Why the Equifax Breach Should Not Have Mattered
نویسنده
چکیده
©2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Abstract—Data security, which is concerned with the prevention of unauthorized access to computers, databases, and websites, helps protect digital privacy and ensure data integrity. It is extremely difficult, however, to make security watertight, and security breaches are not uncommon. The consequences of stolen credentials go well beyond the leakage of other types of information because they can further compromise other systems. This paper criticizes the practice of using clear-text identity attributes, such as Social Security or driver’s license numbers—which are in principle not even secret—as acceptable authentication tokens or assertions of ownership, and proposes a simple protocol that straightforwardly applies public-key cryptography to make identity claims verifiable, even when they are issued remotely via the Internet. This protocol has the potential of elevating the business practices of credit providers, rental agencies, and other service companies that have hitherto exposed consumers to the risk of identity theft, to where identity theft becomes virtually impossible.
منابع مشابه
The Right to Prisoners’ Privacy: Dimensions, Effects and Indicators.
The right to privacy is subject was defined by Shariah and law and it refer to exploration prohibition and kind of human life aspects which are called positivism area. Article constitution is known as one of the most important rights for people in community closely linked to the right to privacy. The authors, considering that the prisoners are also human and his conviction should not deprive h...
متن کاملGlobal Health Politics: Neither Solidarity nor Policy; Comment on “Globalization and the Diffusion of Ideas: Why We Should Acknowledge the Roots of Mainstream Ideas in Global Health”
The global health agenda has been dominating the current global health policy debate. Furthermore, it has compelled countries to embrace strategies for tackling health inequalities in a wide range of public health areas. The article by Robert and colleagues highlights that although globalization has increased opportunities to share and spread ideas, there is still great asymmetry of power accor...
متن کاملDiffusion of Innovation in Mental Health Policy Adoption: What Should We Ask about the Quality of Policy and the Role of Stakeholders in this Process?; Comment on “Cross-National Diffusion of Mental Health Policy”
In his recent study, Gordon Shen analyses a pertinent question facing the global mental health research and practice community today; that of how and why mental health policy is or is not adopted by national governments. This study identifies becoming a World Health Organization (WHO) member nation, and being in regional proximity to countries which have adopted a mental health policy as suppor...
متن کاملOn Why the United States Should Not Attack Iran: A Conservative, Evangelical Christian Response
In the midst of American intervention in Afghanistan and Iraq, and in the aftermath of the presidential election in Iran, support for American involvement in Iran has increased in some circles. In this piece, our desire is to give a conservative, evangelical Christian response to why America should not support any military action against Iran. A position advocated by many of us is “Just War.” I...
متن کاملThe Fundamental Reasons Why Laptop Computers should not be Used on Your Lap
As a tendency to use new technologies, gadgets such as laptop computers are becoming more popular among students, teachers, businessmen and office workers. Today laptops are a great tool for education and learning, work and personal multimedia. Millions of men, especially those in the reproductive age, are frequently using their laptop computers on the lap (thigh). Over the past several years, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.00129 شماره
صفحات -
تاریخ انتشار 2017