Description
The following are the highlights of the course:
– Identifying threats, risks, and vulnerabilities in modern information systems and networks.
– Evaluating privacy risk using quantifiable metrics and applying de-identifying models like k-anonymity, l-diversity, and t-closeness.
– Navigating the shift from probabilistic to provable privacy with different privacy techniques.
– Linking datasets securely with privacy-preserving record linkage methods.
– Using cutting-edge tools for data encryption, anonymization, and secure sharing.


