Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

USENIX Enigma Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore data integrity attacks in investigative domains through real case studies presented at USENIX Enigma 2016. Delve into the challenges faced by organizations like the World Bank, FBI, EPA, and City of Cincinnati when dealing with malicious actors who manipulate data collection and analytics processes. Learn about strategies employed to disguise illegal activities, including misinformation, abuse of corporate structures, and exploitation of predictive analytics algorithms. Discover how these tactics are used to avoid regulatory oversight, sanctions, and investigations by national and multinational authorities. Gain insights into the importance of data integrity in heterogeneous data systems facing big data challenges. Examine the anatomy of data integrity attacks, including ability misrepresentation and environment misrepresentation, as well as defense strategies such as mining expert data systems and leveraging data superiority. Understand the broader implications of data integrity issues beyond international finance and development, and consider the call to action for implementing data integrity by design.

Syllabus

Intro
Data Integrity Based Attacks in Investigative Domains
Automated Reasoning and Machine Intelligence
International Procurement
National Entity buys goods and services
Anatomy of an Attack on Data Integrity
Ability Misrepresentation
Environment Misrepresentation
Strategy of Data Integrity Attacks
Identity Obfuscation
PricewaterhouseCoopers
Strategy of Data Integrity Defense
Mining Expert Data Systems
Learning from the Experts
Leveraging Data Superiority
Not Just a Problem for International Finance and Development
Data Integrity by Design
Call to Action!

Taught by

USENIX Enigma Conference

Reviews

Start your review of Data Integrity Based Attacks in Investigative Domains - USENIX Enigma Conference - 2016

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.