Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the fundamentals of information security, including basic principles, threats, defenses, and privacy protection. It discusses environmental threats, both natural and human, as well as internal and external sources of security breaches. The importance of safeguarding information against theft, manipulation, destruction, denial, identity theft, and defense circumvention is emphasized. Additionally, it explores the challenges of ensuring data availability, encryption, confidentiality, integrity, and responsibility. The lecture delves into symmetric cryptography with shared secret keys, highlighting the need for key secrecy and sharing. It also introduces the concept of XOR in cryptography and its application in information encryption. The session concludes with an overview of asymmetric cryptography using public keys.