Walkthrough: K-Anonymization: A Comparative Analysis of MinGen and Greedy Algorithms

Group Members Introduction In an era where data privacy is a growing concern, k-anonymity plays a crucial role in protecting sensitive information while preserving data utility. A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset [1], making it more difficult for …

AI in Threat Detection for Private Data Breaches : Case Study: Real-World Applications of AI in Threat Detection 

In today’s digital age where private data breaches pose significant risks to individuals and organizations alike, the role of Artificial Intelligence (AI) in safeguarding sensitive information has grown significantly. This project provides an overview of how AI identifies, mitigates, and responds to data breach threats more effectively than traditional methods. It will also provide real-world …

Shamir Secret Sharing

Walkthrough of the Teaching Aide: Shamir Secret Sharing  “Welcome! Today, we will dive into Shamir’s Secret Sharing”  Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …

EAGERBEE Malware: A New Variant That Targets Middle East.

The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …

Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)

Introduction We are delighted to introduce our group project: Beaver Multiplication Triples in Oblivious Transfer (OT). This project has been completed by A S M Nazimuddoullah and Fahim Uddin Very recently, the Bipartisan Senate AI Working Group pronounced substantially $32 billion per year being requisite [1] for AI safety research which pivots on privacy. A …

THE GROWING THREAT OF RANSOMEWARE ATTACK IN THE HEALTH CARE SECTOR – A CASE OF THE McLAREN HEALTH CARE HOSPITAL ATTACKS.

Ransomware attacks in the Healthcare sector has been on the rise in the past few years, and this may be as a result of what is at stake such as life, legacy system, patient record e.t.c McLaren Health care hospitals has experienced two ransomware attacks in the space of one year. The first rasnsomware attack …

Fact-Checking and Cybersecurity on Facebook: Consequences of Neglect

Meanwhile, Meta has completely dropped its fact-checking program. The latest update regarding moderation policies and practices from the CEO Mark Zuckerberg dated January 07,2025, highlighted a new direction credited by the company to free speech[1]. Critics say the move by Zuckerberg to “get back to our roots around free expression” could open the door to …

THREE QUESTIONS AND ANSWERS ON ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND E-COMMERCE PLATFORMS

2. Given the variability in privacy practices across platforms noted by Bradshaw et al. (2020), what steps can regulatory bodies take to ensure more consistent application of privacy standards?Answer: To address the inconsistencies highlighted by Bradshaw et al. (2020), regulatory bodies could create more unified, global standards for privacy policies, perhaps extending the principles of …

(Teaching Aide) ANALYSIS OF PRIVACY POLICY IN SOCIAL-MEDIA, EMAIL, AND ECOMMERCE PLATFORM

INTRODUCTION1.1 Background of the studyIn the modern digital age, personal data has become one of the most valuable resources forbusinesses, leading to significant concerns regarding privacy and user security. Platforms suchas social media, email services, and online shopping sites rely heavily on user data to drivetheir business models, often collecting vast amounts of personal information. …