bit21
Uploaded by
12 SLIDES
2 VIEWS
0LIKES

Activity 2.2 Privacy by Design final

DESCRIPTION

testtesttest

1 / 12

Download Presentation

Activity 2.2 Privacy by Design final

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Architecture Strategy Eric James CDS512_95 Law & Ethics in Cyber Security Dr. Emily Darraj July 14, 2024

  2. Introduction Implementing and leveraging advanced technologies like encryption and access controls are key components of a robust IT architecture. A strong defense is essential for safeguarding against unauthorized access and data breaches, ensuring the protection of sensitive information, maintaining privacy, and upholding the integrity of critical systems and networks.

  3. Proactive not Reactive  Implement real-time threat detection and automated response systems.  Implement threat modeling to anticipate potential privacy risks.  Regularly update security protocols based on emerging threats.

  4. Privacy as the Default Setting  Configure all systems and applications to provide maximum privacy settings by default.  Minimize data collection and retention to only what is strictly necessary for operational purposes.  Ensure that any personal data is anonymized or pseudonym zed by default.

  5. Privacy Embedded into Design  Integrate privacy considerations into the initial design phase of IT projects.  Conduct Privacy Impact Assessments (PIAs) during the development process.  Develop privacy-enhancing technologies (PETs) and incorporate them into the design of systems and processes.  Collaborate with multidisciplinary teams, including privacy experts, during the design and development stages.

  6. Full Functionality  End-to-end encryption for secure communication  Privacy-preserving data analytics techniques  Implementing role-based access control for data protection  Secure and private cloud storage solutions  Anonymization and de-identification of sensitive data

  7. End-to-End  Implementation of access controls to ensure that only authorized personnel can access the data.  Regular security audits and vulnerability assessments to identify and address any security gaps.  Secure coding practices to prevent vulnerabilities in software applications that could compromise data security.  Implementation of strong authentication methods, such as multi-factor authentication, to prevent unauthorized access.  Monitoring and logging of data access and usage to detect any unusual activity that may indicate a security breach.

  8. Visibility and Transparency  Ongoing communication with users about system changes. Providing easy access to terms of service and data handling policies.   Open APIs for third-party integration, enabling visibility into data usage and access.

  9. Respect for User Privacy  Designing user-friendly privacy settings and controls. Ensuring user consent and control over personal data.  Regular privacy audits to ensure compliance with regulations.  Transparent communication with users about data collection and usage. 

  10. Conclusion Implementing advanced technologies such as encryption and access controls is crucial for building a robust IT architecture. By prioritizing strong defense measures, organizations can effectively safeguard against unauthorized access and data breaches, protect sensitive information, uphold privacy, and maintain the integrity of critical systems and networks.

  11. References Brumfield, C. (2022, January 20). Biden memo aims to bolster cybersecurity in national security systems. CSO Online. https://www.csoonline.com/article/571917/biden-memo- aims-to-bolster-cybersecurity-in-national-security-systems.html Sanger, D. E. (2012). Obama order sped up wave of cyberattacks against Iran. The New York Times, 1(06), 2012. Top White House cyber aide says recent Iran hack on water system is call to tighten cybersecurity. (2023, December 10). CBS News. https://www.cbsnews.com/pittsburgh/news/top-white-house-cyber-aide-says-recent- iran-hack-on-water-system-is-call-to-tighten-cybersecurity-2/ U.S. officials hold their breath for Iranian cyberattacks. (2023, November 1). POLITICO. https://www.politico.com/news/2023/11/01/us-officials-iranian-cyberattacks-00124847

  12. Design Statement I used seven principles of privacy by design to create an outline. I googled and found websites with information about IT architecture strategy. I use the information to create my PowerPoint slides Title Introduction Proactive not Reactive Privacy as the Default Setting Privacy Embedded into Design Full Functionality End-to-End Visibility and Transparency Respect for User Privacy Conclusion References Design Statement            

More Related