Explores Mandatory Access Control principles, security models, the Chinese Wall model, covert communication channels, and the importance of sanitization in business.
Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.