Privacy, Consent and Security Within Modern Applications
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Being a security target is costly
Equifax breach focused attention on open source risk
So what is "data" anyway?
What about "data privacy" then?
Example: New user with email identifier
Example: Assumption of valid email
"Consent" is a tricky concept
"Trust" is the most complex of the concepts
Top 12 questions when managing collected data
GOPR actions not just for data breaches
Reputational damage factors
Anonymizing shared data doesn't guarantee privacy
Web service APIs change risk dynamic
Managing consent can be complicated
loT development requires multiple disciplines
Identity security targets from platform requirements
Select development frameworks and environment
Continuous security assessments during development
Continuous security assessments during build
Confirm governance and security target progress
Key open source centric takeaways
Taught by
Linux Foundation
Tags
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam