Recently, the number of cyberattacks targeting enterprises and their services has been increasing. Both corporate IT infrastructure and software serve as attack targets. Therefore, such incidents provide valuable lessons for software developers, including systems analysts.
How can we formulate requirements to make software more resilient to attacks?
In my talk, I will examine one specific threat — authorship spoofing and protection against it using PKI and digital signatures.
Target audience:
Business and systems analysts of any level of experience.
Key takeaways for participants:
- An understanding of the main methods of authorship spoofing threats implementation and ways to protect against them;
- Insight into how to evaluate the effectiveness of available protective measures;
- Clarity on how to properly formulate requirements for authorship spoofing protection;
- Awareness of the right questions to ask stakeholders when choosing protection methods.