YoVDO

How to Make Sure Your Data Science Isn't Vulnerable to Attack

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Statistics & Probability Courses Data Science Courses Data Analysis Courses Machine Learning Courses Algorithms Courses Metadata Courses Data Exploration Courses

Course Description

Overview

Explore data science security principles and best practices in this 57-minute conference talk from BSidesLV 2016. Delve into data exploration preparation, algorithm application, and effective communication techniques. Learn how to establish strong foundations, implement proper naming conventions, and conduct thorough analysis. Discover methods for detecting new vulnerabilities, handling metadata, and addressing data quirks. Gain insights on balancing caveats with usability, understanding different data perspectives, and extracting actionable insights from vulnerability assets. Examine the importance of basic statistics, common pitfalls to avoid, and lessons learned in measuring risk. Enhance your ability to secure data science projects and communicate findings effectively across various infosec contexts.

Syllabus

Intro
What is data science
Data exploration preparation principles
Applying the algorithms
Communication
Machine Learning
Strong Foundations
Measure
Naming conventions
Detect
Analysis
New detection
New vulnerabilities
Metadata
Data quirks
Check new detection
How to communicate
Data flow in infosec
Balance between caveats and usability
Different perspectives on the data
Vulnerability assets
Actual insight
Actionable insight
Beyond your data set
Other data sets
Get more data
The takeaway
Importance of basic statistics
Common mistakes
Lessons learned
Measuring risk


Taught by

BSidesLV

Related Courses

Information Theory
The Chinese University of Hong Kong via Coursera
Intro to Computer Science
University of Virginia via Udacity
Analytic Combinatorics, Part I
Princeton University via Coursera
Algorithms, Part I
Princeton University via Coursera
Divide and Conquer, Sorting and Searching, and Randomized Algorithms
Stanford University via Coursera