Lecture

Password Security

Related lectures (69)
Access Control: Password-based Cryptography
Explores access control and password-based cryptography, including challenges, biometrics, and the biometric passport case study.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Access Control Policies: Authentication and Authorization
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Authentication: Basics
Covers the process of verifying identity, traditional methods like passwords, and modern approaches such as biometrics.
Principles II: Complete Mediation, Open Design, Separation of Privilege
Discusses the 'complete mediation', 'open design', and 'separation of privilege' principles to enhance system security.
Conditional Access I
Explores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Dependability Overview
Explores dependability in industrial automation, covering reliability, safety, fault characteristics, and examples of failure sources in various industries.
Authentication - Biometrics
Covers the concept of biometrics, the process of enrolling and verifying biometrics, and the importance of balancing false positives and false negatives.
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.