PRIVACY VIOLATIONS |
. | This page
used in the following courses taught by Prof. Richardson
.
|
INTRODUCTION | b | In
many countries, people do not own the information which is collected about
them, that is to say, their personal data.
This information is considered the property of whatever credit card company, insurance firm, educational institution that collected the information. As a consequence of some outrageous violations of collecting and disseminating personal information, Canada, New Zealand and other countries have enacted tough laws which are binding on the companies that collect and pass on personal profile information (which we noted in Section 1 of this course when we presented the federal and provincial legislation dealing with this). Privacy violations are not, strictly speaking, criminal activity, but, depending on what is done with the information, it can be used for criminal purposes - such as assuming an identity for the purposes of obtaining credit, which could then be used to fraudulently buy products and services. As a person studying IT security, it would be your responsibility to understand that protecting the private personal information of people that have data held within your firm's IT systems, is critical to conduct effectively and without risk. WTGR |
Chpt 3 Types of
- Privacy Violations |
Privacy Violations
Schneier, page 29
If the attacker wants to know everything about
As Schneier says, "this attack harnesses the power of correlation" Data harvesting is only worthwhile doing if it can be automated, and computers allow the automation process to be done very effectively. Using good cryptography will thwart harvesters since they will not be easily able to identify if what they are looking for is in the target they are attacking. |
Chpt 3 Types of
- Privacy Violations |
|
Chpt 3 Traffic
|
Schneier gives
an amusing example noting that in the hours leading up to the 1991 bombing
of Iraq, pizza deliveries to the Pentagon increased one hundredfold - even
if you did not know what the generals and admirals were talking about,
it had to be something important from which there would be some serious
time spent on decision making.
|
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I | |
. |