Dr. Tomasz Kowalski (Adam Mickiewicz University)
It may seem that using secure components results in a secure system, but this is rarely the case. A well known, flawless encryption algorithm may be implemented in a flawed way. A correct implementation of an encryption algorithm may be integrated into an application in a way that leaves confidential data exposed. And even a well implemented application may not be fully trusted when it is uncertain whether the encryption keys are handled (eg. stored) properly by the operating system.
Despite all the attention that firewalls and antiviruses receive, cybersecurity incidents still plague organizations and individuals. But how does „an attack” actually happen? It starts with mistakes that allow malicious activity and they happen in the code, design, implementation, or configuration. In this course participants will be invited to a hands-on exploration of systems where tiny defects (or negligence) in different system components accumulate leading to disastrous consequences.