YoVDO

Workload Modeling for Security and Privacy in Databases

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Databases Courses Privacy Courses Data Collection Courses Behavioral Patterns Courses Insider Threats Courses

Course Description

Overview

Explore workload modeling techniques for enhancing security and privacy in databases through this 22-minute lecture by Gokhan Kul from UMass Dartmouth. Delve into traditional workload modeling approaches, performance metrics, and the concept of Pocket Data. Examine behavioral patterns and database trends, with a focus on insider threats and query monitoring. Learn about regularizing queries, detecting activity changes, and data collection methods. Gain insights from the presented results and engage with the Q&A session to deepen your understanding of this critical aspect of database management and cybersecurity.

Syllabus

Introduction
Traditional workload modeling
Performance metrics
Pocket Data
Behavioral Patterns
Database Trends
Insider Threads
Query Monitoring
Regularizing Queries
Detecting Activity Changes
Data Collection
Results
Questions


Taught by

CAE in Cybersecurity Community

Related Courses

Psychology and Mental Health: Beyond Nature and Nurture
University of Liverpool via FutureLearn
التقييم والتشخيص والتأهيل النفسى للأطفال
Rwaq (رواق)
La comunicación laboral en el siglo XXI
University of California, Irvine via Coursera
Java Design Patterns & SOLID Design Principles
Udemy
Design Patterns in C# and .NET
Udemy