In this lecture ten main security challenges has been discussed with examples. Computer security challenges must need to address to make information secure.
00:00 lecture intro
00:35 not simple
01:30 consider attacks
02:35 counter intuitive procedure
03:18 involve algorithms
04:00 where to deploy
05:03 battle of wits
06:09 not perceived on benefits
08:13 process not an event
09:13 too often after thought
10:09 user friendly security
#AzComputing
#SecurityChallenges
#InformationSecurity
................................................................................................................
Disclaimer__ Some contents are used for educational purpose under fair use. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
コメント