Anonymisation: theory and practice; Mark Elliot (part 1 of 3)

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ก.พ. 2025

ความคิดเห็น • 6

  • @JoaoPalma
    @JoaoPalma 2 ปีที่แล้ว

    very interesting video which I'm hopping will help me get a job in Research!

  • @logiciananimal
    @logiciananimal 4 ปีที่แล้ว

    I am not sure if this will be read, but - does the NCRM collaborate with IT security threat modellers on these matters?

    • @msrbcel
      @msrbcel 4 ปีที่แล้ว

      HI there NCRM does not but UKAN - the source for this video collaborates with a range of organisations - did you have something in mind?

    • @logiciananimal
      @logiciananimal 4 ปีที่แล้ว

      @@msrbcel I was just wondering - since buy in by employers wanting anonymization but yet not to have their IT security run threat modelling seems to happen more than one would hope. There are claims "they follow best practices" in spite of this, and knowing *specifically* what IT security steps were taken would help "meet in the middle" here. For example, knowing that there was work done with SANS or CERT/CC or the like would at least give one a contact. :) Better, publishing the results of the exercise would help understand where one might disagree. For example, I have seen.

  • @ouattarabertrand3397
    @ouattarabertrand3397 4 ปีที่แล้ว

    Very interesting publication

  • @mustafa.06
    @mustafa.06 3 ปีที่แล้ว

    4:35