Security and privacy
نویسنده
چکیده
What are the crucial innovations in the history of security and privacy? The crucial innovations are related to our ability to make boundaries where there are none. We understand this now, but we haven’t for very long. In the electronic world, there are no natural boundaries, whether we are talking about national boundaries, corporate boundaries, or even the difference between my e-mail and me and my life and my privacy. All of those things are, at least at the outset, undifferentiated, because there are almost no costs to reproducing electronic information, and there are almost no boundaries to contain it. Clearly, you are aware of when you cross the border between Germany and Poland, walk Security and privacy have received a lot of attention recently. Fueled by the worldwide availability of information, restricting access to your own data becomes an issue relevant to both business and personal privacy. At the same time, the variety of attacks on and breaches of this privacy has become a real and common danger to everyone. The impact of being able to access any information from anywhere in the world is revolutionary and creates many opportunities for mankind. Unfortunately, it has also opened up opportunities for criminal and unethical individuals and groups. It lets people from countries with unregulated cyberlaws attack businesses and intrude on other people’s privacy. Early attacks on government and bank data were rather limited geographically or through the use of controlled channels, such as leased lines. They were also less visible and, once detected, easy to counteract. Today, attacks on any prominent Internet service can easily impact your needs, making them more noticeable. The impact on businesses can be even more dramatic. Recent denial of service attacks on Yahoo and other Internet companies cost millions of dollars. The companies that rely on the Internet for everyday business can not afford to go offline, let alone for long periods of time due to security breaches. Even as I was writing this introduction another virus— actually a worm—appeared on the Internet: ILOVEYOU. If started, it will, among other things, overwrite some system configuration files and then send emails to all the e-mail aliases in your Outlook address book, spreading itself further. This kind of virus both breaches security (it can destroy your configuration) and privacy (it uses your e-mail aliases and can hence send any other information). An even bigger problem is related to privacy. The Internet lets you easily access your own data but also lets others track your behavior, movement, and habits. The implications are numerous. Many companies realize that this is valuable information that they can trade to track what you buy and browse, from where you connect to the Internet, and so on. The world of wireless communication with all kinds of gadgets and innovative toys will open up even more opportunities for attacks. All of this creates many challenges for security and privacy experts today. Some are technical, such as scalability, more efficient cryptographic techniques, safe languages, and better secret key distribution. Social and legal aspects pose more challenges. People must be educated about what is socially acceptable behavior on the Internet, what is criminal, and what is legally binding. We need some strictly enforced regulations as well as some commonly accepted unwritten rules as soon as possible. Unfortunately, not all governments necessarily have the same interests as users. I’ve raised only some of the challenges of the security and privacy field. These interviews bring up many more interesting examples from the top experts in the field. Dan Geer is the CTO of @stake and the president of Usenix. Li Gong is the Director of Server Products at the Consumer and Embedded division of Sun Microsystems. Clifford Neuman is a professor at the University of Southern California and chief scientist at CyberSafe. Marcus Ranum is the CTO of Network Flight Recorder. Mary Ellen Zurko is a security architect at Iris Associates and is currently responsible for Lotus Notes’ active content security.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Concurrency
دوره 8 شماره
صفحات -
تاریخ انتشار 2000