This lecture covers the process of threat modeling to identify potential threats and prioritize security mechanisms, as well as the Common Weaknesses Enumeration (CWE) database to help security engineers avoid common software errors. It also discusses specific vulnerabilities like Insecure Interaction Between Components, OS Injection, Cross-site Scripting, and Risky Resource Management.
This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.
Watch on Mediaspace