Search for tag: "attacks"

Beowulf and Alien

Gina Brandolino compares Beowulf and Alien. View the full resource page here.

From  Jonathan Henry on January 25th, 2021 0 likes 66 plays

Webinar: History of Cyber Security

(InfoSec 101) Ransomware, spyware viruses, worms…when did it all begin? Today information security is often in the news due to the significant rise in cyber crime. Look back 15-20 years, and…

From  Stefanie Clerkin on November 5th, 2020 0 likes 20 plays

Webinar: Cyber Security in an Uncertain Time

(InfoSec 101) Life has certainly changed. We went from normal life to global pandemic in what seems like overnight. As a result, many of us are now working or studying from our kitchen tables or…

From  Stefanie Clerkin on November 4th, 2020 0 likes 16 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…

From  CI Center for Information Technology Policy on October 5th, 2020 0 likes 13 plays

Webinar: Spotting and Preventing Social Engineering Attacks

(InfoSec 101) Millions of dollars are lost every year due to scams. But why would anyone willingly give away their personal information? Social engineering is the art of influencing a person to make…

From  Tara Schaufler on May 21st, 2020 0 likes 41 plays

IV. How Do I Report Online Abuse?

Module 4 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive on April 20th, 2020 0 likes 53 plays

III. How Do I Respond to Online Abuse?

Module 3 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive on April 20th, 2020 0 likes 68 plays

II. How Do I Proactively Address Incidents of Online Abuse?

Module 2 of 4 in a series addressing online abuse and harassment.Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive on April 20th, 2020 0 likes 79 plays

I. What is Online Abuse?

Module 1 of 4 in a series addressing online abuse and harassment. Visit our website to learn more about addressing electronic and online attacks. Download our Addressing Online Abuse Tip Sheet.

From  Princeton Inclusive on April 20th, 2020 0 likes 114 plays

Mexico's 2018 Elections: Elections and Criminal Violence in Mexico: The Elephant in the Room

Guillermo Trejo, Associate Professor of Political Science and Faculty Fellow at the Kellogg Institute for International Studies, University of Notre Dame

From  PL Latin American Studies on April 19th, 2018 0 likes 2 plays