![]() ![]() 1 INTRODUCTION In recent years, governments and corporations have increasingly relied on cyber-security systems to protect against increasing threats on networks, devices, and organizational and personal information. We discuss our results in light of the recent technological trends and suggest several new directions for making these mechanisms more privacy-aware. ![]() We suggest a taxonomy for privacy risks assessment of information security technologies, based on the level of data exposure, the level of identification of individual users, the data sensitivity and the user control over the monitoring, and collection and analysis of the data. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |