Page cover

๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification

Valeria seeks your expertise in implementing De-Identification tactics to securely share her mercenariesโ€™ information with a powerful galactic arms dealer for a business partnership.

Shadows database, houses sensitive information about Valeriaโ€™s deadly mercenaries. Valeria implores your help to assess the data masking techniques used for sharing the mercenary personal information with a galactic arms conglomerate.

Key Takeaways:

  • โœ… Understand how de-identification works

  • โœ… Get introduced to concepts around input and output privacy

  • โœ… Get familiar with practical de-identification techniques

  • โœ… Learn about the concepts behind differential privacy

  • โœ… Get introduced to privacy threat modeling

Last updated

Was this helpful?