Главная
Study mode:
on
1
Intro
2
Data Privacy
3
Offensive techniques
4
Technique comparison dimensions
5
Pseudonymization
6
Hashing
7
Making hash cracking a bit more difficult
8
Credit card numbers
9
Token Vault with Databricks Delta
10
Synthetic data
11
Generalisation
12
Binning
13
Truncating: IP addresses
14
Rounding
15
Auditing
16
Remote desktop
17
Screenshot prevention
18
Feedback
Description:
Explore data privacy techniques and protection of personally identifiable information in this 27-minute talk from Databricks. Compare offensive and defensive approaches, learning about k-anonymity, quasi-identifiers, and various methods like suppression, perturbation, obfuscation, encryption, tokenization, and watermarking. Discover elementary code examples for implementing these techniques when third-party products are unavailable. Examine approaches to minimize data exfiltration risks and understand how Databricks Delta can assist in making datasets privacy-ready. Gain insights into the long-term implications of different privacy methods and their effects on statistical usefulness, re-identification risks, data schema, format preservation, and read/write performance.

Data Privacy Techniques with Apache Spark - Defensive and Offensive Approaches

Databricks
Add to list
0:00 / 0:00