Threat modeling allows security pros and software developers to proactively address the inevitable—hackers trying to compromise a system—early on in a project’s life cycle. In this course, Adam Shostack covers tampering, the second stage in the STRIDE threat modeling framework. Tampering can compromise the integrity of a variety of systems and tools, from debuggers to Iocal storage. Throughout this course, Adam describes how different tampering threats work, as well as what you can do about them. Learn how attackers can tamper with libraries, IoT devices, cloud services, and more.
Learn More- Career Communities
- Identity Resources
- Career Planning
- Access Career Tools
- Build Skills at Denison Edge
- Build Your Resume and Cover Letter
- Search for an Internship or Job
- Network with Confidence
- Leverage Winter Break
- Participate in the Denison Internship Program
- Prepare for an Interview
- Plan for Graduate School
- Research Industries and Companies
- Utilize Financial Resources
- Alumni
- Academic Partnerships
- Meet The Team
- Student Employment