A roadmap towards improving managed security services from a privacy perspective

Ethics and Information Technology 16 (3):227-240 (2014)
  Copy   BIBTEX

Abstract

This paper proposes a roadmap for how privacy leakages from outsourced managed security services using intrusion detection systems can be controlled. The paper first analyses the risk of leaking private or confidential information from signature-based intrusion detection systems. It then discusses how the situation can be improved by developing adequate privacy enforcement methods and privacy leakage metrics in order to control and reduce the leakage of private and confidential information over time. Such metrics should allow for quantifying how much information that is leaking, where these information leakages are, as well as showing what these leakages mean. This includes adding enforcement mechanisms ensuring that operation on sensitive information is transparent and auditable. The data controller or external quality assurance organisations can then verify or certify that the security operation operates in a privacy friendly manner. The roadmap furthermore outlines how privacy-enhanced intrusion detection systems should be implemented by initially providing privacy-enhanced alarm handling and then gradually extending support for privacy enhancing operation to other areas like digital forensics, exchange of threat information and big data analytics based attack detection.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,423

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The ethical impacts of managed care.George W. Rimler & Richard D. Morrison - 1993 - Journal of Business Ethics 12 (6):493 - 501.
Privacy, secrecy and security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
What care should be covered?Bernard J. Mansheim - 1997 - Kennedy Institute of Ethics Journal 7 (4):331-336.
Privacy and occupational health services.A. Heikkinen - 2006 - Journal of Medical Ethics 32 (9):522-525.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.

Analytics

Added to PP
2015-09-02

Downloads
8 (#1,291,989)

6 months
6 (#512,819)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

A Mathematical Theory of Communication.Claude Elwood Shannon - 1948 - Bell System Technical Journal 27 (April 1924):379–423.

Add more references