Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore software security cryptography in this 52-minute conference talk from Central Ohio Infosec 2015. Delve into topics such as encryption, data safety, and threat modeling. Learn about handling sensitive information, including PHI and PPS, and understand the implications of vulnerabilities like Heartbleed. Gain insights on which security aspects to prioritize for investment. Discover the importance of reasonable encryption practices, data management strategies, and the role of Hardware Security Modules (HSMs) in protecting sensitive data.
Syllabus
Intro
Expectations
Encryption
Second Overflow
Reasonable Encryption
Data Safe
Data Management
Looking elsewhere
Handling sensitive information
HSMs
Questions
PHIPPS
Heartbleed
Threat Model
Which Pieces to Spend Money On