2018
DOI: 10.1145/3172869
|View full text |Cite
|
Sign up to set email alerts
|

The Privacy Implications of Cyber Security Systems

Abstract: Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. We suggest a taxonomy for privacy risks assessment of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(19 citation statements)
references
References 95 publications
0
19
0
Order By: Relevance
“…Information theft violates individuals' privacy and cause organizations to lose a large amount of money and jeopardize their reputation, particularly after the establishment of the General Data Protection Regulation (GDPR) [23], which imposes significant fines on vendors whose customers have suffered from privacy violation. Toch et al [24] recently presented a comprehensive survey of common and novel cyber-attacks and analyzed them according to the type of privacy invasion. They also suggested a taxonomy for the assessment of privacy risks of information security technologies.…”
Section: Classification Of Malware By Malicious Behaviormentioning
confidence: 99%
“…Information theft violates individuals' privacy and cause organizations to lose a large amount of money and jeopardize their reputation, particularly after the establishment of the General Data Protection Regulation (GDPR) [23], which imposes significant fines on vendors whose customers have suffered from privacy violation. Toch et al [24] recently presented a comprehensive survey of common and novel cyber-attacks and analyzed them according to the type of privacy invasion. They also suggested a taxonomy for the assessment of privacy risks of information security technologies.…”
Section: Classification Of Malware By Malicious Behaviormentioning
confidence: 99%
“…Most efforts to improve cyber security focus on the inclusion of new technological approaches [15]. However, these security systems collect a large amount of data, which poses a serious threat to the privacy of persons protected by system [16].…”
Section: The Proposed Model To Evaluate Cyber Security Technologiesmentioning
confidence: 99%
“…Good design takes security, ease of access, and usability into account, striking a balance between protecting the system and ease of use. Good practice has evolved a number of practical approaches like minimizing attack surface area [7], establish secure defaults [8], using the principle of defence in depth [9], not trusting services [10], keeping security simple [11], and fixing security issues correctly [12].These approaches are used for maintaining and improving security which are so natural and important that they should be adopted as a first layer of protection as a matter of standard practice, even when more sophisticated approaches are also in use [13].…”
Section: A Good Security Design Practicementioning
confidence: 99%