Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Phishing: Protecting EPFL Accounts
Graph Chatbot
Related lectures (32)
Data Protection Law: Principles and Rights
Covers the principles and rights of data protection law under GDPR.
Personalized Health Data Protection
Explores the legal aspects of sharing health research data in Switzerland, emphasizing data protection and security measures.
Cybersecurity Ecosystem: Non-Profit Impact
Explores data breaches in non-profits, incident response plans, legal requirements, cybersecurity strategies, and challenges faced by organizations.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Non-Attributable Email: Forward-Forgeable Signatures
Explores non-attributable email using forward-forgeable signatures and the legal risks faced by security researchers.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
New Business Applications in the Space Field
Explores new business applications, cybersecurity, microgravity, and space research innovations for disruptive Earth applications.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Week 3 Conclusion
Concludes week 3, previewing cybersecurity and privacy in humanitarian action.
Technologies Impact on Humanitarian Crisis
Explores the impact of technologies on humanitarian crises and the ethical considerations involved.
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
IT Security Fundamentals
Covers the basics of IT security, emphasizing everyone's responsibility in protecting data and preventing cyber threats.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Ethical Considerations in AI
Explores legal and ethical aspects of AI, focusing on autonomy, responsibility, and societal impact.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.
Cybersecurity Threats: Phishing
Covers phishing, a cyber attack method using fraudulent emails to deceive individuals into revealing sensitive information.
Privacy Technologies and Data Protection
Explores privacy technologies, data protection, surveillance risks, and Privacy Enhancing Technologies for social and institutional privacy.
Privacy: Paradigms and Adversaries
Covers privacy paradigms, data collection by companies, legal frameworks, trust in data providers, and the security vs. privacy debate.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.
Previous
Page 1 of 2
Next