21
21
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 21
favorite 0
comment 0
Introduction to the Threats and Vulnerabilities module for Anti-Forensics and Digital Privacy. This lecture introduces threat models and discusses some of the issues related to individuals and companies.
Topic: computer privacy
62
62
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 62
favorite 0
comment 0
Lecture covering data collection, processing, and secure storage under the GDPR.
Topic: computer privacy
50
50
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 50
favorite 0
comment 0
Lecture covering the definitions of Personal Data and Data Subjects in the GDPR. Also discusses the rights of data subjects.
Topic: computer privacy
22
22
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 22
favorite 0
comment 0
Lecture covering Fair Information Practices, as described in NIST Special Publication 800-122, Appendix D.
Topic: computer privacy
21
21
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 21
favorite 0
comment 0
Introductory lecture (the first in a series) covering personally identifying information, including some of the ethical and legal frameworks used to express ways of protecting this information.
Topic: computer privacy
39
39
May 23, 2022
05/22
by
Dr. Mike Murphy
movies
eye 39
favorite 0
comment 0
Lecture covering the ACM and IEEE codes of ethics, as they relate to collecting, using, and protecting personal information.
Topic: computer privacy
42
42
May 23, 2022
05/22
by
Dr. Mike Murphy
movies
eye 42
favorite 0
comment 0
Lecture covering the definition of PII from NIST Special Publication 800-122. This includes both direct PII as well as linked and linkable PII.
Topic: computer privacy
27
27
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 27
favorite 0
comment 0
Lecture covering the California Consumer Privacy Act of 2018.
Topic: computer privacy
22
22
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 22
favorite 0
comment 0
Lecture covering the Fair Information Practice Principles (FIPPs) as expressed by the FTC in its 1998 report to Congress.
Topic: computer privacy
166
166
Mar 29, 2022
03/22
by
Dr. Mike Murphy
movies
eye 166
favorite 0
comment 0
Introductory video for CSCI 435: Anti-Forensics and Digital Privacy. This video discusses digital forensics, anti-forensics, and some topics for further study in digital privacy.
Topic: computer privacy
41
41
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 41
favorite 0
comment 0
Lecture covering the security process for PII, as outlined in NIST Special Publication 800-122. Includes potential harm assessment, classification of PII impact level, and security controls.
Topic: computer privacy
48
48
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 48
favorite 0
comment 0
Lecture introducing the EU General Data Protection Regulation. Note that the perspective of this coverage is from outside the EU.
Topic: computer privacy
80
80
May 23, 2022
05/22
by
Dr. Mike Murphy
movies
eye 80
favorite 0
comment 0
Lecture explaining the creation personal threat models, using the guidelines advocated by the Electronic Frontier Foundation. Covers assets, adversaries, impacts, risks, and inconveniences, before finally making the case for minimalism with respect to personal data.
Topic: computer privacy
44
44
May 24, 2022
05/22
by
Dr. Mike Murphy
movies
eye 44
favorite 0
comment 0
Video lecture covering the NIST recommendations for handling data breach events (from Special Publication 800-122).
Topic: computer privacy
169
169
Mar 29, 2022
03/22
by
Dr. Mike Murphy
movies
eye 169
favorite 1
comment 0
Overview of the concept of digital privacy and the way that anti-forensics relates to it.
Topic: computer privacy
52
52
texts
eye 52
favorite 7
comment 0
xxiv, 361 pages : 24 cm
Topics: Internet -- säkerhetsaspekter, Computer privacy and security, Smartphones -- säkerhetsaspekter,...
1,478
1.5K
Apr 30, 2008
04/08
by
Joseph Guarino - www.evolutionaryit.com
texts
eye 1,478
favorite 0
comment 0
Balancing Your Internet Cyber-Life with Privacy and Security ::: Whether you're a teenager or college student on MySpace or FaceBook, or a professional using LinkedIn and job posting sites, and whatever your level of technical and social sophistication, you'll find something valuable in this presentation. Social networking, blogs, forums, email, IM all represent evolutionary opportunities to communicate and collaborate but they carry distinct risks. Learn the real world tools and techniques to...
Topics: End User Computer Security Guide, Computer Security and Privacy, Computer, Computer Security,...