Lecture 8 Securing Systems
Authentication. Authorization. Passwords. Brute-force attacks. Rate limits. 2FA. Hashing. Rainbow tables. Salts. Cryptography. Secret-key. Public-key. Passkeys. Encryption. Secure deletion. Ransomware.
Authentication. Authorization. Passwords. Brute-force attacks. Rate limits. 2FA. Hashing. Rainbow tables. Salts. Cryptography. Secret-key. Public-key. Passkeys. Encryption. Secure deletion. Ransomware.