouTube Direct link

Intro

1 of 22

1 of 22

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Threat Modeling Stories from the Trenches - Security Design Flaws and Solutions

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is Threat Modelling?
  3. 3 What is a Design Flaw?
  4. 4 Who Sent the Message?
  5. 5 In Theory: Good Security Controls
  6. 6 In Practice: Design Flaws in Integration
  7. 7 Mind the Gap: Stepping Over the Step-Up
  8. 8 Step-up Authentication
  9. 9 Attacking Step-up
  10. 10 Secure Password Storage with Insecure Side Effects
  11. 11 Developers Come to the Rescue
  12. 12 Production Web Farm Using Session DB
  13. 13 One-Time Passwords in Parallel Universes
  14. 14 Multi-factor Authentication for Remote Access
  15. 15 Side-effect of Load Balancing Servers
  16. 16 Secure Connection or Open Door?
  17. 17 Attacking the System
  18. 18 Attack the Datacentre
  19. 19 What is an Asset?
  20. 20 Gaming: Is Userld an Asset?
  21. 21 How Can Bob Climb the Leaderboard?
  22. 22 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.