CHF54.90
Download est disponible immédiatement
The Comprehensive Guide to Engineering and Implementing Privacy Best Practices
As systems grow more complex and cybersecurity attacks more relentless, safeguarding privacy is ever more challenging. Organizations are increasingly responding in two ways, and both are mandated by key standards such as GDPR and ISO/IEC 27701:2019. The first approach, privacy by design, aims to embed privacy throughout the design and architecture of IT systems and business practices. The second, privacy engineering, encompasses the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working systems.
In Information Privacy Engineering and Privacy by Design, internationally renowned IT consultant and author William Stallings brings together the comprehensive knowledge privacy executives and engineers need to apply both approaches. Using the techniques he presents, IT leaders and technical professionals can systematically anticipate and respond to a wide spectrum of privacy requirements, threats, and vulnerabilities-addressing regulations, contractual commitments, organizational policies, and the expectations of their key stakeholders.
. Review privacy-related essentials of information security and cryptography
. Understand the concepts of privacy by design and privacy engineering
. Use modern system access controls and security countermeasures to partially satisfy privacy requirements
. Enforce database privacy via anonymization and de-identification
. Prevent data losses and breaches
. Address privacy issues related to cloud computing and IoT
. Establish effective information privacy management, from governance and culture to audits and impact assessment
. Respond to key privacy rules including GDPR, U.S. federal law, and the California Consumer Privacy Act
This guide will be an indispensable resource for anyone with privacy responsibilities in any organization, and for all students studying the privacy aspects of cybersecurity.
Auteur
Dr. William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer security, computer networking, and computer architecture. He has authored 18 textbooks and, counting revised editions, a total of 70 books on various aspects of these subjects. His writings have appeared in numerous ACM and IEEE publications, including the Proceedings of the IEEE and ACM Computing Reviews. He has 13 times received the award for the best computer science textbook of the year from the Text and Academic Authors Association.
With more than 30 years in the field, he has been a technical contributor, a technical manager, and an executive with several high-technology firms. He has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems, ranging from microcomputers to mainframes. Currently he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.
He created and maintains the Computer Science Student Resource Site, at computersciencestudent.com. This site provides documents and links on a variety of subjects of general interest to computer science students and professionals.
He is a member of the editorial board of Cryptologia, a scholarly journal devoted to all aspects of cryptology. Dr. Stallings holds a PhD from M.I.T. in Computer Science and a B.S. from Notre Dame in electrical engineering.
Contenu
Preface xxii
PART I: OVERVIEW 1
Chapter 1: Security and Cryptography Concepts 2
1.1 Cybersecurity, Information Security, and Network Security 2
Security Objectives 3
The Challenges of Information Security 5
1.2 Security Attacks 6
Passive Attacks 8
Active Attacks 8
1.3 Security Services 10
Authentication 10
Access Control 11
Data Confidentiality 11
Data Integrity 11
Nonrepudiation 12
Availability Service 12
1.4 Security Mechanisms 12
1.5 Cryptographic Algorithms 13
Keyless Algorithms 14
Single-Key Algorithms 14
Two-Key Algorithms 15
1.6 Symmetric Encryption 15
1.7 Asymmetric Encryption 17
1.8 Cryptographic Hash Functions 20
1.9 Digital Signatures 22
1.10 Practical Considerations 23
Selection of Cryptographic Algorithms and Key Lengths 23
Implementation Considerations 24
Lightweight Cryptographic Algorithms 24
Post-Quantum Cryptographic Algorithms 25
1.11 Public-Key Infrastructure 25
Public-Key Certificates 25
PKI Architecture 27
1.12 Network Security 29
Communications Security 29
Device Security 30
1.13 Key Terms and Review Questions 30
Key Terms 30
Review Questions 31
1.14 References 31
Chapter 2: Information Privacy Concepts 32
2.1 Key Privacy Terminology 32
2.2 Privacy by Design 35
Privacy by Design Principles 35
Requirements and Policy Development 37
Privacy Risk Assessment 37
Privacy and Security Control Selection 39
Privacy Program and Integration Plan 40
2.3 Privacy Engineering 41
Privacy Implementation 44
System Integration 44
Privacy Testing and Evaluation 45
Privacy Auditing and Incident Response 45
2.4 Privacy and Security 46
Areas of Overlap Between Security and Privacy 46
Trade-Offs Between Security and Privacy 48
2.5 Privacy Versus Utility 48
2.6 Usable Privacy 49
Users of Privacy Services and Functions 50
Usability and Utility 50
2.7 Key Terms and Review Questions 50
Key Terms 50
Review Questions 51
2.8 References 51
PART II: PRIVACY REQUIREMENTS AND THREATS 53
Chapter 3: Information Privacy Requirements and Guidelines 54
3.1 Personally Identifiable Information and Personal Data 55
Sources of PII 57
Sensitivity of PII 58
3.2 Personal Information That Is Not PII 59
3.3 Fair Information Practice Principles 63
3.4 Privacy Regulations 66
European Union 66
U.S. Privacy Laws and Regulations 67
3.5 Privacy Standards 68
International Organization for Standardization (ISO) 69
National Institute of Standards and Technology 77
3.6 Privacy Best Practices 88
Information Security Forum (ISF) 88
Cloud Security Alliance (CSA) 90
3.7 Key Terms and Review Questions 91
Key Terms 91
Review Questions 91
3.8 References 92
Chapter 4: Information Privacy Threats and Vulnerabilities 94
4.1 The Evolving Threat Environment 95
Overall Impact of Advances in Technology 95
Repurposing Collected Data 96
Means of Collection of PII 96
4.2 Privacy Threat Taxonomy 97
Information Collection 98
Information Processing 98
Information Dissemination 98
Invasions 99
4.3 NIST Threat Model 100
4.4 Threat Sources 105
4.5 Identifying Threats 106
4.6 Privacy Vulnerabilities 108
Vulnerability Categories 108
Location of Privacy Vulnerabilities 109
National Vulnerability Database and Common Vulnerability Scoring System 110
4.7 Key Terms and Review Questions 114
Key Terms 114
Review Questions 115
4.8 References 116
PART III: TECHNICAL SECURITY CONTROLS FOR PRIVACY 117
Chapter 5: System Access 118
5.1 System Access Concepts 119
Privileges 119
System Access Functions 120
Privacy Considerations for System Access 121
5.2 Authorization 122
Privacy Authorization 123
5.3 User Authentication 124
Means of Authentication 125
Multifactor Authentication 126
A Model for Electronic User Authentication 127
5.4 Access Control 129
Subjects, Objects, and Access Rights 130
Access Control Policies 131
Discretionary Access Control 131
Role-Based Access Contro…