Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The privacy implications of cyber security systems: a technological survey
Toch E., Bettini C., Shmueli E., Radaelli L., Lanzi A., Riboni D., Lepri B. ACM Computing Surveys51 (2):1-27,2018.Type:Article
Date Reviewed: Jun 15 2018

This paper provides an accessible overview of the issues that spring up when looking into the privacy of cybersecurity systems. The paper starts by classifying cybersecurity technologies using four different categories:

(1) System architecture: this can be a standalone application, a centralized client-server, or a collaborative architecture.
(2) Type of detection: defense mechanisms can work on different levels (hardware, network, or application) and then detect based on either anomalies or signatures.
(3) Type of data: cybersecurity technologies have different types of data at their disposal, and can work on application data, file data, or network data.
(4) Ecosystems: this category addresses the kind of environment in which the detection mechanism is used, that is, enterprise, mobile devices, or the Internet of Things (IoT).

The paper then uses a large table to expand on the four categories. For each category, it identifies the network, content filtering, and endpoint solutions, as well as the overarching suites. Each cell includes many references.

A final ingredient is a model of privacy risk assessment. The paper describes, in an accessible way, how risks are identified in the areas of data exposure, level of identification, data sensitivity, and level of user control. With the necessary ingredients introduced, the paper then provides an analysis of the privacy implications of the four different cybersecurity technologies.

Finally, the paper introduces guiding principles for examining each of the (sub)categories in the classification. This is then applied to a use case of home automation and the possible privacy implications of cybersecurity technologies. Because this is a fairly generic use case, the privacy implications listed in the final table are also generic.

This paper introduces important concepts and provides a taxonomy of cybersecurity systems when dealing with their privacy implications. It can provide new researchers in the field with some food for thought.

Reviewer:  Jeroen van der Ham Review #: CR146092 (1808-0463)
Bookmark and Share
 
Privacy (K.4.1 ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Privacy": Date
Handbook of personal data protection
Madsen W., Stockton Press, New York, NY, 1992. Type: Book (9780333569207)
Nov 1 1993
Privacy and security issues in information systems
Turn R., Ware W., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
Data bases
Burnham D., Wadsworth Publ. Co., Belmont, CA, 1985. Type: Book (9780534042578)
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy