Chapter 4. Information Privacy Threats and Vulnerabilities

Learning Objectives

After studying this chapter, you should be able to:

  • Understand how changes in information technology have increased the threats to privacy

  • Make a presentation on the types of privacy threats that individuals and organizations face

  • List and discuss the various categories of privacy vulnerabilities

  • Explain the purpose of the National Vulnerability Database and how organizations can use it

Chapter 3, “Information Privacy Requirements and Guidelines,” discusses the requirements that drive the information privacy design and implementation process. These requirements derive from a number of sources, the most important of which are:

  • Fair information practice principles ...

Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.