Lecture

Zero Days Vulnerability: Security Breaches on Personal Devices

Description

This lecture covers the concept of zero days vulnerability, which refers to security flaws in software unknown to the developer and without a fix. It also discusses ethical hackers, intrusion testing, and different types of cyber attacks such as the Microsoft Exchange Server and Colonial Pipeline incidents. The presentation concludes with defense strategies against cyber threats, including system updates, backups, firewalls, and bug bounty programs.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (32)
Cybersecurity: Threat Modeling and Solutions
Explores cybersecurity fundamentals, threat modeling, real-world case studies, and digital forensics procedures.
Cybersecurity for Humanitarian OrganizationsMOOC: Humanitarian Action in the Digital Age
Explores the critical role of cybersecurity in protecting humanitarian organizations from cyber attacks and emphasizes the need for basic security measures and external support.
Cybersecurity Fundamentals
Covers the basics of cybersecurity, including the importance of protecting systems from digital attacks and the motivation behind cybercrimes.
Cybersecurity Ecosystem: Non-Profit Impact
Explores data breaches in non-profits, incident response plans, legal requirements, cybersecurity strategies, and challenges faced by organizations.
Malware: Botnets
Explores botnets, networks of compromised hosts controlled by a single entity, and defense strategies against them, highlighting the impact of malicious software.
Show more