Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Threat (computer)
Applied sciences
Computer engineering
Computer security
Information security
Related lectures (31)
Graph Chatbot
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 4
Next
Adversarial Reasoning: Threat Modeling and CWEs
Explores threat modeling, CWE database, and software vulnerabilities like OS Injection and Cross-site Scripting.
Information Security Best Practices
Emphasizes the importance of information security best practices and user education.
Establishing a Security Policy: Threat Models and Principles
Explores security policy establishment, threat models, and principles, with practical exercises on state-level adversaries and young hackers.
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Cybersecurity: Digital Forensics and Attribution
Explores cyber-kill chain, digital forensics, attribution challenges, and case studies in cybersecurity.
Cybersecurity for Humanitarian Organizations
Explores the critical role of cybersecurity in protecting humanitarian organizations from cyber attacks and emphasizes the need for basic security measures and external support.
Adversarial Thinking: Reasoning as an Adversary
Explores the importance of understanding attacks and the reasoning behind adversarial thinking in developing security mechanisms.
Security Design Principles: Preliminaries
Covers basic security concepts, adversarial thinking, security mechanisms, and responsible conduct in security design principles.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
Synthesis Matrix for Diagnosis
Emphasizes the importance of balancing positive and negative aspects in a SWOT analysis.