1/412
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Data Privacy
The practice of protecting personal information from unauthorized access and misuse in the digital world.
Privacy Enhancing Technologies (PETs)
Technologies that allow the use of personal data while simultaneously protecting the privacy of individuals.
Anonymization
The process of removing identifiable information from data sets, making it impossible to link data back to an individual.
Pseudonymization
A data protection technique that replaces direct identifiers with fake identifiers while maintaining a link to the original data through a mapping table.
K-Anonymity
A method of anonymization that ensures each individual in a dataset cannot be distinguished from at least k-1 others, thus hiding them in a group.
Quasi Identifiers
Attributes that are not direct identifiers but can be combined with other data to identify an individual (e.g., age, zip code).
Differential Privacy
A technique that adds noise to data to protect individual privacy while allowing for aggregate analysis without revealing personal information.
Federated Learning
A decentralized approach to machine learning where models are trained locally on devices without transferring personal data to a central server.
Homomorphic Encryption
A form of encryption that allows computations to be performed on encrypted data without needing to decrypt it first.
Zero Knowledge Proof
A cryptographic method that allows one party to prove to another that they know a value without revealing the value itself.
Synthetic Data
Artificially generated data that mimics real data patterns, used for training machine learning models without compromising privacy.
GDPR (General Data Protection Regulation)
A comprehensive data protection law in the EU that governs how personal data is collected, processed, and stored.
Privacy by Design
An approach that integrates privacy considerations into the development of technologies and systems from the outset.
Noise Addition
The process of introducing random data to a dataset to obscure the original data and protect individual privacy.
Data Privacy
The practice of protecting personal information from unauthorized access and misuse in the digital world.
Privacy Enhancing Technologies (PETs)
Technologies that allow the use of personal data while simultaneously protecting the privacy of individuals.
Anonymization
The process of removing identifiable information from data sets, making it impossible to link data back to an individual.
Pseudonymization
A data protection technique that replaces direct identifiers with fake identifiers while maintaining a link to the original data through a mapping table.
K-Anonymity
A method of anonymization that ensures each individual in a dataset cannot be distinguished from at least k-1 others, thus hiding them in a group.
Quasi Identifiers
Attributes that, when combined with other data, can potentially identify an individual, such as age, gender, or zip code.
Differential Privacy
A technique that adds noise to data to protect individual privacy while allowing for aggregate analysis without revealing personal information.
Federated Learning
A decentralized approach to machine learning where models are trained locally on devices without transferring personal data to a central server.
Homomorphic Encryption
A form of encryption that allows computations to be performed on encrypted data without needing to decrypt it first.
Zero Knowledge Proof
A cryptographic method that allows one party to prove to another that they know a value without revealing the value itself.
Synthetic Data
Artificially generated data that mimics real data patterns, used for training machine learning models without compromising privacy.
GDPR (General Data Protection Regulation)
A comprehensive data protection law in the EU that governs how personal data is collected, processed, and stored.
Privacy by Design
An approach that integrates privacy considerations into the development of technologies and systems from the outset.
Noise Addition
The process of introducing random data to a dataset to obscure individual entries and protect privacy.
Privacy
The right of individuals to control their personal information and protect it from unauthorized access or disclosure.
Data Breach
An incident where unauthorized access to sensitive data occurs, potentially leading to the exposure of personal information.
GDPR
General Data Protection Regulation, a comprehensive data protection law in the European Union that governs how personal data is handled.
Personal Data
Any information that relates to an identified or identifiable natural person, including names, identification numbers, and location data.
Data Protection Regulations
Laws and guidelines established to protect personal data and ensure privacy rights for individuals.
Metadata
Data that provides information about other data, such as the time and duration of a phone call, often collected without the user's knowledge.
Dark Patterns
User interface designs that trick users into making choices that they might not otherwise make, often related to data sharing.
Data Footprint
The trail of data that individuals leave behind through their online activities, which can be tracked and analyzed.
Informed Consent
The process of obtaining permission from individuals before collecting or using their personal data, ensuring they understand how their data will be used.
Threat Modeling
A process used to identify and assess potential threats to data privacy and security during the development of a product or system.
Non-repudiation
A principle that ensures a person cannot deny the validity of their actions or data, particularly in the context of data sharing and privacy.
Privacy by Design
An approach that integrates privacy considerations into the development of products and services from the outset.
Data Minimization
The practice of limiting data collection to only what is necessary for a specific purpose, reducing the risk of data breaches.
Anonymization
The process of removing personally identifiable information from data sets, making it impossible to identify individuals.
Privacy
A topic often ignored in software development, focusing on the protection of personal information and data.
Fake name
A dummy name that students are required to enter for anonymity during the icebreaker session.
Group assignment
A collaborative task where students are encouraged to form groups of 5 or 6 members for their coursework.
Attack Vectors
Methods or pathways through which an attacker can gain access to a system or network.
Race Attack
A type of attack where two transactions compete to be confirmed, potentially leading to double spending.
Fire Attack
An attack similar to a race attack, where the attacker makes transactions without broadcasting them immediately.
51% Attack
An attack where a miner or group of miners controls more than 50% of the network's hashing power, allowing them to manipulate the blockchain.
Proof of Work
A consensus model where miners compete to solve complex mathematical problems to validate transactions and create new blocks.
Proof of Stake
A consensus model where validators stake their assets to be randomly selected to create and publish the next block, without solving puzzles.
Round Robin
A consensus model where publishing nodes take turns creating blocks, suitable for private or permissioned blockchains.
Denial of Service (DoS) Attack
An attack that prevents or impairs the authorized use of network systems or applications by exhausting resources.
Distributed Denial of Service (DDoS) Attack
A type of DoS attack that uses multiple systems to flood a target with traffic, overwhelming its resources.
Network Bandwidth
The capacity of the network links connecting a server to the internet, which can be targeted in DoS attacks.
System Resources
The limited resources available on a system, such as CPU and memory, which can be overloaded in DoS attacks.
Application Resources
Specific resources of applications, such as web servers or databases, that can be targeted to disrupt services.
CyberSLAM
An attack that targets application resources by generating resource-heavy requests to overload a server.
Ping of Death
A type of attack that sends oversized packets to crash a system.
Teardrop Attack
An attack that exploits vulnerabilities in older operating systems by sending fragmented packets that the system cannot reassemble.
Source Address Spoofing
A technique where an attacker falsifies the source IP address of packets to hide their identity.
Random Spoofing
A method of source address spoofing where the attacker uses random IP addresses to obscure their identity.
Softness Spoofing
A spoofing technique where the source address is random but within the same subnet as the target.
Fixed Spoofing
A method where a single, fixed IP address is used to make the traffic appear legitimate.
NIST
The National Institute of Standards and Technology, which provides definitions and guidelines related to cybersecurity.
Hacktivist
An activist who uses hacking to promote political agendas or social change, often through DDoS attacks.
Cyber Warfare
State-sponsored cyber attacks aimed at disrupting or damaging another nation's critical infrastructure.
Memory Pool
A collection of unconfirmed transactions in a blockchain network, which can be visualized for better understanding.
Network Security
A field focused on protecting computer networks from threats, including unauthorized access and attacks.
Network Anonymity
The practice of concealing the identities of the sender and receiver in network communications to protect privacy.
Intrusion Detection System (IDS)
A system that monitors network traffic for suspicious activity and potential threats.
Intrusion Prevention System (IPS)
A system that actively prevents detected threats from causing harm to the network.
Firewall
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Internet of Things (IoT)
A network of interconnected devices that communicate and exchange data over the internet.
Cloud Security
The set of policies, technologies, and controls designed to protect data, applications, and infrastructures involved in cloud computing.
Blockchain
A decentralized digital ledger technology that records transactions across many computers securely and transparently.
K-Anonymity
A privacy concept that ensures an individual's data cannot be distinguished from at least K other individuals' data, enhancing anonymity.
Differential Privacy
A technique that adds noise to data to protect individual privacy while allowing for useful data analysis.
Whistleblower
An individual who exposes information or activity within an organization that is deemed illegal, unethical, or not correct.
Edward Snowden
A former NSA contractor who leaked classified information about government surveillance programs, highlighting issues of privacy and security.
Tails
A live operating system that can be started on almost any computer from a USB stick or a DVD, designed for privacy and anonymity.
Tor
The Onion Router, a free software for enabling anonymous communication on the internet by routing traffic through a network of volunteer-operated servers.