Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Protecting Work: Threats
Graph Chatbot
Related lectures (30)
Previous
Page 3 of 3
Next
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.
Mandatory Access Control: Multi-property Security Models
Explores the Chinese Wall model for combining confidentiality and integrity, addressing conflicts of interest and multilateral security.
Discretionary Access Control I
Covers the implementation of Discretionary Access Control using Access Control Matrix and Lists.
Introduction to Security and Privacy
Covers the basics of pedagogy, lesson structure, video capsules, and student evaluation.
Privacy technologies and data protection
Explores privacy importance, PETS, anti-surveillance technologies, and the SwissCovid case study.
HTTP Desync: Request Smuggling Reborn
Explores HTTP request smuggling, a vulnerability to bypass security controls, with examples and defense strategies.
Security Measures: Data Protection
Highlights the importance of securing electronic devices and data in public places.
Data Protection Laws in Switzerland
Covers Swiss data protection laws, including the Federal Data Protection Act and the roles defined in the legislation.
Data Protection Ordinance for EPF Domain Personnel
Covers the Data Protection Ordinance for EPF domain personnel, focusing on legal responsibilities and data management.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.