Search for tag: "attack"

DeCenter Seminar: "Blockchain does not operate in a vacuum: an internet perspective"

From  Broadcast Broadcast Center Staff 0 likes 11 plays

OURSIP Intern - Felix Xu

New Approaches to Quaternary C-C Bond Formation via Iron Metallaphotoredox Catalysis Advised by: Prof. David W.C. MacMillan, Chemistry Andria Pace, Chemistry

From  our Undergraduate Research 0 likes 17 plays

Knot The Average Boat: Development of a Semi-Autonomous Sailing Platform, Jeb Carter, UG '23 (2985750)

The problem of autonomous sailing is a complex and challenging one. There are nearly countless possible environmental and telemetry sensors that can be implemented, each with varying challenges and…

From  Research Princeton Research Day 2 likes 52 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 80 plays

Creating your Personal Risk Management Plan - Webinar

(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish the likelihood and impact of…

From  Stefanie Clerkin 0 likes 46 plays

9.27.22 The Impact of the Attack in Benghazi and the War in Libya on American Domestic and Foreign Politics

From  Broadcast Broadcast Center Staff 0 likes 24 plays

Quick Tip: MFA Fatigue Attacks

This series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important questions and have some fun in…

From  Stefanie Clerkin 3 likes 439 plays

SmartCookie: Distributed In-Network SYN Flooding Mitigation, Sophia Yoo, G2 (3938706)

SYN-flooding attacks, a pervasive class of DDoS attacks, target the TCP three-way handshake to exhaust server resources, leading to poor performance for legitimate clients. In this work, we present…

From  Research Princeton Research Day 0 likes 118 plays

Shuwen Deng 03.21.2022 Job Talk P.2

From  Broadcast Broadcast Center Staff 0 likes 76 plays

Shuwen Deng 03.21.2022 Job Talk P.1

From  Broadcast Broadcast Center Staff 0 likes 62 plays

The complications of telling the story of 9/11 by Clifford Chanin

From  Broadcast Broadcast Center Staff 0 likes 5 plays

Wintersession - Information Security in the News

As we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign hacking groups, the SolarWinds…

From  Stefanie Clerkin 0 likes 14 plays

In Plain View - Open Source Intelligence

(InfoSec 201) Did you ever think about all of the data publicly available? What if bad actors collect this “open source intelligence” and use it to attack you or Princeton University? …

From  Stefanie Clerkin 0 likes 42 plays

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View the full resource page here.

From  Jonathan Henry 0 likes 136 plays

Webinar: Ask the ISO

Kick back, relax, and join us for an informal, live Q & A conversation. We’ll share answers to common questions we are asked and provide time for you to ask your questions about information…

From  Stefanie Clerkin 0 likes 34 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…

From  CI Center for Information Technology Policy 0 likes 15 plays