Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Cybersecurity for Humanitarian Organizations
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Protecting Your Work and EPFL
Emphasizes protecting work and EPFL through laws, regulations, identifying threats, and securing hardware.
Protecting your data
Emphasizes the importance of data protection, covering threats, risks, prevention, and real-life examples of data loss incidents.
The Concept of Fog Computing in IoT
Delves into the concept of Fog computing in IoT and addresses key IoT security issues.
Cybersecurity Threats: Phishing
Covers phishing, a cyber attack method using fraudulent emails to deceive individuals into revealing sensitive information.
Adversarial Reasoning: Threat Modeling and CWEs
Explores threat modeling, CWE database, and software vulnerabilities like OS Injection and Cross-site Scripting.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Sustainable IT Strategies: Forum SI 2024
Discusses sustainable IT practices and strategies presented at the Forum SI 2024 at EPFL.
Cybersecurity: Threat Modeling and Attack Strategies
Explores threat modeling, attack methods, and cybersecurity tools to enhance protection.
Internet Capsules: Security and Privacy
Covers internet security, privacy, TLS, blocking, filtering, surveillance, and espionage.
Espionage and Security: Insights and Examples
Explores espionage cases, intelligence activities, and surveillance systems, emphasizing security implications and potential targets for espionage.