Published June 21, 2022 | Version v1
Lesson Open

De-identification techniques (Anonymize - Pseudonymize)

Description

Basic techniques and tools for protecting your (personal) sensitive data. The protection model(K-anonymity, L-diversity, T-closeness) will be handled. Different levels of access control and best practices on passwords. 

Files

SecurityofData_LCRDM_20220615_toshare.pdf

Files (3.3 MB)

Name Size Download all
md5:38bc02e62566ac0332fd494eb29932b2
3.3 MB Preview Download