The Privacy Implications of Cyber Security Systems

Author:

Toch Eran1ORCID,Bettini Claudio2,Shmueli Erez1,Radaelli Laura1,Lanzi Andrea2,Riboni Daniele3,Lepri Bruno4

Affiliation:

1. Tel Aviv University, Tel Aviv, Israel

2. University of Milan, Milano, Italy

3. University of Cagliari, Cagliari, Italy

4. Fondazione Bruno Kessler, Trento, Italy

Abstract

Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. We suggest a taxonomy for privacy risks assessment of information security technologies, based on the level of data exposure, the level of identification of individual users, the data sensitivity and the user control over the monitoring, and collection and analysis of the data. We discuss our results in light of the recent technological trends and suggest several new directions for making these mechanisms more privacy-aware.

Funder

Ministry of Science, Technology and Space, Israel

Ministry of Foreign Affairs and International Cooperation, Italy

Israeli-Italian Scientific and Technological Cooperation program

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference141 articles.

1. On the Unicity of Smartphone Applications

2. Italian Data Protection Authority. 2016. Processing of personal data of employees by e-mail and other work tools. Retrieved from http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/5408460. Italian Data Protection Authority. 2016. Processing of personal data of employees by e-mail and other work tools. Retrieved from http://www.garanteprivacy.it/web/guest/home/docweb/-/docweb-display/docweb/5408460.

3. Privacy protection in pervasive systems: State of the art and technical challenges

4. New directions in privacy-preserving anomaly detection for network traffic

Cited by 55 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Privacy-Enhancing Technologies;Computer and Information Security Handbook;2025

2. A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks;Ad Hoc Networks;2024-11

3. Risks to cybersecurity from data localization, organized by techniques, tactics and procedures;Journal of Cyber Policy;2024-08-26

4. Enhancing Privacy Measures in Healthcare within Cyber-Physical Systems through Cryptographic Solutions;ICST Transactions on Scalable Information Systems;2024-04-11

5. Unveiling the Achilles' Heel: A Comprehensive Exploration of Vulnerabilities in RMI and Bindshell Communication;2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO);2024-03-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3