Completed
Attacking Step-up
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Threat Modeling Stories from the Trenches - Security Design Flaws and Solutions
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What is Threat Modelling?
- 3 What is a Design Flaw?
- 4 Who Sent the Message?
- 5 In Theory: Good Security Controls
- 6 In Practice: Design Flaws in Integration
- 7 Mind the Gap: Stepping Over the Step-Up
- 8 Step-up Authentication
- 9 Attacking Step-up
- 10 Secure Password Storage with Insecure Side Effects
- 11 Developers Come to the Rescue
- 12 Production Web Farm Using Session DB
- 13 One-Time Passwords in Parallel Universes
- 14 Multi-factor Authentication for Remote Access
- 15 Side-effect of Load Balancing Servers
- 16 Secure Connection or Open Door?
- 17 Attacking the System
- 18 Attack the Datacentre
- 19 What is an Asset?
- 20 Gaming: Is Userld an Asset?
- 21 How Can Bob Climb the Leaderboard?
- 22 Summary