Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Threat Modeling: Repudiation in Depth

via LinkedIn Learning

Overview

Coursera Plus Annual Sale:
All Certificates & Courses 40% Off!
Grab it
Explore repudiation threats and how to defend against them. Learn how to grapple with fraud, identity theft, and repudiation in specific technologies such as blockchain.

Syllabus

Introduction
  • The threat of repudiation
  • Four-question framework
  • Repudiation as part of STRIDE
1. Technical Repudiation
  • Message repudiation
  • Operational repudiation
2. Fraud
  • Buyers and sellers
  • Intermediaries
  • Account takeover
3. Identity Theft
  • Identity theft and repudiation
  • Catfishing, deepfakes, and voice cloning
4. Attacks on Logs
  • Attacks on logs
  • Attacks via logs and response systems
5. Repudiation in Specific Technologies
  • Cloud
  • AI and machine learning
  • Crypto and blockchain
6. Defenses
  • Cryptographic defenses
  • Logs
  • Log analysis
  • Anti-fraud
Conclusion
  • Next steps

Taught by

Adam Shostack

Reviews

4.6 rating at LinkedIn Learning based on 233 ratings

Start your review of Threat Modeling: Repudiation in Depth

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.