Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Establishing a Security Policy: Threat Models and Principles
Graph Chatbot
Related lectures (27)
Previous
Page 2 of 3
Next
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Edward Snowden: Whistleblower and Data Privacy Advocate
Explores Edward Snowden's whistleblowing on NSA's data collection and the challenges of data security.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Cybersecurity: Threat Modeling and Attack Strategies
Explores threat modeling, attack methods, and cybersecurity tools to enhance protection.
Adversarial Thinking: Defender - Threat Modelling
Delves into adversarial thinking and threat modeling methodologies to enhance defense strategies.
User Management
Explores user management in digital humanities, focusing on modeling, motivation, and engagement, with insights from Twitter, Quora, and Wikipedia.
Security Design Principles: Preliminaries
Covers basic security concepts, adversarial thinking, security mechanisms, and responsible conduct in security design principles.
Fixing Serverless Computing with Open-Source Hardware
Explores challenges and solutions in serverless computing, focusing on energy usage, cloud utilization, FaaS architecture, and performance analysis.
Homomorphic Encryption: Cloud and Aggregation
Explores homomorphic encryption for secure cloud computing and data aggregation.