Privacy, Consent and Security Within Modern Applications
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Being a security target is costly
Equifax breach focused attention on open source risk
So what is "data" anyway?
What about "data privacy" then?
Example: New user with email identifier
Example: Assumption of valid email
"Consent" is a tricky concept
"Trust" is the most complex of the concepts
Top 12 questions when managing collected data
GOPR actions not just for data breaches
Reputational damage factors
Anonymizing shared data doesn't guarantee privacy
Web service APIs change risk dynamic
Managing consent can be complicated
loT development requires multiple disciplines
Identity security targets from platform requirements
Select development frameworks and environment
Continuous security assessments during development
Continuous security assessments during build
Confirm governance and security target progress
Key open source centric takeaways
Taught by
Linux Foundation
Tags
Related Courses
Cryptography IIStanford University via Coursera Microsoft Enterprise Mobility Suite
Microsoft via edX Social Media - What No One has Told You about Privacy
openHPI Windows 10 Features for a Mobile Workforce: Identity Management and Data Access
Microsoft via edX Health Professional Teaching Skills – Level 3 - Professionalism
University of Toronto via edX