
Architecture of Privacy
Beschreibung
Weitere Details
Weitere Ausgaben
Inhalt
- Intro
- Copyright
- Table of Contents
- Foreword
- Preface
- Who Should Read This Book
- Why We Wrote This Book
- A Word on Privacy and Technology Today
- Navigating This Book
- Safari® Books Online
- How to Contact Us
- Acknowledgments
- Courtney Bowman
- Ari Gesher
- John K. Grant
- Daniel Slate
- Part I. Getting Started
- Chapter 1. What Is Privacy?
- How to Think About Privacy
- Defining Privacy
- A Short History of U.S. Informational Privacy
- Today
- "East Coast" Code and "West Coast" Code
- Why Privacy Is Important
- Before You Get Started
- Chapter 2. Personal Data and Privacy
- Data Collection: Understanding Privacy's First Frontier
- Policy Considerations
- Implementation Considerations
- Conclusion
- Chapter 3. Case Studies in Data Collection
- Google Street View WiFi: Inadvertent Over-Collection of Data
- iPhone Location Database
- Conclusion
- Chapter 4. Information Security: Protecting Data from Unauthorized Access
- InfoSec Best Practices for Privacy-Protected Systems
- Further Reading
- Conclusion
- Part II. Access and Control: Controlling Authorized Data Access
- Chapter 5. Security Architecture
- Overview
- Separating Roles, Separating Powers
- Making Roles Secure
- The End User
- The Application Administrator
- The System Administrator
- The Hardware or Cloud Administrator
- The Network Administrator
- Conclusion
- Chapter 6. Access Controls
- Overview
- Access-Control Models
- Types of Access
- Basic Access
- Discovery Access
- Managing Access
- Role-Based Access
- Time-Based Access, or Data Leasing
- Functional Access
- Strengths and Weaknesses of Access Control
- Strengths
- Weaknesses
- Access Controls and the Fair Information Practice Principles (FIPPs)
- When to Use Access Controls
- Conclusion
- Chapter 7. Data Revelation
- Overview
- The Case for Data Revelation
- Requirements of Data Revelation
- Selective Revelation
- Purpose-Driven Revelation
- Scope-Driven Revelation
- Hybrid Revelation and Practical Scoping
- Designing for Data Revelation
- Strengths and Weaknesses of Data Revelation
- Strengths
- Weaknesses
- Data Revelation and the Fair Information Practice Principles (FIPPs)
- When to Use Data Revelation
- Conclusion
- Part III. Oversight: Holding Users and Systems Accountable
- Chapter 8. Federated Systems
- Overview
- "Always-On" Federation
- Asynchronous Federation
- Asking Out and Being Asked
- Strengths and Weaknesses of Federated Systems
- Strengths
- Weaknesses
- Federated Systems and the Fair Information Practice Principles (FIPPs)
- When to Use Federated Architecture
- Complex Regulatory Regimes
- Lack of Trust
- PR Imperatives
- Conclusion
- Chapter 9. Audit Logging
- Overview
- Why Are Audit Records Important?
- But Auditing Is Easy, Right?
- What Are the Challenges to Effective Auditing and How Do I Meet Them?
- Perspective
- Context
- Format and Readability
- Scale
- Retrievability
- Security
- Access Control
- Retention
- Audit Logging and the Fair Information Practice Principles (FIPPs)
- Advanced Auditing Considerations
- Reactive Versus Proactive Auditing
- Emergency Stop for Audit-Log Failures
- Audit the Auditors
- Conclusion
- Chapter 10. Data Retention and Data Purging
- Overview
- What Is Data Retention?
- Why Is Data Retention Important?
- How to Set Retention and Purge Policies
- So You Want to Purge Data. Now What?
- Nondeletion Purging (or Not-Quite-Gone)
- Deletion Purging (or Gradations of Gone)
- Practical Steps of Data Retention
- Data Retention, Purging, and the FIPPs
- Designing Deletes
- Conclusion
- Part IV. Putting It All Together
- Chapter 11. Practical Applications and Use Cases
- Basic Framework
- Use Case #1: Social Media Analysis
- Use Case #2: Secure Messaging
- Use Case #3: Automated License Plate Readers (ALPR)
- Conclusion
- Chapter 12. Enter the Privacy Engineer
- The Role of the Privacy Engineer
- Privacy Engineers: How to Find One
- Avoiding Privacy Tunnel Vision
- Conclusion
- Chapter 13. The Future of Privacy
- The "Death" of Privacy
- Legal Reform
- Greater Transparency and Control
- Privacy in Plain Sight
- The Destiny of Data
- Anonymization Under Siege
- Expect the Unexpected
- Index
- About the Authors
Systemvoraussetzungen
Dateiformat: PDF
Kopierschutz: Adobe-DRM (Digital Rights Management)
Systemvoraussetzungen:
- Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).
- Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
- E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist.
Mit Adobe-DRM wird hier ein „harter” Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.
Bitte beachten Sie: Wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!
Weitere Informationen finden Sie in unserer E-Book Hilfe.