Skip to content

Commit

Permalink
changed typos in introdution.
Browse files Browse the repository at this point in the history
  • Loading branch information
ELSuitorHarvard committed Nov 22, 2023
1 parent 156d651 commit 09f8241
Showing 1 changed file with 6 additions and 6 deletions.
12 changes: 6 additions & 6 deletions privacy_security.qmd
Original file line number Diff line number Diff line change
Expand Up @@ -59,9 +59,9 @@ These events highlighted the growing need to address privacy in ML
systems. In this chapter, we explore privacy and security considerations
together, as they are inherently linked in ML:

- Privacy refers to controlling access to sensitive user data, such asfinancial information or biometric data collected by an MLapplication.
- Privacy refers to controlling access to sensitive user data, such as financial information or biometric data collected by an ML application.

- Security protects ML systems and data from hacking, theft, andmisuse.
- Security protects ML systems and data from hacking, theft, and misuse.

For example, an ML-powered home security camera must secure video feeds
against unauthorized access. It also needs privacy protections to ensure
Expand All @@ -88,13 +88,13 @@ and safeguards.
In this chapter, we will be talking about security and privacy together,
so there are key terms that we need to be clear about.

- **Privacy:** For instance, when a fitness tracker collects dataabout your daily activities, privacy concerns revolve around whoelse can access this data---whether it's just the company, theuser, or unwanted third parties as well.
- **Privacy:** For instance, when a fitness tracker collects data about your daily activities, privacy concerns revolve around who else can access this data---whether it's just the company, the user, or unwanted third parties as well.

- **Security:** Consider an ML-powered home security camera thatidentifies and records potential threats. The security aspectwould involve ensuring that these video feeds and recognitionmodels aren't accessible to hackers.
- **Security:** Consider an ML-powered home security camera that identifies and records potential threats. The security aspect would involve ensuring that these video feeds and recognition models aren't accessible to hackers.

- **Threat:** Using our home security camera example, a threat couldbe a hacker trying to gain access to live feeds or stored videos,or using false inputs to trick the system.
- **Threat:** Using our home security camera example, a threat could be a hacker trying to gain access to live feeds or stored videos, or using false inputs to trick the system.

- **Vulnerability:** A common vulnerability might be a poorly securednetwork through which the camera connects to the internet, whichcould be exploited to access the data.
- **Vulnerability:** A common vulnerability might be a poorly secured network through which the camera connects to the internet, which could be exploited to access the data.

## Historical Precedents

Expand Down

0 comments on commit 09f8241

Please sign in to comment.