filmov
tv
Instant Threat Modeling - #17 Hacking Blockchain Security

Показать описание
This episode presents the most common threats applying to blockchain solutions such as HyperLedger.
Threat actors:
- anonymous, external attacker
- one of the organisations
- owner of certain private keys (authorised user)
Threats:
- private key compromise.
- web application attack vectors
- API attack vectors
- CA key compromise
- infrastructure attack vectors
- Node DoS
- bypassing channel policies
- too powerful organisations
- remote code execution and other smart contracts vulnerabilities
- smart contracts access control issues
Instant mitigations:
- encryption at rest
- web applications base threat model (BTM)
- BTM for APIs
- infra BTM
- each organisation should maintain their node
- policy configuration review + per-organisation access analysis.
- design review
- granular smart contracts
Instant Threat Modeling by Jakub Kaluzny (SecuRing).
Threat actors:
- anonymous, external attacker
- one of the organisations
- owner of certain private keys (authorised user)
Threats:
- private key compromise.
- web application attack vectors
- API attack vectors
- CA key compromise
- infrastructure attack vectors
- Node DoS
- bypassing channel policies
- too powerful organisations
- remote code execution and other smart contracts vulnerabilities
- smart contracts access control issues
Instant mitigations:
- encryption at rest
- web applications base threat model (BTM)
- BTM for APIs
- infra BTM
- each organisation should maintain their node
- policy configuration review + per-organisation access analysis.
- design review
- granular smart contracts
Instant Threat Modeling by Jakub Kaluzny (SecuRing).
Instant Threat Modeling - #17 Hacking Blockchain Security
Instant Threat Modeling - #16 Hacking Webinars
Instant Threat Modeling - #08 Ransomware
Instant Threat Modeling - #04 Video Conferencing
Building a Threat Model
The Four Question Framework For Threat Modeling
FACT CHECK: Are Nirmala Sitharaman & RBI Gov. Das Asking Indians to Invest ₹21,000 in Govt Platf...
Hacking Threat Modeling
Threat Modeling
Signal🚦vs NSA🧑💻 #shorts #privacy #nsa #encryption #phone #education
Instant Threat Modeling - #02 Contact Tracing Applications
Police Prank! 😱 Pulled Over With 50 Kilos! 😭😂 #shorts #prank
3 Moves to Build Bigger Biceps, even in a Polo Shirt #workout #fitness #shorts #gymmotivation
Judge Judy on what she thinks about Donald Trump
Privacy Threat Model Using LINDDUN by Kim Wuyts
Woman attacks Uber driver with pepper spray
USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks
I Can’t Believe I Guessed Her Name 😅
RMIT Cyber Tech Talk: Craig Pearce on Threat Modeling the Right Way for Software Builders- 16 Sep 21
Control Validation Compass | Threat Modeling Aide & Purple Team Content | Threat Model Tutorial
NEVER FLYING SPIRIT AIRLINES AGAIN ‼️😤 #shorts
Threat Modelling: Securing Kubernetes Infrastructure & Deployments - Rowan Baker, ControlPlane
Motown02 Threat Modeling for Secure Software Design Robert Hurlbut
WORLD'S LONGEST ARMS.. #Shorts
Комментарии