TY - JOUR
T1 - The privacy implications of cyber security systems
T2 - A technological survey
AU - Toch, Eran
AU - Bettini, Claudio
AU - Shmueli, Erez
AU - Radaelli, Laura
AU - Lanzi, Andrea
AU - Riboni, Daniele
AU - Lepri, Bruno
N1 - Publisher Copyright:
© 2018 ACM.
PY - 2018/2
Y1 - 2018/2
N2 - Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. We suggest a taxonomy for privacy risks assessment of information security technologies, based on the level of data exposure, the level of identification of individual users, the data sensitivity and the user control over the monitoring, and collection and analysis of the data. We discuss our results in light of the recent technological trends and suggest several new directions for making these mechanisms more privacy-aware.
AB - Cyber-security systems, which protect networks and computers against cyber attacks, are becoming common due to increasing threats and government regulation. At the same time, the enormous amount of data gathered by cyber-security systems poses a serious threat to the privacy of the people protected by those systems. To ground this threat, we survey common and novel cyber-security technologies and analyze them according to the potential for privacy invasion. We suggest a taxonomy for privacy risks assessment of information security technologies, based on the level of data exposure, the level of identification of individual users, the data sensitivity and the user control over the monitoring, and collection and analysis of the data. We discuss our results in light of the recent technological trends and suggest several new directions for making these mechanisms more privacy-aware.
KW - Information security
KW - Network surveillance
KW - Privacy
KW - Privacy-preserving methods
KW - System monitoring
UR - http://www.scopus.com/inward/record.url?scp=85042595420&partnerID=8YFLogxK
U2 - 10.1145/3172869
DO - 10.1145/3172869
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.systematicreview???
AN - SCOPUS:85042595420
SN - 0360-0300
VL - 51
JO - ACM Computing Surveys
JF - ACM Computing Surveys
IS - 2
M1 - 36
ER -