Skip to main content

Home/ Information Security/ Group items tagged data

Rss Feed Group items tagged

Mark Frisse

SSRN-Waiving Your Privacy Goodbye: Privacy Waivers and the HITECH Act's Regulated Price... - 0 views

  •  
    his article explains why supplying data to researchers is set to become a profitable line of business for entities that hold large stores of health data in electronic form. Health information systems are a form of infrastructure, and Congress's cost-based fee for data preparation and transmission echoes pricing schemes traditionally used in other infrastructure industries such as railroads, electric power transmission, and telecommunications. Cost-based fees for infrastructure services, of constitutional necessity, must allow recovery of operating and capital costs including a return on invested capital-in other words, a profit margin.  This fee structure is being launched in an emerging 21st-century research landscape where biomedical discovery will depend more than it has in the past on studies that harness existing stores of data-such as insurance claims and healthcare data-that were created for purposes other than the research itself. This article explores why, in this environment, the new fee structure has the potential to destabilize already-fragile public trust and invite state-law responses that could override key provisions of federal privacy regulations, with devastating consequences for researchers' future access to data. To avoid this outcome, the cost-based fee must be thoughtfully implemented and accompanied by reform of the HIPAA waiver provision now used to approve nonconsensual use of people's health data in research. This article identifies specific defects of the existing framework for approving nonconsensual uses of data with the aim of eliciting a wider debate about what the reforms ought to be.
valuementor

Understanding the Growing Concern Around Data Privacy - 0 views

  •  
    Data poisoning is a type of adversarial attack where attackers tamper with the data used to train machine learning models. Unlike prompt injection or evasion attacks, it targets the model before deployment. The attacker adds misleading or harmful data to the training set to change how the model behaves.
Skeptical Debunker

FTC warns firms, organizations of widespread data breach - 0 views

  • The FTC declined to identify the companies or organizations involved, but said they were both "private and public entities, including schools and local governments." The companies and organizations ranged in size from "businesses with as few as eight employees to publicly held corporations employing tens of thousands," the FTC said in a statement. It said sensitive data about customers and employees had been shared from the computer networks of the companies and organizations and made available on Internet peer-to-peer (P2P) file-sharing networks. The information was accessible to "any users of those networks, who could use it to commit identity theft or fraud," the FTC said. "Unfortunately, companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers' sensitive information at risk," FTC chairman Jon Leibowitz said. "For example, we found health-related information, financial records, and drivers' license and social security numbers -- the kind of information that could lead to identity theft," Leibowitz said.
  •  
    The US Federal Trade Commission (FTC) said Monday it has notified nearly 100 companies and organizations of data breaches involving personal information about customers or employees.
Robin Dale

Misconceptions About The USA Patriot Act and Data Security in the Cloud Sector - 1 views

  •  
    This blog post speaks about the misconceptions people are having about the USA Patriot Act and Data Security, especially in the cloud sector.
Carlos Gomes

Companies need to sell security to business-unit execs - Network World - 0 views

  • Stamp says that business units must accept responsibility for the security of the data they generate and control to head off data leaks. "IT people are data custodians, not owners," Stamp says. "We need to transfer responsibility to business people
Tsudo

OSF DataLossDB | Data Loss News, Statistics, and Research - 0 views

shared by Tsudo on 04 Mar 09 - Cached
  •  
    DataLossDB is a research project aimed at documenting known and reported data loss incidents world-wide.
Seçkin Anıl Ünlü

Protects your application's access data and passwords. Biometrically. - KeyTrac - 1 views

  •  
    Sonunda birileri urun haline donusturmus :)
Carlos Gomes

DRM-roll for consumer privacy protection - Network World - 0 views

  • Through DRM technologies, consumers engaging in electronic commerce could grant vendors and suppliers a license to access and utilize certain aspects of the consumers’ data. This would enable a consumer to grant a read/write license to some creditors, perhaps as a function of a mortgage agreement, and provide a read-only license to a limited subset of the data for simple transactions such as shipping agreements and online orders. Such a license would empower consumers to prevent entities from misusing or reselling consumer information.
Skeptical Debunker

Browser history hijack + social networks = lost anonymity - 0 views

  •  
    Simply joining a few groups at social networking sites may reveal enough information for hackers to personally identify you, according to some recent computer science research. In a paper that will be presented at a security conference later this year, an international team of academics describes how they were able to build membership sets using information that social networking sites make available to the public, and then leverage an existing attack on browsing history to check for personal identity. That information, they argue, can then be combined with other data to create further security risks, such as a personalized phishing attack.
Seçkin Anıl Ünlü

Plugging the CSS History Leak at Mozilla Security Blog - 0 views

  • History Sniffing
  • Links can look different on web sites based on whether or not you’ve visited the page they reference.
  • The problem is that appearance can be detected by the page showing you links, cluing the page into which of the presented pages you’ve been to. The result: not only can you see where you’ve been, but so can the web site!
  • ...18 more annotations...
  • The most obvious fix is to disable different styles for visited versus unvisted links, but this would be employed at the expense of utility: while sites can no longer figure out which links you’ve clicked, neither can you.
  • David Baron has implemented a way to help keep users’ data private while minimizing the effect on the web, and we are deploying it to protect our users.
  • The biggest threats here are the high-bandwidth techniques, or those that extract lots of information from users’ browsers quickly.
  • The JavaScript function getComputedStyle() and its related functions are fast and can be used to guess visitedness at hundreds of thousands of links per minute.
  • we’re approaching the way we style links in three fairly subtle ways:
  • Change 1: Layout-Based Attacks
  • First of all, we’re limiting what types of styling can be done to visited links to differentiate them from unvisited links.
  • can only be different in color
  • the CSS 2.1 specification takes into consideration how visited links can be abused:
  • implement other measures to preserve the user’s privacy while rendering visited and unvisited links differently
  • Change 2: Some Timing Attacks
  • we are changing some of the guts of our layout engine to provide a fairly uniform flow of execution to minimize differences in layout time for visited and unvisited links.
  • when the link is styled, the appropriate set of styles is chosen making the code paths for visited and unvisited links essentially the same length.
  • Change 3: Computed Style Attacks
  • JavaScript is not going to have access to the same style data it used to.
  • Firefox will give it unvisited style values.
  • it’s the right trade-off to be sure we protect our users’ privacy.
  • fixing CSS history sniffing will not block all of these leaks. But we believe it’s important to stop the scariest, most effective history attacks any way we can since it will be a big win for users’ privacy.
Rich Hintz

http://www.usenix.org/events/fast11/tech/full_papers/Wei.pdf - 2 views

  •  
    Reliably Erasing Data From Flash-Based Solid State Drives
vivektrivedi

Infrastructure - Exigo Tech - 0 views

  •  
    At Exigo Tech, we understand the importance of data networks and infrastructure. Being the backbone for your business, we believe that your network should be dynamic and should enable you to seize opportunities as your company grows, while maximising resources.
1 - 14 of 14
Showing 20 items per page