Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture discusses the balance between threat and defense in data destruction, emphasizing the risk of data loss or unavailability. Strategies such as data replication are explored, highlighting the importance of maintaining consistent copies. Various defense mechanisms, including encryption and replication rates, are analyzed to mitigate threats like information theft, manipulation, denial, and identity theft. The lecture also covers the importance of confidentiality, integrity verification, and information availability in combating threats. It concludes by examining factors influencing defense levels, such as replication rates, replica locations, and update frequencies, to tailor defense strategies to the risk level.