Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

THE ARCHITECTURE OF PRIVACY. ON ENGINEERING TECHNOLOGIES THAT CAN DELIVER TRUSTWORTHY SAFEGUARDS
Título:
THE ARCHITECTURE OF PRIVACY. ON ENGINEERING TECHNOLOGIES THAT CAN DELIVER TRUSTWORTHY SAFEGUARDS
Subtítulo:
Autor:
BOWMAN, C
Editorial:
O´REILLY
Año de edición:
2015
Materia
SEGURIDAD Y CRIPTOGRAFIA
ISBN:
978-1-4919-0401-5
Páginas:
200
27,50 €

 

Sinopsis

Technology's influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product functionality, rather than add them late in the development process.

Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components-building blocks that you can combine in many ways. Policymakers, academics, students, and advocates unfamiliar with the technical terrain will learn how these tools can help drive policies to maximize privacy protection.

Restrict access to data through a variety of application-level controls
Use security architectures to avoid creating a single point of trust in your systems
Explore federated architectures that let users retrieve and view data without compromising data security
Maintain and analyze audit logs as part of comprehensive system oversight
Examine case studies to learn how these building blocks help solve real problems
Understand the role and responsibilities of a Privacy Engineer for maintaining your privacy architecture



Getting Started
Chapter 1What Is Privacy?
How to Think About Privacy
Why Privacy Is Important
Before You Get Started
Chapter 2Personal Data and Privacy
Data Collection: Understanding Privacy's First Frontier
Policy Considerations
Implementation Considerations
Conclusion
Chapter 3Case Studies in Data Collection
Google Street View WiFi: Inadvertent Over-Collection of Data
iPhone Location Database
Conclusion
Chapter 4Information Security: Protecting Data from Unauthorized Access
InfoSec Best Practices for Privacy-Protected Systems
Further Reading
Conclusion
Access and Control: Controlling Authorized Data Access
Chapter 5Security Architecture
Overview
Separating Roles, Separating Powers
Making Roles Secure
Conclusion
Chapter 6Access Controls
Overview
Access-Control Models
Types of Access
Managing Access
Strengths and Weaknesses of Access Control
Access Controls and the Fair Information Practice Principles (FIPPs)
When to Use Access Controls
Conclusion
Chapter 7Data Revelation
Overview
The Case for Data Revelation
Requirements of Data Revelation
Selective Revelation
Purpose-Driven Revelation
Scope-Driven Revelation
Hybrid Revelation and Practical Scoping
Designing for Data Revelation
Strengths and Weaknesses of Data Revelation
Data Revelation and the Fair Information Practice Principles (FIPPs)
When to Use Data Revelation
Conclusion
Oversight: Holding Users and Systems Accountable
Chapter 8Federated Systems
Overview
"Always-Onö Federation
Asynchronous Federation
Asking Out and Being Asked
Strengths and Weaknesses of Federated Systems
Federated Systems and the Fair Information Practice Principles (FIPPs)
When to Use Federated Architecture
Conclusion
Chapter 9Audit Logging
Overview
Why Are Audit Records Important?
But Auditing Is Easy, Right?
What Are the Challenges to Effective Auditing and How Do I Meet Them?
Audit Logging and the Fair Information Practice Principles (FIPPs)
Advanced Auditing Considerations
Conclusion
Chapter 10Data Retention and Data Purging
Overview
What Is Data Retention?
Why Is Data Retention Important?
How to Set Retention and Purge Policies
So You Want to Purge Data. Now What?
Practical Steps of Data Retention
Data Retention, Purging, and the FIPPs
Conclusion
Putting It All Together
Chapter 11Practical Applications and Use Cases
Basic Framework
Use Case #1: Social Media Analysis
Use Case #2: Secure Messaging
Use Case #3: Automated License Plate Readers (ALPR)
Conclusion
Chapter 12Enter the Privacy Engineer
The Role of the Privacy Engineer
Avoiding Privacy Tunnel Vision
Conclusion
Chapter 13The Future of Privacy
The "Deathö of Privacy
Legal Reform
Greater Transparency and Control
Privacy in Plain Sight
The Destiny of Data
Anonymization Under Siege
Expect the Unexpected