Threats
Email Phishing
Email Spoofing
How to spoof email
SQL injection attacks and how to prevent them through secure coding
The HeartBleed Bug explained
The HeartBleed Bug in a comic strip
Technical Safeguards
What exactly is encryption (Wall Street Journal)
Hash Function
Cryptographic Algorithm
Introduction to asymmetric key cryptography
How asymmetric encryption works
SSL Certificates: Serving secure web content over HTTPS
SQL injection attacks and how to prevent them through secure coding
Blockchain
Explanation of the Blockchain demo site
More on Blockchain
Blockchain
Human Safeguards
I Was a Cyberthreat to My Company. Are You? (20 minutes)
What's wrong with you pa$w0rd? by CMU Professor Lorrie Cranor (17:41)
Idea to retire: Information security is IT security
No comments:
Post a Comment