Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Cybersecurity: Subversive Cyber Conflict
Graph Chatbot
Related lectures (18)
Previous
Page 2 of 2
Next
Computer Security: Basics and Vocabulary
Introduces computer security basics, properties, policy, threat modeling, and key vocabulary for adversarial thinking.
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Protecting your data
Emphasizes the importance of data protection, covering threats, risks, prevention, and real-life examples of data loss incidents.
Adversarial Reasoning: Threat Modeling and CWEs
Explores threat modeling, CWE database, and software vulnerabilities like OS Injection and Cross-site Scripting.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Sustainable IT Strategies: Forum SI 2024
Discusses sustainable IT practices and strategies presented at the Forum SI 2024 at EPFL.
Cybersecurity: Threat Modeling and Attack Strategies
Explores threat modeling, attack methods, and cybersecurity tools to enhance protection.