Artwork

Content provided by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Core Security Concepts v. I

45:38
 
Share
 

Manage episode 280769206 series 2806176
Content provided by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

When we're considering the security properties of something, whether it's a building, an app, an API, a network, or really anything else, there is a core set of concepts that we lean on to inform our evaluation. These core concepts provide a foundation to reason about whether the security provided by the entity in question is sufficient and, in the case that it's not, how you can mitigate the risks posed by its flaws. In this first episode on core security concepts we discuss authentication vs. authorization, the principle of least privilege, some flaws of human behavior, security vs. usability, and the elusive notion of perfect security. With these concepts in hand you will be better equipped to consider the risks of everything you interact with in your day-to-day life.

  continue reading

49 episodes

Artwork

Core Security Concepts v. I

Security Explained

13 subscribers

published

iconShare
 
Manage episode 280769206 series 2806176
Content provided by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Chris Grayson, Drew Porter, Logan Lamb, Chris Grayson, Drew Porter, and Logan Lamb or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

When we're considering the security properties of something, whether it's a building, an app, an API, a network, or really anything else, there is a core set of concepts that we lean on to inform our evaluation. These core concepts provide a foundation to reason about whether the security provided by the entity in question is sufficient and, in the case that it's not, how you can mitigate the risks posed by its flaws. In this first episode on core security concepts we discuss authentication vs. authorization, the principle of least privilege, some flaws of human behavior, security vs. usability, and the elusive notion of perfect security. With these concepts in hand you will be better equipped to consider the risks of everything you interact with in your day-to-day life.

  continue reading

49 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide