Privacy, Consent and Security Within Modern Applications
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Being a security target is costly
Equifax breach focused attention on open source risk
So what is "data" anyway?
What about "data privacy" then?
Example: New user with email identifier
Example: Assumption of valid email
"Consent" is a tricky concept
"Trust" is the most complex of the concepts
Top 12 questions when managing collected data
GOPR actions not just for data breaches
Reputational damage factors
Anonymizing shared data doesn't guarantee privacy
Web service APIs change risk dynamic
Managing consent can be complicated
loT development requires multiple disciplines
Identity security targets from platform requirements
Select development frameworks and environment
Continuous security assessments during development
Continuous security assessments during build
Confirm governance and security target progress
Key open source centric takeaways
Taught by
Linux Foundation
Tags
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera