Chapter 4. Information Privacy Threats and Vulnerabilities
Learning Objectives
After studying this chapter, you should be able to:
Understand how changes in information technology have increased the threats to privacy
Make a presentation on the types of privacy threats that individuals and organizations face
List and discuss the various categories of privacy vulnerabilities
Explain the purpose of the National Vulnerability Database and how organizations can use it
Chapter 3, “Information Privacy Requirements and Guidelines,” discusses the requirements that drive the information privacy design and implementation process. These requirements derive from a number of sources, the most important of which are:
Fair information practice principles ...
Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.