Chapter 4. Information Privacy Threats and Vulnerabilities
After studying this chapter, you should be able to:
Understand how changes in information technology have increased the threats to privacy
Make a presentation on the types of privacy threats that individuals and organizations face
List and discuss the various categories of privacy vulnerabilities
Explain the purpose of the National Vulnerability Database and how organizations can use it
Chapter 3, “Information Privacy Requirements and Guidelines,” discusses the requirements that drive the information privacy design and implementation process. These requirements derive from a number of sources, the most important of which are:
Fair information practice principles ...