ssmithssmithk3307 ssmithssmithk3307 08-01-2024 Computers and Technology contestada Inference attacks may still be possible even after a database has been processed to be released to the public. Describe several methods that can be used to protect against inference attacks.