Skip to Content
The Architecture of Privacy
book

The Architecture of Privacy

by Courtney Bowman, Ari Gesher, John K Grant, Daniel Slate, Elissa Lerner
September 2015
Intermediate to advanced
224 pages
5h 55m
English
O'Reilly Media, Inc.
Content preview from The Architecture of Privacy

Chapter 4. Information Security: Protecting Data from Unauthorized Access

For the purposes of this book, privacy protection is primarily about regulating authorized access to and use of data. Information security (InfoSec for short, or cybersecurity), which is primarily about stopping unauthorized access to information, is what makes privacy protection possible. Without controlling unauthorized access, building a privacy protection regime for authorized users is moot because any protection that can be easily circumvented is no true protection at all.

Whereas the implementation of privacy and security are concerned with guarding against different threats, they do make use of the same technologies such as encryption, auditing, logging, access controls, separation of concerns, alerting, active monitoring, and investigation. It could therefore be quite understandable for an organization that has not thought extensively about the underlying distinctions to mistake privacy for security. But an architecture is an arrangement of things to constitute a whole with desired properties, and the desired properties for protecting privacy and for securing against unauthorized access are not the same. Each requires unique design considerations.

If your organization does not have a dedicated information security team, get one. If your organization already has a dedicated InfoSec team, bring them into the design process early. As the experts on your network security, they will have invaluable advice ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Compliance Revolution: How Compliance Needs to Change to Survive

The Compliance Revolution: How Compliance Needs to Change to Survive

David Jackman
Security and Privacy in Cyber-Physical Systems

Security and Privacy in Cyber-Physical Systems

Houbing Song, Glenn A. Fink, Sabina Jeschke
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran

Publisher Resources

ISBN: 9781491904503Errata Page