Главная
Study mode:
on
1
Intro
2
Data Integrity Based Attacks in Investigative Domains
3
Automated Reasoning and Machine Intelligence
4
International Procurement
5
National Entity buys goods and services
6
Anatomy of an Attack on Data Integrity
7
Ability Misrepresentation
8
Environment Misrepresentation
9
Strategy of Data Integrity Attacks
10
Identity Obfuscation
11
PricewaterhouseCoopers
12
Strategy of Data Integrity Defense
13
Mining Expert Data Systems
14
Learning from the Experts
15
Leveraging Data Superiority
16
Not Just a Problem for International Finance and Development
17
Data Integrity by Design
18
Call to Action!
Description:
Explore data integrity attacks in investigative domains through real case studies presented at USENIX Enigma 2016. Delve into the challenges faced by organizations like the World Bank, FBI, EPA, and City of Cincinnati when dealing with malicious actors who manipulate data collection and analytics processes. Learn about strategies employed to disguise illegal activities, including misinformation, abuse of corporate structures, and exploitation of predictive analytics algorithms. Discover how these tactics are used to avoid regulatory oversight, sanctions, and investigations by national and multinational authorities. Gain insights into the importance of data integrity in heterogeneous data systems facing big data challenges. Examine the anatomy of data integrity attacks, including ability misrepresentation and environment misrepresentation, as well as defense strategies such as mining expert data systems and leveraging data superiority. Understand the broader implications of data integrity issues beyond international finance and development, and consider the call to action for implementing data integrity by design. Read more

Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

USENIX Enigma Conference
Add to list
00:00
-00:12