Lecture 8 Securing Systems

Authentication. Authorization. Passwords. Brute-force attacks. Rate limits. 2FA. Hashing. Rainbow tables. Salts. Cryptography. Secret-key. Public-key. Passkeys. Encryption. Secure deletion. Ransomware.