Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Information Security Best Practices
Graph Chatbot
Related lectures (32)
Internet Evolution: From Origins to Consequences
Explores the evolution and impact of the Internet, emphasizing the dual nature of technological advancements.
Server Security: Threats and Defenses
Explores server security, types of attacks, consequences, and defenses, along with an introduction to blockchains.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Servers: Security and Privacy
Explores server security, privacy, attacks, blockchains, encryption, and defense strategies against cyber threats.
IT Security Fundamentals
Covers the basics of IT security, emphasizing everyone's responsibility in protecting data and preventing cyber threats.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Abusive Data Collection: Risks and Protections
Explores risks of abusive data collection, protections like Differential Privacy, Hashing, and Encryption, and techniques for data protection.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
Security Measures: Data Protection
Highlights the importance of securing electronic devices and data in public places.
Introduction to Information Security: Threats and Defenses
Explores cybersecurity principles, threats, and defenses, emphasizing the importance of protecting digital information and systems.
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Privacy: Protecting Personal Data and Ensuring Anonymity
Explores risks of data exposure and strategies for defending privacy.
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Previous
Page 1 of 2
Next