Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical supply chain security vulnerabilities in firmware key management through analysis of significant real-world incidents that have compromised the foundation of trust in modern computing systems. Learn how trust chains spanning hardware, firmware, and operating systems can be broken through key management failures, with detailed examination of repeatable attack patterns and vulnerabilities discovered by security researchers. Understand the step-by-step processes that establish and maintain system integrity, and discover how attackers exploit weaknesses in these trust mechanisms to compromise entire computing environments. Gain insights into the systematic nature of these security failures and their impact on supply chain security across the technology industry.
Syllabus
Repeatable Supply Chain Security Failures in Firmware Key Management
Taught by
RSA Conference