Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

ChariotSolutions via YouTube

Overview

Explore techniques for building data breach and subpoena resistant applications in this 50-minute conference talk from Philly ETE 2017. Delve into the challenges of protecting user data against various threats, including internal compromises. Learn about a new approach based on cryptography and messaging that aims to enhance data security beyond traditional methods. Examine the limitations of technical defenses against non-technical attacks and discover how to set new standards for safeguarding user information. Gain insights into JSON Web Tokens, cost-based cryptographic hashes, and see a practical example of implementing these concepts in a written test administration application. Understand the steps involved in admin setup, user invitation, login, exercise completion, and submission review. Conclude with an overview of the final data footprint, further reading suggestions, and next steps for implementing robust data protection strategies.

Syllabus

Intro
BACKGROUND - TRADITIONAL DISCUSSION
BACKGROUND - PLAYING THE ODDS
BACKGROUND - RECENT EXAMPLES
NIGHTMARE THREATS
NIGHTMARE EXAMPLE
RISKS ASSOCIATED WITH ENCRYPTION
SOLUTION BLUEPRINT
JSON WEB TOKENS (JWT)
COST-BASED CRYPTOGRAPHIC HASHES
EXAMPLE APPLICATION - WRITTEN TEST ADMINISTRATION
ADMIN SETUP
USER INVITATION
USER LOGIN
USER STARTS EXERCISE
USER FINISHES EXERCISE
SUBMISSION REVIEWED
FINAL DATA FOOTPRINT
EPILOGUE
FURTHER READING/VIEWING
NEXT STEPS

Taught by

ChariotSolutions

Reviews

Start your review of Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.