Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Data breach
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (31)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
Top 5 IT Troubles
Explores the top 5 common IT troubles at EPFL, emphasizing data security.
SwissCovid and Privacy
Explores SwissCovid encryption, key verification, and privacy challenges in contact tracing.
Data Security and Privacy: Practical Exercises and Concepts
Covers encryption, data protection, and blockchain technology, with hands-on exercises for practical application.
NFC Security Research with NFCGate
Explores NFC technology, NFCGate toolkit, security breaches, analysis tools, and counter-measures to enhance NFC security.
Personalized Health Data Protection
Explores the legal aspects of sharing health research data in Switzerland, emphasizing data protection and security measures.
Zero Trust Architecture: Myths and Realities
Explores the myths and realities of Zero Trust Architecture in cybersecurity, emphasizing the importance of trust establishment and dispelling common misconceptions.
Data Protection Laws Comparison: EU, USA, China
Compares data protection laws in the EU, USA, and China, highlighting key regulations, roles, fines, and real-world examples of data breaches.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.