Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Confidentiality
Applied sciences
Computer engineering
Computer security
Privacy
Graph Chatbot
Related lectures (16)
Login to filter by course
Login to filter by course
Reset
Specific Contracts: Mandate, Confidentiality, Joint Ventures
Explores mandate contracts, confidentiality agreements, and joint ventures in business.
Security Best Practices: Authentication and Good Conduct
Discusses security best practices, such as creating secure passwords and protecting personal networks.
Introduction to Cryptography
Explores cryptography techniques to keep information confidential and the importance of structuring data.
Establishing a Security Policy: Threat Models and Principles
Explores security policy establishment, threat models, and principles, with practical exercises on state-level adversaries and young hackers.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
Machine Learning Security
Explores machine learning security, including model stealing, altering outputs, adversarial conditions, and privacy challenges, emphasizing the importance of addressing biases in machine learning models.
Privacy: Why is privacy important
Explores the importance of privacy in democratic societies and the shared security infrastructure across individuals, industry, and governments.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Privacy Technologies: End-to-End Encryption and Metadata Protection
Explores end-to-end encryption, metadata sensitivity, and the role of traffic analysis in intelligence gathering.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Public Key Cryptography
Explores public key cryptography, enabling secure communication and key exchange between Alice and Bob.
Security Testing and Spoofing
Covers security testing techniques, spoofing vulnerabilities, encryption bans, and network security properties.
Mandatory Access Control: Confidentiality Models
Explores the Bell La Padula model, covert channels, declassification challenges, and security properties in confidentiality models.
Business Law: Employment Agreements and Joint Ventures
Provides an overview of employment agreements, mandates, confidentiality agreements, and joint ventures in practical business law.
Previous
Page 1 of 1
Next