Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the process of threat modeling to identify potential threats and prioritize security mechanisms, as well as the Common Weaknesses Enumeration (CWE) database to help security engineers avoid common software errors. It also discusses specific vulnerabilities like Insecure Interaction Between Components, OS Injection, Cross-site Scripting, and Risky Resource Management.
This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.
Watch on Mediaspace