Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Security Principles: Least Privilege, Common Mechanism, Acceptability
Graph Chatbot
Related lectures (32)
Privacy Engineering: Principles and Strategies
Covers the principles and strategies of privacy engineering, emphasizing the importance of embedding privacy into IT systems and the challenges faced in achieving privacy by design.
Privacy and Security: Online Identity and Threats
Explores online identity, privacy, and security, covering fake news, cyberbullying, and defense strategies.
Week 3 Conclusion
Concludes week 3, previewing cybersecurity and privacy in humanitarian action.
Privacy Engineering: Strategies and Paradigms
Explores privacy engineering strategies, research paradigms, and real-world examples like the SwissCovid app.
Media Security Standards
Explores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
Privacy-Preserving Federated Analytics for Personalized Medicine
Delves into privacy-preserving federated analytics for personalized medicine, discussing challenges, solutions, and real-world applications.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.
Homomorphic Encryption: Delegating Calculations Securely
Explores homomorphic encryption, enabling secure computations on encrypted data without data exposure, with applications in healthcare and finance.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.
Privacy Sphere and Data Protection
Covers privacy sphere, data protection, risks of data misuse, laws, and real-world breach cases.
Previous
Page 2 of 2
Next