Summary
To summarize, we have acquired a high-level understanding of privacy, data privacy, PbD concepts, and privacy threat modeling. Furthermore, we have explored the importance of privacy-preserved ML through a case study.
Moving forward, the next chapter will provide a brief overview of different types of ML (supervised and unsupervised) and the phases involved in ML (data extraction, data preparation, model development, model deployment, and inferencing). Additionally, we will examine the privacy threats and attacks associated with each phase.