Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Information Security Best Practices
Graph Chatbot
Related lectures (32)
Previous
Page 2 of 4
Next
Information Security Importance
Emphasizes the importance of safeguarding data and systems from potential threats.
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Protecting Data: Strategies and Risks
Explores data protection strategies, including preventive measures and risks, with a focus on EPFL's data security.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.
Internet Capsules: Opportunities and Dangers
Explores the opportunities and dangers of the internet, including encryption, surveillance, and censorship.
User Authentication and Best Practices
Covers user authentication, cryptography, and best practices for digital security.
Privacy: Protecting Personal Data and Ensuring Anonymity
Explores risks of data exposure and strategies for defending privacy.
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Information Security: Data Destruction/Availability Balance
Explores the balance between threat and defense in data destruction and availability.
Cloud and Aggregation: Security and Privacy
Explores cloud computing, data aggregation, security risks, privacy defenses, and data protection techniques.