Chapter 2 : De-Identification
Valeria seeks your expertise in implementing De-Identification tactics to securely share her mercenaries’ information with a powerful galactic arms dealer for a business partnership.
Shadows database, houses sensitive information about Valeria’s deadly mercenaries. Valeria implores your help to assess the data masking techniques used for sharing the mercenary personal information with a galactic arms conglomerate.
Key Takeaways:
✅ Understand how de-identification works
✅ Get introduced to concepts around input and output privacy
✅ Get familiar with practical de-identification techniques
✅ Learn about the concepts behind differential privacy
✅ Get introduced to privacy threat modeling
Last updated
Was this helpful?