Lecture

Adversarial Reasoning: Threat Modeling and CWEs

Description

This lecture covers the process of threat modeling to identify potential threats and prioritize security mechanisms, as well as the Common Weaknesses Enumeration (CWE) database to help security engineers avoid common software errors. It also discusses specific vulnerabilities like Insecure Interaction Between Components, OS Injection, Cross-site Scripting, and Risky Resource Management.

This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.

Watch on Mediaspace
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.