Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.
Overview
Syllabus
Introduction
- The threat of repudiation
- Four-question framework
- Repudiation as part of STRIDE
- Message repudiation
- Operational repudiation
- Buyers and sellers
- Intermediaries
- Account takeover
- Identity theft and repudiation
- Catfishing, deepfakes, and voice cloning
- Attacks on logs
- Attacks via logs and response systems
- Cloud
- AI and machine learning
- Crypto and blockchain
- Cryptographic defenses
- Logs
- Log analysis
- Anti-fraud
- Next steps
Taught by
Adam Shostack