Skip to main content
Graph
Search
fr
|
en
Switch to dark mode
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Vulnerability (computing)
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (30)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 3
Next
Protecting Work and EPFL
Emphasizes the importance of protecting work and EPFL through security measures and prevention strategies for safe web surfing.
Excessive Permissions: Mobile Apps Security
Explores the risks of mobile apps with exaggerated permissions and defense strategies.
Vulnerability and Exposure
Examines vulnerability, exposure, factors influencing disasters, and the human dimension of disasters.
Web and Software Bugs
Explores vulnerabilities in web and software applications, discussing broken access control, injection flaws, and defense strategies like DEP and ASLR.
Malware: Introduction
Introduces the basics of malware, its distribution, reasons for its rise, and taxonomy.
Security Best Practices
Emphasizes the use of limited accounts and software updates to enhance security.
Medical Device Security and Certification
Explores the vulnerabilities of medical devices and the importance of robust security measures and evidence-based certification.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
5G Authentication: Security and SUKI
Explores the evolution of 5G authentication, vulnerabilities in 4G, and improvements in 5G security.
Challenges in IoT Era
Covers IoT security challenges, cyber-physical attacks, and global attack surfaces.