1 |
4 |
Data Leaks |
|
- Context
- Literature review and definitions
- Case studies:
- Analysis, reflection, exploration of data leaks' problematics:
- prevention and detection measures
- mitigation of risks
- ethics
- data protection
- consumer perspective
- organization perspective
- Application of lessons to sensibilization (awareness) on
- individual context
- FEUP's context
- Conclusion
|
Ok, but:
- keep it simple, clear, to the point
|
|
|
|
|
2 |
3 |
Fake vs Accurate Information:
Deepfake Videos |
|
- Introduction
- Positive and negative applications
- Artificial Intelligence
- creation of a deepfake
- detection of a deepfake
- Other detection strategies
- List of information sources to be used in literacy awareness
actions
- Conclusion
|
Ok, but:
- keep it simple, clear, to the point
|
|
|
|
|
3 |
4 |
Security Strategies:
Cloud Access Security Broker |
|
- Backgroud of cloud protection
- Cloud Access Security Brokers
- definition
- advantages
- techniques
- User Entity and Behavior Analysis
- Machine Learning
- Statistical Modeling
- commercial offers
- limitations
- Conclusion
|
Ok, but:
- keep it simple, clear, to the point
- do not overuse acronyms nor "technical designations"
|
|
|
|
|
... |
|
|
|
|
|
|
|
|
|