Главная
Study mode:
on
1
Intro
2
BACKGROUND - TRADITIONAL DISCUSSION
3
BACKGROUND - PLAYING THE ODDS
4
BACKGROUND - RECENT EXAMPLES
5
NIGHTMARE THREATS
6
NIGHTMARE EXAMPLE
7
RISKS ASSOCIATED WITH ENCRYPTION
8
SOLUTION BLUEPRINT
9
JSON WEB TOKENS (JWT)
10
COST-BASED CRYPTOGRAPHIC HASHES
11
EXAMPLE APPLICATION - WRITTEN TEST ADMINISTRATION
12
ADMIN SETUP
13
USER INVITATION
14
USER LOGIN
15
USER STARTS EXERCISE
16
USER FINISHES EXERCISE
17
SUBMISSION REVIEWED
18
FINAL DATA FOOTPRINT
19
EPILOGUE
20
FURTHER READING/VIEWING
21
NEXT STEPS
Description:
Explore techniques for building data breach and subpoena resistant applications in this 50-minute conference talk from Philly ETE 2017. Delve into the challenges of protecting user data against various threats, including internal compromises. Learn about a new approach based on cryptography and messaging that aims to enhance data security beyond traditional methods. Examine the limitations of technical defenses against non-technical attacks and discover how to set new standards for safeguarding user information. Gain insights into JSON Web Tokens, cost-based cryptographic hashes, and see a practical example of implementing these concepts in a written test administration application. Understand the steps involved in admin setup, user invitation, login, exercise completion, and submission review. Conclude with an overview of the final data footprint, further reading suggestions, and next steps for implementing robust data protection strategies.

Building Data Breach and Subpoena Resistant Applications - Philly ETE 2017

ChariotSolutions
Add to list
0:00 / 0:00